Cybersecurity IAM Engineer tasked with securing identities across various platforms. Implementing and maintaining IAM solutions to support Zero Trust and secure operations.
Responsibilities
Design, implement, and maintain IAM solutions across Okta, Azure AD, Active Directory, and AWS IAM
Integrate and manage SSO and MFA for cloud and on-prem applications using SAML, OAuth, WS-Federation, and SCIM
Automate identity workflows, group assignments, access revocations, and certification campaigns using tools like PowerShell, Python, or Okta Workflows
Enforce access controls aligned to Zero Trust, RBAC, and JML (Joiner-Mover-Leaver) lifecycle policies
Harden IAM configurations in hybrid environments (e.g., password policies, conditional access, privileged account handling)
Participate in the evaluation and integration of IAM-related technologies and security enhancements
Collaborate with IT, cloud, HRIS, and security engineering teams to embed identity governance in enterprise systems
Assist with privileged access management (PAM), identity federation design, and directory service integrations
Support audit and compliance efforts by maintaining evidence, resolving control gaps, and improving access visibility
Other duties as assigned by organization leadership
Requirements
Possess strong communications and interpersonal skills in English
Self-directed, organized, and able to manage multiple priorities
Strong ability to work collaboratively with others, to influence based on knowledge and experience
Strong experience with identity platforms: Okta, Azure AD, Active Directory, AWS IAM
Hands-on knowledge of authentication standards: SAML, OAuth, OIDC, WS-Federation
Proficiency in scripting or automation (e.g., PowerShell, Python, Bash)
Experience with identity lifecycle automation, group policy management, and access governance tooling
Working knowledge of federated identity, MFA, conditional access, and directory sync processes
Familiarity with IAM-related components of frameworks like NIST CSF, ISO 27001, and CIS Controls
Certifications: Okta, Azure, CompTIA Security+, or similar
Experience with identity governance platforms
Familiarity with compliance frameworks such as NIST CSF, ISO 27001, CIS Controls, or SOX
Experience with identity governance platforms and PAM solutions
Familiarity with AI or LLM tooling for identity analytics, automation, or anomaly detection
Benefits
Build identity security controls at global scale for a diversified energy and technology leader
Be part of a security team driving Zero Trust transformation across IT and OT
Use modern IAM platforms with the freedom to innovate and automate
Entry - Level Software Security Engineer at Tektronix focusing on secure product development and automation scripting. Collaborating with engineers to maintain cybersecurity best practices and standards.
Senior Cybersecurity Engineer at GM Financial designing scalable security capabilities to mitigate threats. Collaborating across teams and leveraging automation for enhanced security measures.
Senior Security Implementation Consultant responsible for implementing security controls in HPC environments. Working with teams on PKI, PAM, IAM, and infrastructure security solutions.
Lead Security Architect at Synchrony focusing on Zero Trust networking across various environments. Partnering with teams to design and implement secure connectivity and policies.
Enterprise Account Specialist engaging with key clients to design customized solutions within sales. Conducting market research and driving contract renewals for mid - to - large accounts.
Cybersecurity professional executing the cybersecurity program at Nightwing Intelligence Solutions. Responsible for RMF documentation, vulnerability assessments, and incident response in Sterling, VA.
Senior Network Security Engineer driving Zero Trust security fabric design and optimization at CRC Group. Hands - on role managing Zscaler and Palo Alto implementations across multi - cloud environments.
Lead Cybersecurity Engineer driving security testing automation at AT&T. Collaborating with teams to enhance security across telecom networks and systems.