Software Engineer (entry to mid level)

By February 13, 2018 No Comments

About Xage

Xage is the first and only zero trust real-world security company. Powered by the Xage Fabric, the company’s Identity & Access Management (IAM), remote access and dynamic data security solutions allow customers to secure, manage and transform operations. With its distributed, scalable and easy-to-operate Fabric, Xage solves the complex digitization challenges of the real-world operations we rely on. Xage customers include leaders in manufacturing, energy O&G, utilities, Space, logistics and transportation.

Thinking of doing something big with cutting edge technologies? We’d love to hear from you! Women, minorities, individuals with disabilities and veterans are particularly encouraged to apply.

About You

  • You are smart, have great energy, and thrive in a fast paced early-stage startup environment
  • Know how to take responsibility, manage your time and get things done
  • Unafraid to make critical decisions and own your successes and your mistakes
  • A full-stack generalist with experience in authorization, authentication, and security protocols
  • Enjoy working with high quality engineering team
  • Naturally adopt a customer-centric problem-solving style
  • Proficient in one or more of C++ / Go / Java and familiar with Unix/Linux
  • Knowledge of, and experience in, information security concepts
  • 2+ years of relevant experience desired
  • B.S. Degree in Computer Science or Engineering (preferred)


  • Design, implement, and test software applications and systems
  • Collaborate with the other software engineers, QA engineers, security architects, product managers, and support engineers throughout the entire software development cycle
  • Analyze emerging threats in IoT security, combat threats, and provide the best protection to our customers

White Paper

the whitepaper

The current model of enterprise security is incapable of protecting Industry 4.0 with its intermittently connected, heterogeneous devices and applications, distributed across organizations and geographies. Today’s centralized IT security paradigm needs to be replaced by cybersecurity that is distributed, flexible and adaptive.