Were looking for a backend engineer with strong Node.js expertise to build secure, scalable APIs and platform integrations. Youll lead authentication/authorization implementations (Okta, OAuth/OIDC/SAML), modernize legacy access policies, and deliver resilient services on Azure/Kubernetes with productiongrade observability.Key ResponsibilitiesDesign, build, and maintain Node.js backend services and REST APIs with robust reliability, performance, and security.Implement authentication & authorization using Okta APIs; handle token/session lifecycle and hardening.Migrate SiteMinder policies to modern identity/access patterns (OIDC/SAML/OAuth 2.0).Integrate securely with internal and external platform services and data sources.Own API design (standards, versioning, documentation), error handling, idempotency, and rate limiting.Ensure comprehensive automated testing (unit, integration, system, regression) and CI/CD health.Operate services on Azure with Kubernetes (containerization, helm/manifests, secrets, config, scaling).Implement observability with Splunk and Datadog (dashboards, s, SLOs).Collaborate with Security/Architecture on threat modeling, secrets management, and compliance.Continuously improve code quality, reliability, and developer experience.Required Qualifications5+ years of backend development with a strong focus on Node.js (TypeScript preferred) and API engineering.Proven experience implementing Oktabased auth flows; deep familiarity with OAuth 2.0, OIDC, SAML.Solid knowledge of token/session management (PKCE, refresh tokens, rotation, revocation, scopes).Handson experience building RESTful services and integrating with thirdparty/internal platforms.Proficiency with datastores: RDBMS (e.g., PostgreSQL/SQL Server) and MongoDB (schema design, indexing, performance).Experience deploying to Azure and orchestrating workloads on Kubernetes (containers, networking, ingress, resilience).Practical use of Splunk and Datadog for logs/metrics/traces; creating actionable dashboards/s.Strong testing discipline: unit, integration, system, regression and contract testing.Comfortable with modern SDLC tooling: Jira, Confluence, Git, Jenkins (SVN experience a plus).Bachelors degree (BE, MCA, or equivalent) in Computer Science, Engineering, or related field.Core IAM ConceptsAuthentication & Authorization protocols:OIDC (OpenID Connect) flows, ID token handlingOAuth 2.0 grant types, scopes, refresh tokensPKCE (Proof Key for Code Exchange) why and how its usedSession Management:Session creation, renewal, and terminationHandling session timeouts and re-authenticationToken Handling:Access token vs ID token vs refresh tokenToken validation and expiration strategiesLogin/Logout Flows:Standard login/logoutUniversal Logout (single sign-out across apps)Single Sign-On (SSO):Inbound SSO integrating external identity providers (e.g., Okta as IdP)Outbound SSO enabling apps to act as IdP for other servicesFederation concepts (SAML, OIDC)Security Best Practices:CSRF, XSS prevention in login flowsSecure storage of tokens (browser vs server)Additional commentsImplementing secure login/logout flows in SPAs or web appsHandling redirects for OIDC/OAuth flowsIntegration with Okta Sign-In Widget or custom login pagesHandling SSO flows (inbound and outbound) in UIError handling for authentication failuresPreferred (Not Mandatory)Familiarity with Okta platform (Sign-In Widget, SDKs, API)Experience in migration projects from legacy IAM systems (e.g., SiteMinder)Skills:Node.Js, API, OAuth/Okta, SSO, Session, Token, Login/Logout, JWT