IAM ENGINEER Engineer, Identity & Access Management, will be responsible for managing the end-to-end Identity Management and access experience across the Enterprise. Specific job duties will continue to include the following:
Supports IAM initiatives with gathering identity and access management requirements, review of configurations and system settings, documenting standards and procedures, and helping manage various identity and access management tasks
Develop, implement, and maintain identity and access management solutions and systems
Troubleshoot, identify, and resolve technical identity and access management related issues.
Provide expert knowledge of identity and access management security design and best practices for operational technical and project support
Ensuring new Single Sign-On integrations are adequately tested and integrated with infrastructure and application services
Coordinating with IT and business stakeholders regarding technical, process and environment related requests for the IAM environment
Managing escalations, issues or high-priority tasks that are escalated to the IAM team from business and IT teams
Providing expert troubleshooting of access related issues
Working with users and developers to analyze requirements of software applications to bring them into request process, IAM, and certification campaigns
Coordinate audit-related tasks such as ensuring the readiness of IT managers and their departments for audit testing and facilitating the timely resolution of any audit findings
Technical Skills Required
Knowledge of one or more auth protocols/specifications: OAuth2, OIDC, SAML, WS-FED, LDAP, etc.
Experience with SCIM and JIT provisioning, OAG, header-based apps, SpringBoot
Experience with a popular frontend stack (e.g., React, Angular)
Experience with identity management, IDAAS, provisioning, user lifecycle operations, federation, and on-premises integrations
Experience with Enterprise Provisioning, external and internal federation, systems integration
Experience with implementing capabilities across multiple channels (web browser, mobile application, etc.)
3 to 5 years of experience in Identity Access Management
Experience integrating multiple IdPs using SAML
Understanding of legacy authentication methods such as Kerberos and Header authentication
Experience making API calls to the Okta API or another Identity Provider API.
Extensive knowledge and experience with identity and access management technology, such as single sign-on (SSO), two-factor authentication, privileged access management, etc.
Extensive hands-on knowledge of identity and access management best practices procedures, and software solutions such as Okta, Sailpoint, etc. preferably Okta Administrator Certified
Experience with one or more programming languages such as Java, Python or JavaScript, HTML, CSS and PHP
Experience with Windows, Linux / Unix, scripting (Bash, PowerShell, or Perl), SQL, and web services