Overview
We’re seeking exceptional Principal Engineers to join our creative team. Oleria is an enterprise cybersecurity startup founded by notable industry senior leaders Jim Alkove and Jagadeesh Kunda, with deep security, data, and SaaS experience building and securing some of the world’s largest platforms and products used by billions of people worldwide every day. Oleria has received over $43M in funding from Evolution Equity Partners, Salesforce Ventures, Tapestry VC, Zscaler, and other technology luminaries.
We recognize that identity-based attacks on cloud applications are becoming increasingly common, highlighting the importance of addressing access risks to prevent data breaches. Traditional access management methods are human-intensive and often have significant blind spots, making it challenging to manage access risks effectively. At Oleria, we are on a mission to revolutionize access control solutions for enterprise cloud applications, aiming to reduce the opportunity and scope of data breaches.
Our esteemed target customers consist of Fortune 500 corporations and public sector organizations, making your contributions vital to improving the security of data for millions of people around the world.
About Our Engineering Team
We’re disrupting the identity security market! Our products deliver identity security through autonomous, data-driven solutions. We leverage graph technology and artificial intelligence to pioneer a new approach that eliminates complexities and human intervention in identity and access management. Our core driving force is an advanced data platform that autonomously ingests, correlates, and analyzes identity data to build comprehensive access intelligence graphs. These graphs power our AI engines to deliver adaptive, self-learning access controls that provide organizations with frictionless yet highly secure user experiences. With customer-centricity at our core, our engineering, product and go to market team collaborates to deeply understand market needs and translate them into intuitive products that offer unprecedented visibility, control, and defense capabilities. Join our passionate team and contribute to shaping the future of autonomous identity management.
About You
Are you ready to ditch the corporate grind and join a team where your code fuels innovation? We're a cloud-based identity security SaaS startup, disrupting the industry, and we need Principal Backend Engineers who crave autonomy, impact, and the thrill of building something from the ground up.
Your Playground:
No Ivory Towers: We're a flat hierarchy where ideas reign supreme. Your expertise will shape our tech stack, influence product direction, and mentor rising stars.
Code that Matters: Say goodbye to endless bug fixes. You'll architect scalable systems, wrangle massive datasets, and craft elegant solutions that delight our customers.
Cutting-Edge Tech: We're not afraid to experiment and push boundaries. You'll play with the latest cloud tools, work in AI/ML, and build systems that redefine what's possible.
Collaborative: We're a tight-knit crew that values open communication and knowledge sharing. Your voice will be heard, and your ideas celebrated.
Your Strengths:
Backend: You've mastered the art of crafting robust, high-performance backend systems that can scale with our ambitious growth.
Cloud: You navigate the cloud landscape with ease, leveraging its power to build efficient, resilient, and cost-effective solutions.
Problem-Solving: You thrive on challenges, dissecting complex problems with a mix of creativity, logic, and a touch of hacker spirit.
Mentorship: You're eager to share your knowledge, guide junior engineers, and foster a culture of continuous learning and growth.
Job Duties
- Architect and build core backend systems
- Design, develop, and maintain scalable backend services for access management, user preferences, provisioning, and other critical functionalities.
- Build systems using different architecture styles such as micro-services, event-driven, stream-based, allowing for flexible scaling, independent deployments, and real-time data processing depending on the specific application needs.
- Build robust data processing and analysis pipelines to ingest, store, and analyze historical and real-time cloud identity access logs and metadata.
- Implement algorithms and models to identify over-provisioning, security risks, and potential threats.
- Deep dive evaluation of solution proposals or product features, accompanied by the creation or review of design documents and code.
- Develop features to provide actionable recommendations to customers for improving their cloud identity security posture.
- Ensure high performance, scalability, and reliability of backend systems to support our growing user base and data volumes.
- Shape DevOps practices and toolset
- Collaborate with the team to establish a world-class development lifecycle, architecture, and toolset, from initial concept through DevSecOps delivery.
- Champion best practices for CI/CD, containerization, infrastructure as code, and other modern deployment techniques.
- Drive the adoption of automation and monitoring tools to ensure system health and performance.
- Define service architecture and APIs
- Design well-structured and maintainable APIs that enable seamless integration with frontend and other backend services.
- Participate in architectural discussions and make informed decisions about tradeoffs, balancing technical excellence with business needs.
- Uphold principles and values that ensure the security, privacy, and integrity of our systems and data.
Job Requirements
- 10+ years of professional experience in backend development, with a focus on building scalable and distributed systems.
- Experience in cybersecurity or SaaS industry, with a preference for knowledge of identity access and governance.
- Proven track record of shipping and operating high-scale commercial SaaS products.
- Experience working with access logs and metadata, and/or building security analytics solutions with a preference for knowledge of cloud identity related data.
- Experience with data-intensive applications and real-time analytics is highly desirable.
- Proficiency in one or more of the following languages is required, with a strong understanding of their tradeoffs: Go, Python, java, C#, C++
- Languages and Frameworks: Many and varied, with understanding of technical and community pros, cons, and tradeoffs.
- Deep understanding of RESTful API design principles.
- Strong understanding of industry best practices across the entire software development lifecycle, from design to deployment to operations.
- Proven expertise in designing and implementing scalable solutions for data ingestion, transport, storage and retrieval.
- Ability to navigate through highly ambiguous problems and find the best possible solution understanding the scope and trade offs.
- Proven experience with a variety of databases technologies, including relational, graph and NoSQL database stacks along with knowledge of their strengths and trade-offs
- Strong grasp of core networking concepts and protocols to ensure efficient and reliable data communication
- Hands-on experience with at least one public cloud platform (AWS preferred), including modern deployment tooling (CI/CD, containers, Terraform, etc.).
- Deep understanding of performance, privacy, scalability, HA/DR, instrumentation, logging & alerting, and other non-functional requirements of enterprise-scale products.
- Familiarity with secure development practices and industry best practices for security, privacy, and data governance.
- Ability to multi-task and oversee multiple projects at once.
- Strong collaboration skills with the ability to work with others in a conscientious manner.
- Excellent communication capabilities that allow you to convey ideas and work effectively internally and externally.
- Adaptable and flexible for success in a startup environment.
- Strong problem solving skills with a design mindset.
- Self starter capabilities where you can help to define direction and deliver.
- Knowledge of security concepts, threat detection techniques, and anomaly detection algorithms preferred.