Software Engineer
StrongDMFull Time
Junior (1 to 2 years)
Key technologies and capabilities for this role
Common questions about this position
This is a remote role that will require onsite orientation.
This information is not specified in the job description.
The role requires 8+ years of professional software development experience, 6+ years of Java experience, deep experience with Cloud/AWS, IAM/IGA, Compliance, Security and Privacy, advanced experience with SQL and large scale databases like DynamoDB, Aurora, Postgres, MySQL, and Hibernate, expertise with messaging, queues, and events like Redis or Kafka, plus great communication skills.
SailPoint offers a small-company atmosphere with big-company benefits, featuring a team of results-driven individuals constantly seeking to innovate, high-quality professional engineering with individual impact, and a healthy work-life balance with flexible hours, family-friendly events, and charitable work.
Strong candidates will have 8+ years of software development experience including 6+ years in Java, deep expertise in cloud/AWS, security domains, SQL/databases, and messaging systems, plus advanced object-oriented skills, great communication, and preferably experience with AWS, Continuous Delivery, ETL tools, and performance metrics.
Provides identity security solutions for enterprises
SailPoint provides identity security solutions that help organizations manage and protect digital identities. Its main products, including IdentityIQ, IdentityNow, and File Access Manager, assist businesses in ensuring compliance with regulations, reducing risks, and controlling access to sensitive information. These products work by giving organizations visibility into who has access to what data, allowing them to manage permissions effectively. SailPoint stands out from competitors by utilizing advanced technologies like artificial intelligence and machine learning to enhance its identity governance capabilities. The company's goal is to be a trusted partner for enterprises in navigating the complexities of identity security, ensuring that they can securely manage access to their critical information.