This position is a 100% remote work arrangement, consistent with System Office policy. UNC Chapel Hill employees are generally required to reside in North Carolina, within a reasonable commuting distance of their assigned duty station. The Information Security Office coordinates the institution’s response to cyber risk, operates critical organization-wide security controls, and reports on the state of the security program to University leadership and the Board of Trustees. The UNC -CH security program ensures the institution meets relevant cybersecurity legal, statutory, regulatory, and compliance obligations across all aspects of the University mission. Identity and Access Management ( IAM ) is a part of the UNC -CH information security office. Identity is the primary ‘battleground’ of cybersecurity worldwide. Reporting to the IAM Manager, the Senior Software Development Engineer is a core member of the team responsible for delivering the University’s written five-year information security strategy. That strategy addresses a specific set of governance, policy, business process, technology, and change management failures that collectively define the University’s current identity risk exposure. The central initiative within that strategy is the Authentication Modernization Initiative ( AMI ): a top-down redesign of how the University manages credentials, enforces phishing-resistant authentication, and governs identity lifecycle across a highly distributed environment. This role carries two concurrent responsibilities: active participation in the design and implementation of AMI , and ownership and operation of the existing production identity environment throughout the transition. Both require a high level of independent judgment. This role collaborates directly with the IAM Architect and IAM Business Analyst to design, implement, and operationalize solutions, and with the Senior Operations Engineer to ensure the new environment is built on reliable, scalable operational practices. Success in this role requires more than technical depth. The person in this role must be driven first by the security mission: identifying what the institution needs and delivering it, even when objectives are ambiguous or obstacles intervene. They must exercise sound independent judgment on system design and process, with an orientation toward simplicity and scalability rather than complexity. They must earn and sustain trust across a wide range of partners — technical and non-technical, within ISO and across the University — through honest, reliable, and accountable behavior. And they must demonstrate a bias for action: the ability to distinguish decisions that warrant careful analysis from those that warrant speed, and to act accordingly. The University is not looking for a person who maintains what exists. It is looking for a person who sees where identity security must go and helps drive the program there.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed