Full-Time

Business Systems Engineer

GTM, Revops

Posted on 11/15/2024

Stytch

Stytch

51-200 employees

Identity platform for authentication solutions

Enterprise Software
Cybersecurity

Compensation Overview

$150k - $200kAnnually

Mid

Remote in USA

Remote, full-time position based in the United States.

Category
General Marketing
Growth & Marketing
Required Skills
Agile
JavaScript
Salesforce

You match the following Stytch's candidate preferences

Employers are more likely to interview you if you match these preferences:

Degree
Experience
Requirements
  • Over 3 years of experience in Salesforce development and architecture, with a proven track record of designing and implementing complex, scalable solutions.
  • Experience with technologies like Apex, JavaScript, Lightning Web Components, SOQL, and Salesforce APIs is essential.
  • Deep understanding of business processes such as billing, revenue recognition, and order management.
  • Ability to evaluate and select cost-effective cloud solutions, communicate technical concepts to non-technical stakeholders, and align technical initiatives with business objectives.
  • Experience in setting and executing strategic technical visions for complex Salesforce implementations and integrations.
  • Strong skills in integrating Salesforce with other enterprise systems using APIs, middleware, and IPaaS solutions.
  • Familiarity with event-driven architectures and managing data flows across multiple platforms.
  • Experience in establishing governance frameworks to ensure compliance with industry standards, regulatory requirements (such as GDPR), and internal policies.
  • Ability to maintain data security and privacy while navigating complex regulatory landscapes.
  • Proven ability to tackle and resolve high-impact, complex technical challenges.
  • Strong understanding of Agile methodologies and experience leading teams in Agile environments.
  • Proficient in Salesforce DevOps practices, including CI/CD pipelines, version control, and automated testing frameworks.
  • Capable of designing, building, and delivering projects independently, while collaborating effectively with the RevOps team and other business operations members.
  • Certifications: Salesforce Developer I & II, System Architect, Technical Architect, Application Architect.
Responsibilities
  • Build and maintain new, highly reliable services that our internal teams can depend on.
  • Improve existing systems to be both user-friendly and secure.
  • Partner with your manager to develop the technical roadmap for the GTM systems.
  • Collaborate with the stakeholders on GTM to prioritize critical projects and see them through to production, ensuring they meet business goals.
  • Establish the foundation build of our GTM systems.
  • Set high standards and best practices, creating a strong framework for all future hires.

Stytch provides a platform for identity and authentication solutions aimed at developers. It offers various services such as Single Sign-On (SSO), device fingerprinting, and bot protection, which help businesses secure their products and protect customer data. The platform operates through an API, allowing developers to create customized authentication flows tailored to their specific needs, regardless of the technology they use. Additionally, Stytch supplies frontend and mobile Software Development Kits (SDKs) to help developers build user interfaces that integrate seamlessly with its API. Unlike many competitors, Stytch focuses on scalability and reliability, ensuring that clients can grow without needing to switch providers. The company's goal is to be a comprehensive solution for authentication and security, providing a flexible and dependable service for businesses of all sizes.

Company Size

51-200

Company Stage

Series B

Total Funding

$122.6M

Headquarters

San Francisco, California

Founded

2020

Simplify Jobs

Simplify's Take

What believers are saying

  • Stytch's expansion into B2B authentication broadens its market reach significantly.
  • Recognition as a 'Best Place to Work' enhances Stytch's ability to attract top talent.
  • Focus on frictionless UX in B2B authentication can reduce churn and boost client satisfaction.

What critics are saying

  • Increased competition from Descope could impact Stytch's market share.
  • Sophisticated fraudsters using AI may challenge Stytch's fraud prevention capabilities.
  • The rise in invoice fraud highlights the need for robust internal controls for clients.

What makes Stytch unique

  • Stytch offers a comprehensive identity platform tailored for developers' authentication needs.
  • The platform provides advanced security features like device fingerprinting and bot protection.
  • Stytch's API and SDKs enable custom authentication flows across diverse tech stacks.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Hybrid Work Options

Paid Parental Leave

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

1%

2 year growth

-6%
ADTmag
Sep 20th, 2024
Stytch Unveils Advanced Authentication Tech with Enhanced Fraud and Bot Protection for Developers

Identity platform provider Stytch has launched new device fingerprinting capabilities designed to provide enhanced fraud and bot protection for developers.

VMblog
Dec 5th, 2023
Stytch Unveils the Most Complete Developer Toolkit for Passkeys: @VMblog

Improve end user experience in VDI, DaaS and physical endpoint environments Stytch Unveils the Most Complete Developer Toolkit for Passkeys Stytch announced the general availability of its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications.

