Engineering Manager - Identity & Access Management

Openloop
Peru - HQPosted 5 March 2026

Job Description

Engineering Manager - Identity & Access Management ABOUT OPENLOOP OpenLoop was co-founded by CEO, Dr. Jon Lensing, and COO, Christian Williams, with the vision to bring care anywhere. Our telehealth support solutions are thoughtfully designed to streamline and simplify go-to-market care delivery for companies offering meaningful virtual support to patients across an expansive array of specialties, in all 50 states. OpenLoop is looking for an Engineering Manager to join our team in Lima, Peru. This role will lead one of the most critical areas of our platform: the identity and authentication entry point that enables secure access across our ecosystem. The ideal candidate will have a strong technical background in identity platforms, distributed systems, and cloud-native architectures, along with proven leadership experience building and scaling high-performing engineering teams Responsibilities: - Team Leadership & Management: Leads, mentors, and develops a team of 2–6 software engineers, fostering a culture of innovation, collaboration, continuous learning, urgency, and over-communication. Conducts regular 1:1s, performance reviews, and career development planning. Recruits, interviews, and onboards new engineering talent. Collaborates with engineering leadership on team planning and resource allocation while promoting best practices in software development and code quality. - Identity & Access Architecture Ownership: Owns the most critical layer of the platform: identity, authentication, and authorization. Ensures best-in-class security practices, compliance alignment, and high availability for identity services that support enterprise-grade, high-traffic applications. Leads the design, implementation, and evolution of secure identity mechanisms, including: - Authentication and authorization flows - Role-based and attribute-based access control - Token-based systems (JWT, OAuth2, etc.) - Single Sign-On (SSO) integrations - Identity federation and external IdP integrations (e.g., Okta) - Technical Strategy & Product Development: Defines and implements the technical strategy for Identity & Access in alignment with business and security objectives. Ensures scalability, reliability, performance, and observability of authentication services under significant traffic loads. Spends 20%–30% of time doing hands-on technical work, contributing to architecture, design reviews, and critical implementations. Drives architectural decisions across: - AWS-based cloud infrastructure - Node.js services - Event-driven architecture and distributed systems - Cross-Functional Collaboration: Partners closely with Product, Security, Compliance, QA, and SRE to ensure identity solutions meet business requirements while maintaining strict security and performance standards. Communicates technical trade-offs, risks, and system constraints clearly to stakeholders. Leads incident reviews related to authentication, authorization, or access failures. - Project Management & Delivery: Plans and executes complex, high-impact platform initiatives related to identity and access. Ensures reliable delivery of secure, scalable releases. Monitors system health, incident trends, and team velocity, driving continuous improvement in development and operational practices. - Other duties as assigned. REQUIREMENTS - 8+ years of software engineering experience, including 3+ years in management roles leading high-performing engineering teams. - Proven experience implementing identity and authentication mechanisms in enterprise applications. - Hands-on experience integrating and managing identity platforms such as Okta or similar IdPs. - Strong experience with AWS cloud infrastructure. - 5+ years of experience with Node.js - Experience designing and building event-driven architectures - Experience building and scaling high-traffic enterprise-grade applications. - Strong understanding of authentication and authorization standards (OAuth2, OIDC, JWT ... (truncated, view full listing at source)