- Страна
- США
- Зарплата
- 101 000 $ – 198 000 $
Откликайтесь
на вакансии с ИИ

IAM Security Engineer 3
MongoDB — престижный работодатель с отличным социальным пакетом и прозрачным диапазоном зарплат. Роль предлагает работу с передовыми технологиями безопасности, хотя требования к гражданству и локации ограничивают круг кандидатов.
Сложность вакансии
Роль требует глубоких знаний в области IAM (Okta, AWS), опыта работы с инфраструктурным кодом (Terraform) и понимания строгих комплаенс-стандартов, таких как FedRAMP High. Дополнительную сложность накладывает требование гражданства США и необходимость участия в on-call ротациях.
Анализ зарплаты
Предложенный диапазон $101,000 – $198,000 полностью соответствует рыночным ожиданиям для позиции Security Engineer уровня 3 в США, особенно с учетом требований к FedRAMP. Верхняя граница диапазона является весьма конкурентной даже для технологических гигантов.
Сопроводительное письмо
I am writing to express my strong interest in the IAM Security Engineer 3 position at MongoDB. With over four years of experience in Identity and Access Management and a deep focus on securing cloud environments, I have developed a robust skill set in managing Okta, AWS IAM, and implementing complex RBAC models. My background aligns perfectly with your need for an engineer who can automate identity lifecycles using Terraform and Python while maintaining high security standards.
Throughout my career, I have successfully led initiatives to harden non-human identities and integrate IAM events into observability platforms like Datadog. I am particularly excited about the opportunity to support FedRAMP High compliance at MongoDB, as I have a keen interest in NIST 800-53 frameworks and public-sector security requirements. My experience in building scalable, least-privilege access models in multi-cloud environments ensures that I can contribute immediately to the Enterprise Security team.
I am a US Citizen based on the West Coast and am eager to bring my technical expertise and problem-solving skills to MongoDB's hybrid work environment. Thank you for considering my application. I look forward to the possibility of discussing how my experience with Zero Trust and automated security workflows can help strengthen MongoDB's security posture.
Составьте идеальное письмо к вакансии с ИИ-агентом

Откликнитесь в mongodb уже сейчас
Присоединяйтесь к команде MongoDB и станьте ключевым экспертом по безопасности в одной из самых инновационных технологических компаний мира!
Описание вакансии
We are looking for an IAM & Security Engineer 3 to join our Enterprise Security (IAMSEC) team. In this role, you will help design, implement, and operate identity, access, and endpoint security solutions at scale. You’ll work closely with senior IAM engineers, Cloud Security, and IT teams to improve our IAM posture, automate routine operations, and support key compliance initiatives such as FedRAMP High.
We are looking to speak to candidates who are based on the West Coast of the US for our hybrid working model.
Responsibilities
- Operate and enhance IAM platforms, including Okta, AWS IAM, GCP IAM, and Azure AD, helping to ensure secure, least-privilege, and scalable access models for employees and service accounts.
- Need to be a US Citizen
- Implement and support SSO integrations (SAML, OIDC, OAuth2) and MFA enforcement for internal and third-party applications.
- Help maintain and improve RBAC models, groups, and policies, ensuring access is consistent with business needs and audit requirements.
- Contribute to the identity lifecycle (provisioning, deprovisioning, access changes, and just-in-time access) using automation (Terraform/OpenTofu, Python, Tines) to reduce manual effort and errors.
- Assist with hardening non-human identities (service accounts, workloads, automation identities, agentic AI systems), focusing on least-privilege and proper key/secret management.
- Collaborate with senior engineers to support FedRAMP High and other regulatory/compliance programs by implementing and operating required IAM and endpoint controls, and helping prepare evidence for audits.
- Integrate IAM and endpoint events into Datadog (or similar tools) to improve visibility, alerts, and investigations around authentication and access activity.
- Partner with teams operating MDM platforms (Jamf, Workspace ONE, Kolide) to ensure device posture is reflected in IAM policies where applicable.
- Create and maintain documentation and runbooks for IAM workflows, automations, and on-call procedures.
- Participate in the IAMSEC team’s on-call rotation for production incidents impacting identity, access, or FedRAMP-scoped services, with guidance from senior team members.
Requirements
- 3–5 years of experience in Identity & Access Management, Security Engineering, or Cloud Security roles.
- Hands-on experience administering and securing Okta for workforce identity (groups, policies, app integrations, MFA).
- Practical experience working with IAM in at least one major cloud provider (AWS IAM strongly preferred; GCP IAM or Azure AD a plus).
- Good understanding of authentication and authorization standards, including OAuth2, OIDC, SAML, and modern MFA approaches.
- Exposure to FedRAMP High or Moderate, or similar U.S. public-sector frameworks (e.g., FISMA, StateRAMP), and an interest in deepening expertise in NIST 800‑53, ATO processes, and POA&M management.
- Experience implementing or supporting RBAC models, group/role structures, and access reviews in a mid-to-large enterprise.
- Experience with scripting or programming (e.g., Python, Bash) to automate repetitive IAM or security tasks.
- Familiarity with Infrastructure as Code (Terraform/OpenTofu, CloudFormation) and a willingness to grow into owning IAM-related IaC modules.
- Experience with observability or SIEM tools such as Datadog (or similar) for working with logs, alerts, and dashboards.
- Strong problem-solving skills, attention to detail, and the ability to follow and improve documented processes.
- Comfortable collaborating in a remote, distributed team, communicating clearly in writing, and asking for help or clarification when needed.
Nice to Have
- Experience designing or operating phishing-resistant authentication (e.g., WebAuthn, FIDO2, YubiKey).
- Experience with identity governance and administration (IGA) platforms or structured access review / certification processes.
- Experience with Zero Trust concepts and integrating device posture into access policies.
- Exposure to MDM platforms (Jamf, Workspace ONE, Kolide) and endpoint baselines.
- Familiarity with Tines or other low-code automation tools for security workflows.
- Industry certifications such as Okta Certified Administrator, AWS Associate/Professional, or security certifications like Security+; interest in pursuing more advanced certifications over time.
Very Nice to Have
- Experience with Data Security Posture Management (DSPM) platforms, including discovering and classifying sensitive data across cloud and SaaS environments, correlating data sensitivity with identity and access controls, identifying overly permissive access or misconfigurations, and driving remediation aligned to least-privilege and regulatory requirements (e.g., GDPR, HIPAA, FedRAMP).
About MongoDB
MongoDB is built for change, empowering our customers and our people to innovate at the speed of the market. We have redefined the database for the AI era, enabling innovators to create, transform, and disrupt industries with software. MongoDB’s unified database platform, the most widely available, globally distributed database on the market, helps organizations modernize legacy workloads, embrace innovation, and unleash AI. Our cloud-native platform, MongoDB Atlas, is the only globally distributed, multi-cloud database and is available across AWS, Google Cloud, and Microsoft Azure.
With offices worldwide and over 60,000 customers, including 75% of the Fortune 100 and AI-native startups, relying on MongoDB for their most important applications, we’re powering the next era of software.
Our compass at MongoDB is our Leadership Commitment, guiding how and why we make decisions, show up for each other, and win. It’s what makes us MongoDB.
To drive the personal growth and business impact of our employees, we’re committed to developing a supportive and enriching culture for everyone. From employee affinity groups, to fertility assistance and a generous parental leave policy, we value our employees’ wellbeing and want to support them along every step of their professional and personal journeys.Learn more about what it’s like to work at MongoDB, and help us make an impact on the world!
MongoDB is committed to providing any necessary accommodations for individuals with disabilities within our application and interview process. To request an accommodation due to a disability, please inform your recruiter.
MongoDB, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type and makes all hiring decisions without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
Req ID: 1273371609
MongoDB’s base salary range for this role is posted below. Compensation at the time of offer is unique to each candidate and based on a variety of factors such as skill set, experience, qualifications, and work location. Salary is one part of MongoDB’s total compensation and benefits package. Other benefits for eligible employees may include: equity, participation in the employee stock purchase program, flexible paid time off, 20 weeks fully-paid gender-neutral parental leave, fertility and adoption assistance, 401(k) plan, mental health counseling, access to transgender-inclusive health insurance coverage, and health benefits offerings. Please note, the base salary range listed below and the benefits in this paragraph are only applicable to U.S.-based candidates.
MongoDB’s base salary range for this role in the U.S. is:
$101,000—$198,000 USD
Создайте идеальное резюме с помощью ИИ-агента

