# Ravi Kumar Chiluveru > Principal Software Engineer | IAM Architect | Authentication & Authorization | Application Security, Trust & Privacy Location: Dublin, California, United States Profile: https://flows.cv/ravikumarchiluveru Principal-level software engineer and Identity & Access Management (IAM) architect with 10+ years of experience personally designing, coding, and operating distributed authentication, authorization, and identity platforms at enterprise scale. I am deeply hands-on in core IAM service development—writing production Java code for identity services, authentication flows, token issuance, authorization evaluation, and secure inter-service communication. My work includes designing APIs, data models, persistence layers, and policy engines, and implementing them end-to-end with a strong focus on correctness, performance, and operability. I specialize in building IAM systems based on OAuth 2.0, OpenID Connect, SAML, SCIM, JWT, and MFA (TOTP, SMS, Email), including passwordless and federated authentication. I have implemented centralized authorization services supporting RBAC, ABAC, PBAC, and NGAC, with distributed enforcement, contextual evaluation, policy versioning, and full auditability. I’ve built token systems (one-time and multi-use), identity lifecycle management, and provisioning pipelines aligned with open standards. From an architecture and execution standpoint, I design and code independent, horizontally scalable IAM services—decomposing monoliths, defining service boundaries, handling schema evolution, ensuring backward compatibility, and optimizing hot paths for latency and throughput. I’m hands-on with multi-tenant data modeling, multi-region deployments, vendor abstraction, and failure isolation, and I actively participate in on-call rotations, incident debugging, and production hardening. My leadership style is grounded in technical ownership through code: setting architectural direction by building reference implementations, reviewing critical changes, mentoring engineers through real design and code reviews, and driving adoption through well-designed APIs and shared libraries. I partner closely with Security, Infrastructure, and Product teams to translate risk and compliance requirements into practical, shippable IAM solutions. I care deeply about measurable engineering outcomes—lower authentication latency, predictable authorization behavior, faster developer onboarding, safer deployments, and IAM platforms that are secure by default, observable in production, and evolvable over time. ## Work Experience ### Senior Staff Software Engineer | IAM Platform @ Pebl @ Pebl Jan 2023 – Present Building the IAM platform. * Self service user & company registrations * Employee onboarding * Self Service SSO onboarding. * Policy Based Authorization ### Engineering Leader | Platform Identity Services @ Flexport Jan 2022 – Jan 2023 | San Francisco, California, United States * Building Application IAM platform for Flexport. * Application agnostic User & Customer onboarding. * Customer centric & Customer agnostic Identities. * Configurable Application specific user & customer profiles. * Configurable Authorization policies (Allow & Deny policies) * Aiming towards zero cost development environment. * Migrating from a monolith to small independent services (Gateway, Authentication & Identity Services) * User syncing on SCIM standards with extensible to support sync from non standard applications. * Hired & educated the new talent to build easier IAM for flexport. * Built OIDC SSO from OKTA, Google and any OIDC Provider to flexport. * ≤ 1hr onboarding time for an engineer to start contributing the code. Almost no cost of third party vendor softwares at development stage. * Commit to deploy (10 min) Flow illustration: Github --> Github Actions --> docker image --> Helm chart --> FKE (Equivalent of Amazon EKS). * Auto deploy to staging, and a controlled deploy to Prod. * Metrics from Datadog, logs from Sumologic & Grafana Loki ### Software Engineering Manager @ Workday Jan 2020 – Jan 2022 Building NextGen authorization system. * Setting the technical/product vision to build new centralized authorization configuration & distributed evaluation services. * Leading & Mentoring our development team to build highly scalable & efficient NextGen Authorization System. * Driving the vision towards moving IAM from monolith to independent services. * Driving towards Zero Trust model. * Working on making Authorization easy for all workday applications. * Hiring new talent. ### Principal Software Engineer @ Workday Jan 2019 – Jan 2020 ### Senior Software Engineer @ Workday Jan 2014 – Jan 2019 ### Senior Software Engineer (Architect) @ Confirmit Jan 2006 – Jan 2014 ### Senior Software Engineer @ MarketTools Inc. Jan 2006 – Jan 2012 Product Development: J2EE, (Stripes, IBatis) AJAX, MS-SQL ### Software Engineer @ MarketTools Inc. Jan 2005 – Jan 2006 Product Development: Java, J2EE, Stripes, IBatis, AJAX, MS-SQL, IntelliJ IDEA ### Associate Project Leader @ Pennywise Solutions Pvt Ltd Jan 2004 – Jan 2005 Java Projects Development. Interacting with clients for project requirements. Lead an eight members team. My other roles @ Pennywise... Senior Team Leader from December 2004 to January 2005 Team Leader from September 2004 to November 2004 Programmer from April 2004 to August 2004 ### Cyber Executive @ Convergent Communications (India) Private Limited Jan 2003 – Jan 2004 Wireless network installation Wireless network maintenance Providing wireless network services to hotel guests Resolving internet service issues ### Programmer @ SQb Technologies Jan 2002 – Jan 2003 JAVA Programmer ## Education ### BCA in Computer Science Osmania University ## Contact & Social - LinkedIn: https://linkedin.com/in/ravikumarchiluveru --- Source: https://flows.cv/ravikumarchiluveru JSON Resume: https://flows.cv/ravikumarchiluveru/resume.json Last updated: 2026-04-01