Were looking for a backend engineer with strong expertise to build secure, scalable APIs and platform integrations. Youll lead authentication/authorization implementations (Okta, OAuth/OIDC/SAML), modernize legacy access policies, and deliver resilient services on Azure/Kubernetes with productiongrade observability.
Key Responsibilities
Design, build, and maintain backend services and REST APIs with robust reliability, performance, and security.
Implement authentication & authorization using Okta APIs; handle token/session lifecycle and hardening.
Migrate SiteMinder policies to modern identity/access patterns (OIDC/SAML/OAuth ).
Integrate securely with internal and external platform services and data sources.
Own API design (standards, versioning, documentation), error handling, idempotency, and rate limiting.
Ensure comprehensive automated testing (unit, integration, system, regression) and CI/CD health.
Operate services on Azure with Kubernetes (containerization, helm/manifests, secrets, config, scaling).
Implement observability with Splunk and Datadog (dashboards, s, SLOs).
Collaborate with Security/Architecture on threat modeling, secrets management, and compliance.
Continuously improve code quality, reliability, and developer experience.
Required Qualifications
5+ years of backend development with a strong focus on (TypeScript preferred) and API engineering.
Proven experience implementing Oktabased auth flows; deep familiarity with OAuth , OIDC, SAML.
Solid knowledge of token/session management (PKCE, refresh tokens, rotation, revocation, scopes).
Handson experience building RESTful services and integrating with thirdparty/internal platforms.
Proficiency with datastores: RDBMS (., PostgreSQL/SQL Server) and MongoDB (schema design, indexing, performance).
Experience deploying to Azure and orchestrating workloads on Kubernetes (containers, networking, ingress, resilience).
Practical use of Splunk and Datadog for logs/metrics/traces; creating actionable dashboards/s.
Strong testing discipline: unit, integration, system, regression and contract testing.
Comfortable with modern SDLC tooling: Jira, Confluence, Git, Jenkins (SVN experience a plus).
Bachelors degree (BE, MCA, or equivalent) in Computer Science, Engineering, or related field.
Core IAM Concepts
Authentication & Authorization protocols:
OIDC (OpenID Connect) flows, ID token handling
OAuth grant types, scopes, refresh tokens
PKCE (Proof Key for Code Exchange) why and how its used
Session Management:
Session creation, renewal, and termination
Handling session timeouts and re-authentication
Token Handling:
Access token vs ID token vs refresh token
Token validation and expiration strategies
Login/Logout Flows:
Standard login/logout
Universal Logout (single sign-out across apps)
Single Sign-On (SSO):
Inbound SSO integrating external identity providers (., Okta as IdP)
Outbound SSO enabling apps to act as IdP for other services
Federation concepts (SAML, OIDC)
Security Best Practices:
CSRF, XSS prevention in login flows
Secure storage of tokens (browser vs server)
Additional comments
Implementing secure login/logout flows in SPAs or web apps
Handling redirects for OIDC/OAuth flows
Integration with Okta Sign-In Widget or custom login pages
Handling SSO flows (inbound and outbound) in UI
Error handling for authentication failures
Preferred (Not Mandatory)
Familiarity with Okta platform (Sign-In Widget, SDKs, API)
Experience in migration projects from legacy IAM systems (., SiteMinder)
Skills:, API, OAuth/Okta, SSO, Session, Token, Login/Logout, JWT