I led a 6-month overhaul of Lever’s Role-Based Access Control (RBAC) system, addressing a high-priority need from 32 customers representing $2.4M in ACV, and delivered a scalable solution that unlocked $1.2M in revenue retention, achieved 75% customer adoption, and drove a 57% lift in retention across previously at-risk accounts.
Lever is an applicant tracking system (ATS) and talent acquisition suite designed to help companies streamline their hiring process. It enables teams to source, nurture, interview, and hire candidates in one collaborative platform. With built-in CRM capabilities, Lever also helps companies build strong talent pipelines and improve long-term candidate engagement.
Role-based access control (RBAC) defines what users can see and do in a platform based on their assigned roles. Lever's original permissions model offered five predefined roles, with no flexibility. This worked for smaller teams, but as customers scaled, so did the complexity of their hiring operations. The system couldn't account for nuanced responsibilities across coordinators, hiring managers, and recruiting partners.
To bypass blockers, customers routinely assigned users Super Admin access, exposing sensitive data like compensation, interview feedback, and secret notes. This wasn't just a security concern, it was causing real workflow friction, trust breakdowns, and escalating support tickets across mid-market and enterprise accounts. This redesign aimed to modernize and scale Lever's permissions systems, moving from rigid roles to a flexible, admin-controlled model that could adapt to teams of any size or structure.
This work led to a custom permissions portal that gave platform admins—typically IT team members—full control to add, manage, or remove user permissions. It provided a 360° view of all assigned roles and their associated permissions, eliminating ambiguity and confusion around who had access to what.
By Q1 FY22, Lever had logged 32 permission-related tickets tied to blocked workflows, over-permissioning, and role confusion, impacting $2.4M in at-risk revenue. Support teams were overwhelmed, and enterprise customers were losing confidence in Lever’s ability to scale with them.
I led this initiative end-to-end, shaping both the strategic direction and execution. My process included:
Research made it clear this wasn’t just a technical gap, it was a trust issue. We interviewed 10 customers and mapped 22 unique job titles to real-world tasks. Existing roles didn’t reflect how teams actually worked. Coordinators were being given admin access to unblock scheduling. Hiring managers had visibility into sensitive notes meant only for recruiters.
We kicked off with a series of cross-functional interviews—support, CX, implementation specialists, and existing admins. Across the board, we heard variations of the same pain points you'll see highlighted here.
These insights led us to map core use cases and personas, from small hiring teams to global recruiting operations, and begin modeling how our permissions system would need to evolve to serve all of them. Customers wanted control, but not complexity. They needed flexible role configuration without turning into full-time system admins. At the same time, internal teams needed clearer boundaries to prevent escalation loops and workflow hacks.
Competitive analysis showed that enterprise buyers were gravitating toward platforms with granular access control. But those platforms often sacrificed usability. We saw a clear opportunity: build a system that gave teams precision and clarity, without increasing friction.
Sometimes the most robust, high-impact work results in just a handful of screens, but that doesn’t make it any less meaningful. In this project, the real value came from bringing clarity and structure to a deeply complex, systemic issue within Lever’s software—shaping how the platform scales for teams of all sizes.
We delivered a scalable, self-serve management portal embedded directly into org settings, empowering admins to manage user access without relying on support or engineering.
The new permissions hub provided full visibility and control through a centralized, intuitive interface. Admins could view all users, assign or revoke roles, and adjust access case-by-case. It preserved Lever's simplicity while unlocking the configurability enterprise teams needed. In the future, roles will be auto-provisioned through the HRIS, and the permissions hub will serve as an optional space for edits or visibility, no longer a required step for updating org changes to user access.
The launch of custom roles played a pivotal role in preserving $2.4M in contract value and contributed $1.2M in retention revenue by resolving a key blocker for large-scale customers. Within three quarters, the feature achieved a 75% adoption rate, validating its alignment with customer expectations around control and configurability.
Just as important, this work shifted how Lever was perceived in competitive evaluations. We went from “not secure enough” to being considered a scalable, enterprise-ready platform, especially in late-stage deals involving procurement, security, and IT review.
It also gave internal teams a foundation to move faster: product, legal, and customer success could now rely on a consistent permissions framework, reducing cross-team ambiguity and setting the stage for advanced functionality like audit logging, HRIS sync, and region-based access governance.
This project reinforced that access control isn’t just a technical problem — it’s a product trust problem. Designing for flexibility meant deeply understanding both user behavior and long-term system complexity. Success wasn’t just measured by adoption or retention, but by how invisible the friction became.
It also marked a shift in how I approach platform work: moving from feature delivery to infrastructure thinking. I wasn’t just solving today’s ask — I was setting up the conditions for Lever to scale with confidence across regions, roles, and regulations.
Designed Lever’s first self-serve GDPR portal to help customers manage privacy compliance at scale. This work addressed legal risk, reduced support load, and drove $1–2M in retention revenue by making complex data policies actionable and transparent.