Descripción del puesto
<p style="min-height:1.5em">Our mission is to automate coding. The first step in our journey is to build the best tool for professional programmers, using a combination of inventive research, design, and engineering. Our organization is very flat, and our team is small and talent dense. We particularly like people who are truth-seeking, passionate, and creative. We enjoy spirited debate, crazy ideas, and shipping code.</p><p style="min-height:1.5em"><strong>About the role</strong></p><p style="min-height:1.5em">We're hiring an <strong>Enterprise Platform Engineer</strong> to build the foundational systems that make Cursor ready for the world's largest engineering organizations.</p><p style="min-height:1.5em">Today we have basic organizations, simple IAM primitives, early audit logs, analytics APIs, and admin APIs — but enterprise customers need much more. You will design and build the platform layer that powers organization management, access control, compliance, and administrative tooling across Cursor's product surface. This is a deeply technical IC role focused on building correct, secure, and scalable enterprise infrastructure — not gluing together vendor SDKs.</p><p style="min-height:1.5em"></p><p style="min-height:1.5em"><strong>What you’ll do</strong></p><ul style="min-height:1.5em"><li><p style="min-height:1.5em"><strong>Build and evolve our organization management system</strong> — multi-level org structures, groups, roles, lifecycle, and provisioning via SCIM, so admins can manage thousands of seats without friction.</p></li><li><p style="min-height:1.5em"><strong>Design and implement RBAC</strong> with fine-grained roles, permissions, and resource scopes that cover organizations, teams, agents, and other resources — balancing security with developer ergonomics.</p></li><li><p style="min-height:1.5em"><strong>Extend enterprise settings and policies</strong> — org-wide defaults, security policies (allowed models, MCPs, Tools, network restrictions), and configuration inheritance across different products.</p></li><li><p style="min-height:1.5em"><strong>Deepen our audit logging infrastructure</strong> — comprehensive, queryable, tamper-evident audit trails that satisfy customer-specific compliance requirements.</p></li><li><p style="min-height:1.5em"><strong>Build admin APIs and internal tooling</strong> that enterprise admins, customer success, and sales engineering depend on to manage organizations, investigate access issues, and onboard large accounts.</p></li><li><p style="min-height:1.5em"><strong>Ship compliance features end-to-end</strong> — SSO enforcement, session management, allowlisting, data analytics, and the controls that procurement and security teams require before signing.</p></li><li><p style="min-height:1.5em"><strong>Partner with product, security, and infrastructure teams</strong> to define enterprise platform abstractions that scale across the product without slowing down feature development.</p></li><li><p style="min-height:1.5em"><strong>You will own</strong> organization management, RBAC and authorization, enterprise settings and policies, audit logs, admin APIs, and compliance-related platform features. You will be a technical authority on how Cursor models identity, access, and governance for enterprise customers.</p></li><li><p style="min-height:1.5em"><strong>You will not own</strong> SSO/IdP integration at the protocol level (we use WorkOS) or billing and payments.</p></li><li><p style="min-height:1.5em"><strong>Security and correctness are part of the job</strong>, but the goal is to build systems with enough rigor and observability that enterprise operations are boring — not to manually triage every access control edge case.</p><p style="min-height:1.5em"></p></li></ul><p style="min-height:1.5em"><strong>You may be a fit if</strong></p><ul style="min-height:1.5em"><li><p style="min-height:1.5em">You've built multi-tenant organization or IAM systems in production and have opinions on permission models, role inheritance, and policy evaluation.</p></li><li><p style="min-height:1.5em">You've shipped RBAC or ABAC systems and understand the tradeoffs between flexibility and complexity.</p></li><li><p style="min-height:1.5em">You deeply about correctness in authorization and understand why "fail closed" matters.</p></li><li><p style="min-height:1.5em">You can hold the tension between "ship enterprise features fast" and "do not create security gaps or break existing access patterns."</p></li><li><p style="min-height:1.5em">You feel comfortable shipping features end-to-end — from database schema and API design to admin UI and documentation.</p></li></ul><p style="min-height:1.5em">#LI-DNI</p>