Security Engineer, Identity and Access Management (IAM)
JetBrains · Amsterdam, Netherlands | Belgrade, Serbia | Berlin, Germany | Limassol | Madrid, Spain | Munich, Germany | Paphos | Prague, Czech Republic | Warsaw, Poland | Yerevan · Security
About this role
JetBrains is hiring a mid-level Security Engineer based in Amsterdam, Netherlands | Belgrade, Serbia | Berlin, Germany | Limassol | Madrid, Spain | Munich, Germany | Paphos | Prague, Czech Republic | Warsaw, Poland | Yerevan. The posting calls out experience with Python, Bash, AWS, GCP.
- Role
- Security Engineer
- Function
- security
- Level
- mid
- Track
- Individual contributor
- Employment
- Full-time
- Location
- Amsterdam, Netherlands | Belgrade, Serbia | Berlin, Germany | Limassol | Madrid, Spain | Munich, Germany | Paphos | Prague, Czech Republic | Warsaw, Poland | Yerevan
- Department
- Security
More roles at JetBrains
Job description
from JetBrains careersAt JetBrains, code is our passion. Since 2000, we’ve focused on helping developers work faster by automating routine checks and fixes. Our tools are used by over 12.5 million people worldwide, including eighty-eight Fortune Global 100 companies.
We are seeking a detail-oriented IAM Security Specialist to lead the integration, support, and governance of our identity ecosystem. You will be the bridge between technical implementation and security compliance, ensuring that every identity, whether human or machine, has exactly the permissions it needs and nothing more. Your focus will be on building scalable RBAC models and maintaining a rigorous access review cycle.
Key responsibilities
System integration and support:
- Lead the technical integration of new applications and services into our centralized IAM platform.
- Provide expert support for complex authentication/authorization issues and serve as a technical escalation point.
- Maintain and optimize IAM infrastructure, including SSO (SAML, OAuth 2.0, OIDC), MFA, and PAM solutions.
Access governance and permission reviews:
- Execute and oversee periodic access re-certifications, ensuring compliance across periodic audit cycles (SOC 2).
- Conduct detailed permission reviews for individuals and system integrations to enforce the Principle of Least Privilege (PoLP).
RBAC and ABAC modeling:
- Design, document, and implement Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) frameworks across a wide range of systems.