IAM Operations Consultant ((Ping Identity & SailPoint)) || Plano, TX (Hybrid) || Fulltime || Remote

Plano, TX, US • Posted 1 hour ago • Updated 1 hour ago
Full Time
75% Travel Required
On-site
Depends on Experience
Fitment

Dice Job Match Score™

🔗 Matching skills to job...

Job Details

Skills

  • Ping Identity
  • SailPoint
  • IAM

Summary

Role:  IAM Operations Consultant (Ping Identity & SailPoint)
Location: Plano, TX (Hybrid)
Fulltime 
 
Role Summary:
Key Responsibilities:
Service Operations:
- Own day-to-day operations for Ping Identity and SailPoint platforms, ensuring availability, performance, and security SLAs.
- Proactively monitor platform health, perform routine checks, capacity planning, backups, and schedule/execute maintenance, patching, and upgrades.
- Triage and resolve incidents, service requests, and problems; lead root cause analysis and implement permanent fixes.
- Execute changes via CAB with clear runbooks, rollback plans, impact/risk assessments, and post-implementation reviews.
- Maintain accurate runbooks, SOPs, diagrams, and operational documentation aligned to audit standards.
 
Ping Identity (SSO, MFA, Federation):
- Administer PingFederate, PingAccess, PingDirectory, and PingID/PingOne (as applicable).
- Onboard and maintain OIDC/SAML integrations: configure IdP/SP connections, manage metadata, certificates, and key rotation.
- Implement and tune MFA, adaptive policies, device trust, and conditional access.
- Manage authentication policies, token lifecycles, attribute mapping, session management, and header-based access.
- Promote configurations across environments; troubleshoot SSO issues end-to-end with application teams.
- Ensure standards alignment and secure integration patterns for SAML 2.0, OIDC, and OAuth 2.0.
 
SailPoint Identity Governance & Administration:
- Operate SailPoint platforms: IdentityIQ and/or IdentityNow (Identity Security Cloud), including task scheduling, health checks, and upgrades.
- Application onboarding and connector operations (e.g., AD/Entra ID, LDAP, Azure, Workday/SuccessFactors, ServiceNow, SAP, Oracle, databases, SaaS apps).
- Manage identity lifecycle (joiner-mover-leaver), account aggregation, correlation, transforms/mappings, roles/access profiles, and policies.
- Administer and support access request workflows, approval policies, birthright/access modeling, and role mining (as applicable).
- Run access certification campaigns (setup, scheduling, execution, attestation evidence, remediation tracking).
- Maintain and tune provisioning policies, entitlements, SoD policies/violations, and exception handling.
- Troubleshoot provisioning and aggregation failures, queue backlogs, connector errors, rules, and workflow issues.
- Develop and support SailPoint rules/workflows and automation:
  - IdentityIQ: BeanShell/Java rules, lifecycle manager workflows, task definitions, plugin/config promotion.
  - IdentityNow: sources, transforms, rules, lifecycle events, connectors, sp-config export/import, REST APIs.
- Perform data quality checks, identity refreshes, cleanup jobs, and optimize performance and indexing.
 
Security, Compliance, and Governance:
- Enforce least privilege, SoD, and Zero Trust-aligned controls across SSO and IGA.
- Integrate logs with SIEM for monitoring, alerting, and anomaly detection; define operational thresholds and playbooks.
- Support audits (SOX/PCI/ISO/other): produce evidence, enable control testing, and remediate findings.
- Manage certificate, key, and secret lifecycles and ensure secure configuration baselines.
 
Automation and Continuous Improvement:
- Automate routine tasks (app onboarding, cert renewals, config backups, campaign setups, rotation checks) using platform APIs and scripts.
- Implement configuration-as-code and environment promotion where supported (Ping and SailPoint).
- Define operational KPIs, measure performance, and drive improvements to reduce toil and improve reliability.
- Partner with engineering/architecture to deliver enhancements without operational risk.
 
Stakeholder Management:
- Collaborate with application owners, security, infra, HRIS, and compliance teams to plan changes and onboard services.
- Provide consultative guidance on integration patterns, controls, and IAM best practices.
- Communicate incident status, risks, and service health to both technical and non-technical stakeholders.
 
Required Qualifications:
- 5–8 years in IAM operations/engineering with production ownership.
- 3+ years administering Ping Identity (PingFederate, PingAccess, PingDirectory, PingID/PingOne).
- 3+ years operating SailPoint (IdentityIQ and/or IdentityNow) in enterprise environments.
- Strong grasp of SAML 2.0, OIDC, OAuth 2.0, JWT, token policies, and certificate management.
- Experience with identity lifecycle, provisioning, access requests, and certification campaigns.
- Windows/Linux administration, networking (DNS, TLS, proxies, load balancers), and directory services (AD/LDAP).
- Scripting and APIs: PowerShell and either Python or Java; experience with REST/JSON. For IdentityIQ, BeanShell/Java; for IdentityNow, transforms and rules.
- Experience with ITSM (e.g., ServiceNow), SIEM (e.g., Splunk), and monitoring (e.g., Datadog, Prometheus).
- Solid understanding of ITIL processes and enterprise security practices.
 
Preferred Qualifications:
- Ping Identity certifications (PingFederate, PingAccess) and SailPoint certifications (IdentityIQ/IdentityNow).
- Experience with SailPoint sp-config, plugin management (IIQ), connector tuning, and performance optimization.
- Knowledge of Azure AD/Entra ID, AWS IAM, Google Cloud Platform IAM; SCIM provisioning and JIT patterns.
- Exposure to CI/CD for IAM configs, Git-based versioning, and pipeline-driven deployments.
- Familiarity with compliance frameworks (SOX, PCI-DSS, ISO 27001) and evidence management.
- Experience integrating HR sources (Workday/SuccessFactors) and ERP apps (SAP/Oracle).
 
Key Technologies:
- Ping Identity: PingFederate, PingAccess, PingDirectory, PingID/PingOne, certificates/keystores.
- SailPoint: IdentityIQ, IdentityNow (Identity Security Cloud), rules/workflows, connectors, transforms, sp-config, REST APIs.
- Supporting: Active Directory/LDAP/Entra ID, HRIS (Workday/SuccessFactors), ServiceNow, SIEM, reverse proxies/load balancers, Git, scripting tools.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10528425
  • Position Id: 37053-4801-
  • Posted 1 hour ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Plano, Texas

Today

Easy Apply

Full-time

$100,000 - $120,000

Plano, Texas

Today

Full-time

McKinney, Texas

Today

Easy Apply

Full-time

Competitive

Plano, Texas

9d ago

Third Party, Contract

Depends on Experience

Search all similar jobs