The Who, What, Why and Where
Internet fraud is exploding. As every company moves business online, and our lives depend more than ever on our ability to securely access vital services, the opportunity for fraudsters is also climbing steeply. Twilio’s Account Security team helps companies connect with their users, and enables builders to prevent account takeovers and fraud. Trusted communications is our mission - and the scope of our solutions is global.
Twilio is looking for an Engineering Manager to join the Account Security Business Unit to own an incubation team to pilot Twilio’s next-generation of authentication and identity platforms. This team will explore concepts like contextual and biometrics authentication, distributed ledger technology for identity verification, etc.
Twilio is looking for a senior engineering leader who lives the Twilio Magic and has a first principles' demeanour. This leader has:
- 8+ years as hands on technical leader leading high-impact teams.
- Experience hiring full-stack high-performance teams that push the boundaries of innovation.
- Strong product opinions and loves to challenge the status quo of the current state of the world and how it operates.
- A bias for action and standing up new prototypes for laser quick validation.
- A proven track record of incubating aggressive experiments quickly and taking them to validation and production
- An innate curiosity and is a constant explorer by nature.
- An inspiring leader who is able to clearly articulate their vision for providing intelligent online threat protection services to our customers
As an Account Security Senior Engineering Manager, you will live the Twilio Magic values:
- BE BOLD: Do not settle on existing me-too solutions in the market. Challenge the status quo and experiment. Failures are welcome.
- EMPOWER OTHERS: Build a team culture through empathy and promotion of Twilio’s values where engineers are able to do their best work. Enable your team to focus on the most meaningful initiatives.
- DRAW THE OWL: Help Twilio re-invent authentication for customers thrown into an age of heightened uncertainty combined with increased privacy requirements and more sophisticated attack vectors.
- WRITE IT DOWN: Document your hypotheses, and the reasons why they were right or not right so you learn from them on the next experiment.