We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Senior Security Development Engineer

University of North Carolina - Chapel Hill
$115,000 - $121,072
remote work
United States, North Carolina, Chapel Hill
104 Airport Dr (Show on map)
Mar 31, 2026
Posting Information
Posting Information












Department ITS - Information Security-602000
Career Area Information Technology
Posting Open Date 03/31/2026
Application Deadline 04/15/2026
Open Until Filled No
Position Type Permanent Staff (EHRA NF)
Working Title Senior Security Development Engineer
Appointment Type EHRA Non-Faculty
Position Number 00004951
Vacancy ID NF0009645
Full Time/Part Time Full-Time Permanent
FTE 1
Hours per week 40
Position Location North Carolina, US
Hiring Range $115,000 - $121,072
Proposed Start Date 05/11/2026
Position Information








Be a Tar Heel!
A global higher education leader in innovative teaching, research and public service, the University of North Carolina at Chapel Hill consistently ranks as one of the nation's top public universities. Known for its beautiful campus, world-class medical care, commitment to the arts and top athletic programs, Carolina is an ideal place to teach, work and learn.
One of the best college towns and best places to live in the United States, Chapel Hill has diverse social, cultural, recreation and professional opportunities that span the campus and community.
University employees can choose from a wide range of professional training opportunities for career growth, skill development and lifelong learning and enjoy exclusive perks for numerous retail, restaurant and performing arts discounts, savings on local child care centers and special rates on select campus events. UNC-Chapel Hill offers full-time employees a comprehensive benefits package, paid leave, and a variety of health, life and retirement plans and additional programs that support a healthy work/life balance.
Primary Purpose of Organizational Unit
The Information Security & Identity Management division manages the University's Information Security Office and Identity Management. The Security Office is responsible for coordinating and ensuring that information security across the University is consistent with industry best practices and the University's compliance obligations. Identity Management (IdM) identifies individuals within an enterprise or group and defines and controls the access they have to information and resources within a computer network based on their roles and circumstances.
Position Summary
This position is a 100% remote work arrangement, consistent with System Office policy. UNC Chapel Hill employees are generally required to reside in North Carolina, within a reasonable commuting distance of their assigned duty station.

The Information Security Office coordinates the institution's response to cyber risk, operates critical organization-wide security controls, and reports on the state of the security program to University leadership and the Board of Trustees. The UNC-CH security program ensures the institution meets relevant cybersecurity legal, statutory, regulatory, and compliance obligations across all aspects of the University mission. Identity and Access Management ( IAM) is a part of the UNC-CH information security office.

Identity is the primary 'battleground' of cybersecurity worldwide. Reporting to the IAM Manager, the Senior Software Development Engineer is a core member of the team responsible for delivering the University's written five-year information security strategy. That strategy addresses a specific set of governance, policy, business process, technology, and change management failures that collectively define the University's current identity risk exposure. The central initiative within that strategy is the Authentication Modernization Initiative ( AMI): a top-down redesign of how the University manages credentials, enforces phishing-resistant authentication, and governs identity lifecycle across a highly distributed environment. This role carries two concurrent responsibilities: active participation in the design and implementation of AMI, and ownership and operation of the existing production identity environment throughout the transition. Both require a high level of independent judgment. This role collaborates directly with the IAM Architect and IAM Business Analyst to design, implement, and operationalize solutions, and with the Senior Operations Engineer to ensure the new environment is built on reliable, scalable operational practices.

Success in this role requires more than technical depth. The person in this role must be driven first by the security mission: identifying what the institution needs and delivering it, even when objectives are ambiguous or obstacles intervene. They must exercise sound independent judgment on system design and process, with an orientation toward simplicity and scalability rather than complexity. They must earn and sustain trust across a wide range of partners - technical and non-technical, within ISO and across the University - through honest, reliable, and accountable behavior. And they must demonstrate a bias for action: the ability to distinguish decisions that warrant careful analysis from those that warrant speed, and to act accordingly. The University is not looking for a person who maintains what exists. It is looking for a person who sees where identity security must go and helps drive the program there.
Minimum Education and Experience Requirements
Master's and 1-2 years' experience; or Bachelors and 2-4 years' experience; or will accept a combination of related education and experience in substitution.
Required Qualifications, Competencies, and Experience
Substantial experience in identity and access management, including directory services, federation protocols, and authentication systems. Familiarity with technologies such as Kerberos, LDAP, Active Directory, Entra ID, SAML, or equivalent is expected. Experience with single sign-on platforms and multi-factor authentication is required.

Experience designing and implementing complex, production-grade systems in environments where failures have institution-wide consequences. The candidate must demonstrate a track record of sound independent judgment on architecture and operational design, not just implementation of designs provided by others.

Experience with modern software development practices including configuration management, peer review, and CI/CD pipelines. Proficiency in at least one structured programming language and experience with integration technologies such as REST, SOAP, SQL, or equivalent.

Demonstrated ownership orientation: a track record of identifying what an organization needs, taking responsibility for delivering it, and sustaining that delivery through obstacles and competing priorities without requiring close direction.

Demonstrated ability to earn and sustain trust across a wide range of partners, including non-technical stakeholders, by communicating with clarity and honesty about progress, risk, and problems - including when the news is unwelcome.

Demonstrated bias for action: the ability to distinguish decisions that require careful deliberation from those that require speed, and to act decisively in both cases.
Preferred Qualifications, Competencies, and Experience
Experience with Internet2 Trusted Access Platform solutions, including Shibboleth, COmanage, or equivalent federation and collaboration tools.

Experience contributing to or maintaining open-source projects relevant to identity and access management.

Experience operating in large, decentralized organizations where security standards must be enforced across distributed technology environments without centralized control of infrastructure.

Experience working in hybrid environments spanning Linux and Windows, including both native and containerized workloads (Docker, Kubernetes, or equivalent).

Experience in a regulated environment requiring compliance with federal security standards such as NIST 800-63, HIPAA, or CMMC.
Special Physical/Mental Requirements
Campus Security Authority Responsibilities

Not Applicable.

Special Instructions
Quick Link https://unc.peopleadmin.com/postings/315403
Posting Contact Information




Department Contact Name and Title Parker Whitley, Human Resources Specialist
Department Contact Telephone or Email pwhit@unc.edu
Office of Human Resources Contact Information

If you experience any problems accessing the system or have questions about the application process, please contact the Office of Human Resources at (919) 843-2300 or send an email to employment@unc.edu
Please note: The Office of Human Resources will not be able to provide specific updates regarding position or application status.

Equal Opportunity Employer Statement
The University is an equal opportunity employer and welcomes all to apply without regard to age, color, gender, gender expression, gender identity, genetic information, national origin, race, religion, sex, or sexual orientation. We encourage all qualified applicants to apply, including protected veterans and individuals with disabilities.
Applied = 0

(web-bd9584865-j957j)