Technical Lead, Identity, Access & Platform Security
Remote
Rate: $70/hr on c2c
As a Technical Lead focused on Identity, Access, and Platform Security, you will play a critical role in advancing enterprise security initiatives by leading the technical design and implementation of identity and platform security controls. You will act as the primary technical authority across multiple workstreams, translating security objectives into scalable, practical solutions and ensuring consistent execution across engineering teams.
This role is highly collaborative and hands-on, requiring deep expertise in identity platforms, endpoint/device management, and enterprise security architecture. You will partner closely with cybersecurity, infrastructure, and engineering teams to drive secure, resilient solutions across the organization.
What You Will Do | Key Responsibilities
In this role, you will:
● Serve as the technical lead across multiple security and infrastructure workstreams, providing architecture guidance and implementation oversight
● Translate security strategy and program objectives into technical designs, implementation plans, and engineering deliverables
● Partner with cybersecurity, infrastructure, identity engineering, and endpoint teams to ensure consistent implementation of security controls
● Review and validate technical solutions to ensure alignment with enterprise security standards and architectural principles
Identity & Access Security
● Lead initiatives focused on account security hardening and identity protection across enterprise platforms
● Design and implement Conditional Access policies and identity protection controls
● Mitigate identity-based threats such as password spray attacks and credential abuse
● Support SSO integrations and identity risk management frameworks
Device & Platform Security
● Establish hardware and device management standards across enterprise environments
● Support Apple Business Manager (ABM) enrollment standardization and device lifecycle improvements
● Ensure secure configuration baselines and compliance across endpoints
Monitoring, Detection & Response
● Define and support implementation of monitoring and alerting infrastructure
● Integrate identity and device signals into detection workflows
● Validate monitoring coverage for authentication risks and compliance events
Delivery & Collaboration
● Partner with project and program leadership to track progress, manage risks, and resolve blockers
● Provide technical leadership during design, implementation, and validation phases
● Facilitate alignment across engineering teams, security stakeholders, and enterprise architecture
What You Will Bring | Required Qualifications
The top candidate will have:
● 6–10+ years of experience in enterprise infrastructure, identity engineering, or cybersecurity engineering
● Experience serving as a technical lead or senior engineer on complex, cross-functional initiatives
● Strong knowledge of identity and access management (IAM), including SSO, MFA, and Conditional Access
● Experience implementing enterprise security controls and identity protection strategies
● Familiarity with endpoint/device management platforms and hardware lifecycle practices
● Experience working with security monitoring, detection, and alerting systems
● Strong ability to translate security requirements into scalable technical solutions
● Proven ability to collaborate across cybersecurity, infrastructure, and engineering teams
Preferred Qualifications
● Experience with Microsoft Entra ID / Azure AD, Conditional Access, and Identity Protection
● Experience implementing SSO integrations across enterprise applications
● Familiarity with Apple Business Manager (ABM), MDM solutions, and device enrollment programs
● Experience mitigating credential-based attacks (password spraying, brute force, etc.)
● Knowledge of SIEM/SOAR platforms and security monitoring architectures
● Background in security architecture or platform security engineering
Key Skills
● Identity & Access Management (IAM)
● Conditional Access & Identity Protection
● Enterprise Security Architecture
● Endpoint & Device Management
● SSO & Authentication Security
● Security Monitoring & Alerting
● Cross-Team Technical Leadership
● Risk Identification & Mitigation
Our Values
We’re privileged to serve a loyal customer base and build lasting relationships based on trust and mutual success. Our team delivers exceptional quality and consistency through a
white-glove approach—pairing tailored solutions with practical insight to help clients thrive in an ever-evolving tech landscape.
The values we live by:
● Customer-centric Solutions
● Innovation & Excellence
● Integrity & Transparency
● Data-driven Decision Making