Intermediate Security Developer
Lead digital security, automate authentication, and help shape a passwordless future. Requires strong tech, coding, and cyber security experience to advance your career.
The Intermediate Security Developer role from S.i. Systems offers a contract job with salary to be discussed and the chance to start as soon as possible. Designed for someone with at least three years of enterprise IT experience, this opportunity emphasizes passwordless security systems development and rewards industry experience.
Responsibilities and Daily Work
As an Intermediate Security Developer, you’ll lead the adoption of phish-resistant Passkeys and TOTP MFA across multiple banking verticals, which is key for modern digital identity. Your typical day involves coding using Python, Java, and JavaScript, automating security tests, ensuring integration with authentication platforms, and supporting large enterprise projects. You’ll be responsible for governance, security code review, and troubleshooting authentication flows, making you central to the organization’s transition to advanced authentication technologies.
Pros of the Role
This role lets you develop in-demand expertise in passwordless technology and phish-resistant security frameworks. You’ll gain tangible experience with industry standards like SAML, OAuth 2.0, and FIDO2 while driving high-impact projects on a modern tech stack. The opportunity to automate and optimize processes offers clear professional growth.
Cons of the Role
The position comes with heavy technical responsibility, including troubleshooting complex integration issues and driving security testing strategies, which may be challenging for less experienced developers. The contract nature means long-term job security isn’t guaranteed, and compensation details are not transparently provided.
Verdict: Is This Job Right for You?
If you are motivated by enterprise-level digital security and thrive in solving high-impact authentication challenges, this role is ideal. It is especially well suited for someone already familiar with IAM frameworks and proactive about cyber security best practices who wants to be on the leading edge of passwordless technology.