Medium
Jul 26th, 2023
Steal Stytch’s Deck that Raised $90M from Coatue

Before we dive in, one quick thing to point out: the deck you see below is missing user and financial metric you’d probably expect to see. This is likely for two reasons: Sytch’s fundraise from…

PYMNTS
Jun 8th, 2023
It’S Not Enough That Businesses Win – Fraudsters Must Also Lose

The digital age has brought with it a new, sophisticated twist to traditional fraud threats.But while the threat of cybercrime is constantly evolving, as bad actors and cybercriminals leverage the same bleeding-edge tools that organizations have at their disposal, it’s important for firms to note that one of the biggest threats can often come from the inside.That’s because despite all the buzz around new technology, human employees remain both a firm’s best line of defense — and one of their most sensitive vulnerabilities.This, as a New York-based procurement manager, Bhaskarray Barot, pled guilty on Wednesday (June 7) to defrauding his own company as part of a multi-million dollar, multi-year fake invoice scheme.“For years, Barot created fraudulent invoices and processed them for payment at the Manhattan-based company where he used to work as a procurement manager. Barot designed the invoices to closely resemble the invoices that the company received from real vendors and other entities owed payment from the company. But the fraudulent invoices differed in a crucial way: they directed payment into Barot’s pocket,” said Damian Williams, the U.S. Attorney for the Southern District of New York (SDNY), in an announcement about the judgment.Over approximately 40 fake invoices dating back to 2018, the procurement manager used his position to process fraudulent payment requests, totaling approximately $4.4 million for his own gain.Invoice fraud is a common problem that results in an average yearly cost of $280,000 per middle-market business.See Also: Generative AI Gives Scammers More Tools and Greater ReachResearch in “Payments Security Amid Uncertainty: Fighting Fraud And Crime With Digital Innovation Playbook,” a PYMNTS collaboration with Citi, details how firms can pinpoint vulnerabilities and strengthen security to better position themselves — and takes care to note that fraud can originate from inside an organization as easily as from outside, meaning that companies must effectively prepare for, and protect themselves against, both.Particularly in today’s challenging economy, it’s worthwhile for firms to be introspective about their defenses and the strength of those defenses — and whether they’re in a position to fend off attacks, no matter where those attacks come from.Authentication and enterprise-level digital identity verification have become crucial to helping firms identify digital fraud today while protecting against it tomorrow.As PYMNTS has previously noted, there is a “greenfield opportunity for providers and platforms to help automate the verification of counterparties’ identities, payment details and accounts.Still, many global businesses lack access to the modern digital tools needed to identify fraud vulnerabilities and mitigate their risks.While 38% of businesses are using document and identity authentication tools, with roughly a third of those companies looking to modernize ID processes plan to outsource those functions, PYMNTS research in the “B2B Payments Fraud Tracker” found that 71% of businesses say they need additional digital fraud solutions.That’s because the longer firms hold off on boosting their defenses, the more of a jump bad actors will be able to have on them.“Fraudsters, as a general rule of thumb, tend to be very sophisticated and are always finding new ways to defraud individuals and businesses,” Doriel Abrahams, head of risk in the U.S. at fraud prevention provider Forter, told PYMNTS.Abrahams explained that “the weakest link in the online payment journey is the human link,” and emphasized that while organizations often leverage artificial intelligence (AI) and machine learning (ML) tools to train anti-fraud models and establish robust controls, “fraudsters can do the same.”But that doesn’t mean the situation is hopeless, with bad actors playing the cat and businesses the mouse in a constantly evolving game of cat-and-mouse.“One of the things people in the identity space are most excited about is this concept called passkeys that is a new way to do cross-device biometrics, and it pretty much moves us away from the password-laden world into a much more seamless UX,” Stytch Co-founder and CEO Reed McGinley-Stempel told PYMNTS, emphasizing that it will establish much more secure authentication pathways for firms — and hopefully keep the next generation of bad actors at bay.Because at the end of the day, it’s a simple, if damning, quandary firms find themselves facing — make it too easy to make transactions, and companies and consumers are exposed to the fraudsters. Make it too hard, and no one wants to put up with the frictions along the journey and they move to a competitor

PYMNTS
Jun 8th, 2023
Stytch Ceo Says Frictionless Ux Crucial To Scaling B2B Authentication

Authentication is crucial to ensuring the inner workings of today’s digital world keep moving seamlessly. That’s because authentication hiccups can hamstring an organization, resulting in lost sales and costly customer churn. A core component of both cybersecurity and organically scalable software access, frictionless identity and access management processes are foundational to keeping sensitive data safe and secure while ensuring business scalability

INACTIVE