Навыки
- IAM
- Okta
- AWS IAM
- Azure AD
- GCP IAM
- SAML
- OIDC
- OAuth2
- Terraform
- OpenTofu
- Python
- Bash
- Datadog
- Jamf
- Workspace ONE
- FedRAMP
- NIST 800-53
- RBAC
- Zero Trust
Возможные вопросы на собеседовании
Вакансия требует опыта работы с Okta и AWS IAM. Важно понять, как кандидат обеспечивает безопасность в облаке.
Опишите ваш опыт внедрения принципа наименьших привилегий (least-privilege) в среде AWS с использованием Okta в качестве провайдера личности.
В описании указаны FedRAMP High и NIST 800-53. Это критически важные знания для данной роли.
С какими основными сложностями вы сталкивались при подготовке IAM-инфраструктуры к аудиту FedRAMP или аналогичному государственному стандарту?
Автоматизация — ключевой навык для этой позиции (Terraform, Python).
Расскажите о самом сложном процессе жизненного цикла учетных записей, который вы автоматизировали с помощью Terraform или Python. Каких результатов удалось достичь?
Упоминается работа с нечеловеческими сущностями (service accounts).
Какие стратегии вы используете для управления секретами и ротации ключей для сервисных аккаунтов и автоматизированных систем?
Позиция предполагает гибридный формат и on-call дежурства.
Как вы приоритизируете задачи во время инцидента безопасности, влияющего на критические сервисы аутентификации, находясь на on-call дежурстве?
Похожие вакансии
Senior Android Security / Reverse Engineer (HTTPS Traffic, Google Services)
Application Security Еngineer (AppSec)
Head of SOC (Центр мониторинга кибербезопасности)
Pentester (Offensive Security)
Специалист по информационной безопасности
Solution Sales Consultant (Cybersecurity)
1000+ офферов получено
Устали искать работу? Мы найдём её за вас
Quick Offer улучшит ваше резюме, подберёт лучшие вакансии и откликнется за вас. Результат — в 3 раза больше приглашений на собеседования и никакой рутины!
- Страна
- США
- Зарплата
- 101 000 $ – 198 000 $