Our client is looking for a Full Stack IAM Developer passionate about security and digital identity. In this role, you will build the secure foundation that end users interact with, bridging the gap between the IAM platform (PingOne AIC) and the broader application ecosystem. You will design and develop secure front-end interfaces, back-end middleware, and advanced identity components to ensure seamless, secure authentication and authorization experiences.
Build and maintain identity-focused web applications and user portals using Angular (Front-end) and Node.js (Back-end)
Develop and deploy AWS Lambda Authorizers (or similar serverless functions) to enforce fine-grained access control and validate JWT tokens at API Gateway level
Build, extend, and maintain SDKs to simplify IAM integration for internal development teams
Customize login, registration, and profile management user experiences with strong security standards
Develop and consume RESTful APIs, including SCIM and IAM-specific endpoints
Implement advanced authentication mechanisms such as step-up authentication and risk-based access flows
Support engagement channels in integrating CIAM solutions and bridging identity-related data flows
Strong expertise in JavaScript/TypeScript, with hands-on experience in Angular and Node.js
Solid understanding of OAuth 2.0, OIDC, and SAML, including token exchanges, redirects, and scope management
Experience developing AWS Lambda functions for authentication and authorization
Deep knowledge of JWT lifecycle management (signing, verification, validation, security best practices)
Experience designing and integrating RESTful APIs
Understanding of identity handshake mechanisms from a developer perspective
Experience with PingOne AIC, including API usage and SDK integrations
Familiarity with CI/CD pipelines and reusable identity component packaging
Knowledge of front-end design standards (WCAG 2.0, design systems, multilingual/translations support)
Experience integrating CIAM solutions within complex ecosystems
Experience building reusable security tooling for internal developer platforms
Exposure to large-scale IAM architectures in enterprise environments
Additional knowledge of serverless security best practices