Identity and Access Management (IAM) Engineer

Job Title: Identity and Access Management (IAM) Engineer

Location: [Remote]
Job Type: [Contract]
Department: Cybersecurity / Information Security
Reports To: IAM Manager


Job Summary:

We are seeking a seasoned Identity and Access Management (IAM) Consultant to drive the development and optimization of secure, scalable IAM solutions. This role requires a balance of technical expertise and strong business acumen, as the consultant will work closely with business units and application owners to understand identity needs, map user roles to appropriate groups, and ensure proper access provisioning, deprovisioning, and review processes are in place.


Key Responsibilities:

  • Design and implement IAM frameworks, policies, and procedures aligned with best practices (NIST, ISO 27001, Zero Trust).
  • Collaborate with business stakeholders, application owners, and IT teams to understand identity integration requirements and ensure role-based access alignment.
  • Analyse application access models to map user roles to appropriate groups, entitlements, and permissions.
  • Lead efforts around user provisioning and deprovisioning processes, ensuring automation and consistency across systems.
  • Coordinate and perform periodic access certifications, entitlement reviews, and segregation of duties (SoD) checks.
  • Integrate and support IAM tools and platforms (e.g., Okta, SailPoint, CyberArk, Microsoft Entra ID, Ping Identity).
  • Implement and manage identity lifecycle processes: joiner, mover, leaver.
  • Deploy and maintain authentication and authorization technologies (MFA, SSO, PAM).
  • Conduct risk assessments, audit support, and remediation planning for access control gaps.
  • Support regulatory compliance (e.g., SOX, HIPAA, GDPR) with documentation and control enforcement.
  • Recommend and drive improvements in IAM architecture and process maturity across cloud and on-prem environments.

Required Qualifications:

  • Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience).
  • 5+ years in cybersecurity, with 3+ years focused on IAM architecture and operations.
  • Proven experience in working with business and application stakeholders to gather identity and access requirements.
  • Deep understanding of IAM concepts, including RBAC, ABAC, SAML, OAuth2, SCIM, OpenID Connect, MFA, and SSO.
  • Hands-on experience with tools like Okta, SailPoint, Azure AD, Ping Identity, or CyberArk.
  • Knowledge of directory services (Active Directory, LDAP) and cloud IAM (AWS, Azure, GCP).
  • Experience conducting access reviews, certifications, and supporting audits.

Preferred Qualifications:

  • Professional certifications: CISSP, CISM, Okta Certified Consultant, SailPoint IdentityNow, Microsoft Certified: Security, Compliance, and Identity Fundamentals, etc.
  • Experience with scripting languages (PowerShell, Python) for IAM automation.
  • Familiarity with compliance frameworks: NIST 800-63, SOX, HIPAA, GDPR.
  • Exposure to DevSecOps and securing access in modern app architectures (microservices, APIs).

Soft Skills:

  • Strong communication and business engagement skills.
  • Analytical mindset with attention to detail.
  • Ability to lead projects and mentor junior staff.

 

Job Category: Engineer
Job Type: Contract
Job Location: Remote

Apply for this position

Allowed Type(s): .pdf, .doc, .docx
Scroll to Top

Level 4: Cyber Security Incident Response Process (CSIRP)

At the SOC’s most advanced level are managers and chief officers and they will be more engaged and execute this process. This group oversees all SOC team activities and is responsible for hiring and training, plus evaluating individual and overall performance. Level 4's step in during crises, and, specifically, serve as the liaison between the Security team and the rest of the organization. They are also responsible for ensuring compliance with organization, industry and government regulations.

Level 3: Proactive security operations

The security managers are informed and specialist crew are involved and begin moving from reactive to proactive security actions. Personnel are likely expert security analysts who are actively searching for vulnerabilities within the network and hunting for threats. They will use advanced threat detection tools to diagnose weaknesses and make recommendations for overall security improvement. Within this group, you might also find specialists, such as forensic investigators, compliance auditors or cybersecurity analysts. They will decide to escalate Level 4.

Level 2: Cyber Incident Remediation

These personnel can quickly get to the root of the problem and assess which part of your infrastructure is an issue or at risk. They will follow a well defined playbook process and makes decision to remediate the problem based on knowledge of the issue and environments. They will flag certain issues for additional investigation outside of the incident response protocol and when to escalate to Level 3.

Level 1: First responders

The first line of incident responders are group of security analysts who will be eyes on glass 24x7 and watch for alerts. They are primarily tasked to look at the urgency of an alert, can it be solved within their confines which is automated playbook / orchestration or follow up on established playbooks. Based on the above they play a role to escalate to Level 2. They are also responsible to run statistics and SOC reports for review. Behavioral analytics and AI based beta models are adopted for advanced needs to act as L1.