IDM Engineer

  • Job ID:

  • Pay rate range:

    $50 - $60
  • City:

  • State:

  • Duration:

    09/25/2022 - 03/25/2023
  • Job Type:

    Contract to Hire
  • Job Description

    IDM Engineer

    Pay: $50 - $60 w2

    Contract Length:  6 months contract to hire full time 

    Location: remote


    • Member of IDM analysts in the completion of provisioning/de-provisioning of access request, project request/support, and security initiatives.  
    • Act as the subject matter expert in the identity and access management domain. Contribute to the development of the client's enterprise identity and access management strategy.
    • Ensures completion of day-to-day IAM support activities, including troubleshooting, customer service issues, escalations, incident handling, and privileged access requests.
    • Responsible for the monitoring, measuring, performance, availability, security, recovery, and throughput of IAM services.
    • Have a comprehensive, in-depth understanding of complex and highly technical Identity & Access Management concepts and principles of Cybersecurity. 
    • Define and document functional and technical requirements for integrating new or existing IAM platforms including provisioning, de-provisioning and integration of applications for authentication
    • Interacts with other client's IT leaders to execute, advise, plan, build, test, and implement improvements of IAM operational maturity, services, and solutions.
    • Ensures IAM service compliance with information security policies, standards, procedures, and IT controls. 
    • Ensure that the documentation and evidence of security requests comply with Sarbanes-Oxley compliance requirements, controls, and client's policies.
    • Make strategic architectural recommendations related to technology direction and standards for logical access security.
    • Provide technical support for stakeholders to integrate with applications. 
    • Be the internal expert using selected IDM solutions/tools, stay current on new technology & capabilities, assess functionality for consideration of implementation.
    • Collaborate to develop and/or maintain the code for authentication service and utility libraries that integrate with the web and API applications.
    • Partner with application development teams to integrate with authentication service and implement best practices for authentication and authorization requirements for internal and external applications.
    • Diagnose and troubleshoot solution integration issues with application development teams during various SDLC phases including development, testing, UAT.
    • Collaborate with Solutions Architects, Application Development, Cybersecurity, and Infrastructure to define the enterprise IAM strategy and communicate it to all application development teams.
    • Develop artifacts that depict design components, how they are invoked, and how they exchange data to form the composite solution.
    • Collaborate with Enterprise Architecture (AB), application development teams and Architecture Review Board (ARB) members to develop and refine application designs prior to presenting to the ARB.
    • Adapt the architecture to evolving security conditions and support security guidelines.
    • Develop security standards and participate in the SDLC process.
    • Good working knowledge of a broad range of standards and frameworks — for example, NIST Cybersecurity Framework, International Standards Organization (ISO) 27001, IT Infrastructure Library and ISO 20000, Capability Maturity Model Integration and Six Sigma, etc. and relation application or controls


    • 7+years of IT experience, with a minimum of 5 years with a logical access security focus and at least
    • Bachelor’s degree in Business, Information Systems, or related field of academic study.
    • 3+ years’ experience using one or more identity and access management tools. (e.g. ISIM, Okta, Ping, Onelogin, Centrify, Auth0, AWS Cognito, FIM, CyberArk, SailPoint, Oracle Identity Manager).
    • 3+ years’ experience using one or more privilege identity and access management tools. (e.g. CyberArk, Thyotic, etc.).
    • Broad working knowledge of NIST Cybersecurity Framework, International Standards Organization (ISO) 27001 and 27002, and overall best business practices associated with IT Security.
    • Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
    • Strong analytical skills to analyze security requirements and relate them to appropriate security controls.
    • An understanding of operating system internals and network protocols.




Add Reference


Find and apply to jobs on the go

Take our free app with you anywhere. Enter your phone number and we’ll send you the download link.

  • +1


Client Registration Request