Software Engineer II Identity & Access Management

Klaviyo

Not Interested
Bookmark
Report This Job

profile Job Location:

Boston, NH - USA

profile Monthly Salary: Not Disclosed
Posted on: Yesterday
Vacancies: 1 Vacancy

Job Summary

At Klaviyo we value the unique backgrounds experiences and perspectives each Klaviyo (we call ourselves Klaviyos) brings to our workplace each and every day. We believe everyone deserves a fair shot at success and appreciate the experiences each person brings beyond the traditional job requirements. If youre a close but not exact match with the description we hope youll still consider applying. Want to learn more about life at Klaviyo Visit see how we empower creators to own their own destiny.


Team overview

The Core Infrastructure Identity & Organizations (Core IO) pillar owns the foundational substrate for identity access organizations and platform integrity at Klaviyo. We manage the critical path of the user journey from login to enforcing permissions to operating within the correct organization and regional context so that the rest of the platform can move fast and stay secure.

Within Core IO the Identity & Access Management (IAM) team builds and operates Klaviyos centralized authentication and authorization platform for both humans and machines. We power login SSO MFA SCIM internal service auth and external API auth and we are in the middle of transforming Klaviyos identity stack into a unified enterprise-grade platform.

Why this role is exciting

  • Shape Klaviyos identity platform: Youll help design and build the services that every product team and customer relies on login sessions permissions and secure service APIs are all on your roadmap.
  • High-leverage platform-level impact: Your work will directly affect engineering velocity (auth as a shared service) Enterprise deal wins (SSO/SCIM/RBAC/ReBAC) and Data Residency (region-aware auth flows).
  • Deep systems and security learning: Youll work on distributed systems modern IdP integration machine auth and secure-by-default patterns with strong mentorship and meaningful ownership.

What youll do

As a Software Engineer II on the IAM team you will:

  • Own features end-to-end across design implementation rollout and observability for core authN/Z capabilities such as login flows MFA SSO enhancements SCIM sessions and role/permission enforcement.
  • Contribute to auth platform extraction: Help move authentication and authorization paths out of the legacy monolith into dedicated micro services including token verification API key services and internal service auth behind Kong and IdP platform.
  • Build and maintain shared SDKs and contracts that let internal teams adopt IAM services quickly (OAuth machine auth org-scoped authZ) making secure by default the simplest option for new surfaces and agents.
  • Collaborate with Organizations & Accounts to support org-scoped identity multi-account SSO and flexible org/account models that underpin enterprise experiences and cross-account analytics.
  • Partner with Platform Integrity & Protection (PAA) Security and Compliance on secure patterns for account protection (MFA recovery device/session risk) ensuring IAM is a strong foundation for account security and anti-abuse controls.
  • Improve reliability and performance of IAM services by instrumenting metrics and alerts debugging production issues and contributing to on-call rotations and incident reviews.
  • Help define and refine standards for authentication and authorization across the platform APIs error semantics audit logging and integration patterns so product teams dont reinvent them per-service.

Who you are

You are a mid-level software engineer who has shipped and supported production systems and who wants to specialize in identity security and platform infrastructure.

  • Experienced systems builder: You have 2-5 years of professional software engineering experience including building and operating backend or full-stack services in production.
  • Strong fundamentals & debugging skills: You are comfortable reasoning about data models API design concurrency and failure modes and you can dig through logs metrics and traces to identify root causes and implement systemic fixes.
  • Security & identity motivated: Youre excited by authentication authorization and account security problems and want to deepen your expertise in areas like MFA SSO SCIM OAuth and roles/permissions.
  • Platform/infra mindset: You like building reusable services and tools that other engineers rely on including libraries SDKs and patterns that raise the floor for quality and security across the org.
  • Ownership & collaboration: You take responsibility for outcomes not just code. Youre comfortable driving a small project or component coordinating with partner teams and communicating trade-offs clearly in design docs and PRs.
  • Youve already experimented with AI in work or personal projects and youre excited to dive in and learn fast. Youre hungry to responsibly explore new AI tools and workflows finding ways to make your work smarter and more efficient.

Minimum qualifications

  • 2-5 years of professional software engineering experience.
  • Proficiency in at least one of Python Go or TypeScript/JavaScript and comfort working on backend and/or service-oriented systems.
  • Experience building or operating web services or APIs backed by relational databases and/or caches (e.g. MySQL Postgres Redis).
  • Familiarity with authentication or authorization concepts (sessions tokens OAuth SSO MFA RBAC) and an interest in going much deeper.
  • Exposure to CI/CD pipelines and modern development workflows (code review testing deployments on-call participation or support).

Nice to have

You dont need all of these but experience in any of the following is a bonus:

  • Building or integrating with IdPs and identity protocols (SAML/OIDC enterprise SSO SCIM OAuth API key management).
  • Working with cloud-native infrastructure (AWS Kubernetes Terraform Kong or similar API gateways and service meshes).
  • Experience with high-scale distributed systems or performance-sensitive services where availability and latency targets matter (e.g. auth endpoints org lookups internal service auth).
  • Familiarity with observability stacks (Grafana Datadog/Splunk internal metrics/logging frameworks) and using them to drive reliability improvements.
  • Interest or experience in adjacent Core IO domains like Organizations & Accounts or Platform Anti-Abuse (PAA) especially where they intersect with auth and account security.

Technologies we use (not exhaustive)

Youll work with some of these on day one and have opportunities to learn the rest:

  • Languages & frameworks: Python Django Go TypeScript/React.
  • Identity & access: OAuth API keys SSO SCIM MFA roles & permissions internal service auth SDKs.
  • Infrastructure & platform: AWS Kubernetes Terraform Kong microservice platform for auth and organizations.
  • Data & observability: MySQL Redis Kafka/queues Grafana Splunk internal logging/metrics pipelines.

We use Covey as part of our hiring and / or promotional process. For jobs or candidates in NYC certain features may qualify it as an AEDT. As part of the evaluation process we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound on April 3 2025.

Please see the independent bias audit report covering our use of Covey here


Required Experience:

IC

At Klaviyo we value the unique backgrounds experiences and perspectives each Klaviyo (we call ourselves Klaviyos) brings to our workplace each and every day. We believe everyone deserves a fair shot at success and appreciate the experiences each person brings beyond the traditional job requirements....
View more view more

About Company

Company Logo

Klaviyo unifies AI-powered email marketing and SMS to drive growth, retention, and measurable results. Build personalized, omnichannel experiences across WhatsApp, ecommerce, and more with K:AI Agents.

View Profile View Profile