
I led the redesign of Lever’s permissions system, introducing Custom Roles — a flexible, scalable RBAC framework that balanced simplicity for small teams with control for enterprises. This foundation preserved $2.4M in ARR, enabled $1.2M in retention revenue, and shifted Lever’s market perception from “not secure enough” to “enterprise-grade.”
Focus: Enterprise Trust, Security, and Scale
Lever is an Applicant Tracking System (ATS) that manages sourcing, interviewing, and hiring workflows. As enterprise customers scaled, their permission needs outgrew Lever’s static five-role model. Admins over-granted Super Admin access to bypass roadblocks, exposing sensitive data and overloading support.
Support teams were inundated with permission-related tickets, and 32 enterprise customers (~$2.4M ACV) flagged permissions complexity as a renewal blocker. Internally, Product, CS, Security, and Sales all held conflicting definitions of what a “role” meant — leading to fragmentation in scope and accountability.
Admins couldn’t answer two basic questions: Who has access to what? and Which role is appropriate? That uncertainty wasn’t a nuisance; for enterprise accounts, it was the difference between renewal and churn. Our customer message was clear: ‘Make this trustworthy and operable at scale, or we leave.
I led the full design lifecycle: permissions audit, customer interviews, competitive analysis, UI design, testing, and rollout. I also facilitated cross-functional workshops with CS, Security, Product, Sales, and Legal to align roadmap and governance. Design deliverables established patterns for HRIS sync, audit logs, and region-based access governance.
Lever’s static role model limited flexibility and created organizational risk.Admins were over-permissioning to avoid friction — giving unintended data visibility across hiring teams. The permissions design was built for small teams, but our customers now had thousands of seats across regions and business units.
Reality: Only 5 rigid roles → access inflation → auditors unhappy.
Enterprise customers equate control with trust. By giving admins precise yet intuitive access management, Lever could increase retention, reduce support burden, and confidently compete in enterprise procurement cycles.
Design a scalable, self-serve permissions experience that balanced simplicity for SMBs and configurability for enterprise teams — reducing support overhead and strengthening customer trust. Our primary persona for this set of work was the enterprise recruiting admin responsible for permissions for hundreds of users. Their job is compliance-critical: the wrong access means exposure of candidate PII, broken approvals, or failed audits.

Reviewed permissions data, support tickets, and admin workflows.Interviewed 10 enterprise customers and mapped 22 real job titles to tasks and pain points.
“I have no idea what this person can actually do with the access I’m giving them.” and “It’s too risky to tweak permissions because I don’t want to break anything.”
I led cross-functional workshops with Product, CS, Sales, and Implementations to align on MVP scope, domain boundaries, and a shared risk language. We codified role definitions and permission groupings so support, sales, and product told the same story. This also produced the first consistently used persona set inside product.
Benchmarked against Greenhouse, Workday, and ICIMs. Partnered with Engineering to identify technical debt and enforcement constraints.
This was a configuration issue and a trust problem. Customers wanted autonomy without complexity; internal teams needed guardrails and shared definitions.
From there, I combined customer research with internal discovery to identify consistent failure modes:
I structured the redesign into five connected workstreams:
The MVP delivered a self-serve permissions hub embedded in org settings, combining enterprise-grade configurability with admin simplicity.



The new permissions framework elevated Lever’s enterprise credibility, reduced dependency on support, and created a scalable foundation for audit logging, HRIS provisioning, and region-based access governance.

Redesigned Credible’s pre-approval dashboard to make homebuying clearer and more personal.

Designed Amplitude’s first Anomaly Detection and Forecasting feature — transforming how 800+ customer teams interpret product metrics.