Security Engineer, Identity and Access Management (IAM) Responsibilities
Design and implement systems that enhance the security of Meta’s Identity & Access Management Systems.
Build and maintain tools that improve the Identity and Access Management posture at Meta.
Conducting design and code reviews Analyze and improve efficiency, scalability, and stability for assigned product area and/or systems.
Identify and drive changes as needed for assigned codebase, product area and/or systems.
Interface with other teams to incorporate their innovations and vice versa.
Communicate security findings to internal to a variety of stakeholders, including both technical and non-technical stakeholders.
Provide defensible recommendations on technical, physical and administrative control implementations based on findings while balancing the cost versus benefits.
Participating in the development and oversight of corrective actions relating to security issues.
Participating in cross-functional, team, and status review meetings.
Recommending process improvement and strategic initiatives as related to security.
Minimum Qualifications
2+ years of experience with Python/C++ and PHP/Hack.
BSc in Computer Science related field, or equivalent experience
3+ years of software development experience
Preferred Qualifications
Program and project management skills.
Experience building large-scale distributed systems or similar experience.
Good grasp of SOX, SOC2, NIST, PCI, ISO, and other security regulations.
Analytical and problem-solving skills, including a basic understanding of data analysis techniques.
Communication skills - both written and verbal, interpersonal skills, and ability to work cross-functionally with various teams.
Experience with developing security reporting and recommendations that are meaningful, defensible and actionable for a variety of audiences.
Experirnce with managing competing priorities and simultaneous projects in a fast-paced environment with little supervision.
Knowledge of evaluating systems architectural designs, data-flow diagrams and technical security implementations, particularly in context of access management in different geographical locations.
Experience in assessing security deficiencies in first-party/internal information systems and recommending mitigating controls.