Build identity verification and fraud detection systems to scrutinize candidate data during the application process.
Develop sophisticated correlation engines that match candidate details (IPs, phone numbers, email history, resume metadata) against known indicators of fraudulent or state-sponsored activity.
Create high-availability pipelines that ingest and analyze signals from application tracking systems (ATS), identity providers, and external risk intelligence.
Ship automated guardrails that flag high-risk candidates in real-time, enabling security teams to act before an infiltrator is onboarded.
Drive 0→1 iteration: prototype quickly, test fraud detection assumptions, learn from emerging threat patterns, and scale simple, effective solutions.
Collaborate across security, platform, and data teams; write and review technical designs; and participate in core SDLC rituals.