Meta Platforms, Inc. (Meta) is looking to solve problems related to the security, integrity, and availability of their large-scale systems by designing, developing, and maintaining defense infrastructure and applications.
Requirements
- C, C++, and PHP coding languages experience
- Proficiency in database systems, including relational databases (MySQL), as well as NoSQL databases (ZippyDB, MemCache)
- Strong understanding of optimizations, indexing, partitioning, MV, CTEs, and ETL processes
- Demonstrating deep knowledge and implementation skills in identity and access management, authentication and authorization protocols, token management, threat modeling and network security
- Full-stack development expertise, with the ability to design, build, and maintain both client-side interfaces and server-side architectures
- Experience in collecting, analyzing, and interpreting complex data sets to extract insights, identify trends, and inform technical decisions
- Strong OS background and knowledge, with demonstrated experience in Linux or UNIX-like operating systems, including file manipulation, process management, and job scheduling (e.g. Chronos)
Responsibilities
- Designing, developing, and maintaining defense infrastructure and applications to ensure the security, integrity, and availability of systems in large-scale.
- Developing complex algorithms and data structures to support authentication, authorization, identity provisioning and access management workflows.
- Collaborating with PM, cross-functional teams and security experts to identify and mitigate emerging threats and implementing countermeasures to protect against them.
- Mentoring and guiding engineers to help them develop their skills and expertise.
- Leading complex projects from concept to delivery, collecting and clarifying requirements, resolution of ambiguities, development of project plans, and driving execution.
- Deep understanding of Identity and Access Management (IAM) principles and frameworks, authentication protocols (OAuth, OpenID), and authorization paradigms.
- Must be well-versed in security disciplines, including threat modeling, vulnerability assessment (e.g., CVSS, NVD), and mitigation strategies (e.g., least privilege).
Other
- 10 years of post-baccalaureate work experience in the job offered or a related occupation
- Demonstrated experience in leading and mentoring junior engineers, providing technical guidance, direction, and support to ensure successful project delivery
- Proven experience in owning, designing ,developing and improving highly-available, large-scale, fault-tolerant distributed infrastructure applications in a corporate environment
- Designing and completing large features independently without guidance
- Applying algorithms and core computer science concepts to real world systems as evidenced by recognizing and matching patterns from different areas of computer science in production systems