Job Title: IAM PAM Program Consultant Location: Remote Duration: 12 Months Interview: Video Screening Required
Job Summary:
Seeking an experienced PAM Technical Program Management Consultant to lead delivery of enterprise Privileged Access Management (PAM) initiatives. This role will drive cross-functional execution across cybersecurity, infrastructure, and IAM teams to implement and operationalize PAM solutions, ensuring production readiness and successful rollout.
Key Responsibilities:
Lead end-to-end program delivery for PAM initiatives across security, infrastructure, and engineering teams
Manage deployment and production readiness of Delinea Server Suite and enterprise PAM platform capabilities
Coordinate dependencies including environment readiness, validation/testing, firewall/network access, and cutover planning
Build and maintain integrated project plans, RAID logs, milestone tracking, and executive status reporting
Facilitate stakeholder meetings, technical working sessions, and governance reviews
Drive JIT provisioning and privileged access strategy aligned with SailPoint and Okta integrations
Develop rollout, communication, and adoption plans for PAM capabilities
Support transition of legacy PIM processes into modern PAM frameworks
Required Qualifications:
5+ years of technical program/project management experience in Cybersecurity, IAM/PAM, or Infrastructure Security
Strong understanding of PAM concepts: privileged elevation, credential vaulting, password rotation, session management, and Just-in-Time (JIT) access
Experience managing cross-functional teams including IAM, Active Directory, Unix/Linux, Network, and Security teams
Hands-on familiarity with Delinea (preferred), including Server Suite implementations
Experience with SailPoint and Okta integrations
Strong expertise in project planning, RAID management, and executive reporting
Excellent communication, stakeholder management, and problem-solving skills
Preferred:
Experience in regulated environments (financial services preferred)
Security certifications such as CISSP, CISM, or CISA