Overview
Skills
Job Details
Role: Identity & Access Management (IAM) Engineer
Duration: 6 Months (Contract)
Location: (Remote)
Visa : H1, EAD.
Job Description: Identity & Access Management (IAM-Engineer) - Managed Service
Position Summary
The IAM Engineer will serve as a technical leader for the State's enterprise identity and access management (IAM) program. This role is responsible for managing hybrid identity environments, ensuring secure integration between on-premises Active Directory, Azure Entra ID P2, and the Workday ERP platform. The position requires deep technical expertise in IAM technologies, the ability to align security operations with NIST CSF 2.0 and NIST SP 800-53 (Moderate) controls, and experience supporting a zero-trust identity strategy.
The IAM Engineer will play a critical role in securing citizen and workforce data, supporting compliance with state and federal mandates, and enabling secure digital government services.
Key Responsibilities
Identity & Access Management Operations
- Administer, secure, and optimize Active Directory forests/domains, including OU structure, GPOs, and replication.
- Implement and manage Azure Entra ID P2 features, including Conditional Access, Privileged Identity Management (PIM), and lifecycle synchronization via AD Connect/Azure Private Access.
- Integrate and secure SaaS applications (e.g., Workday ERP) for SSO using SAML/OAuth federation with Entra ID.
- Maintain least privilege access models across platforms; define and implement RBACs and enforce separation of duties.
- Support password management, MFA, self-reset, and certificate-based authentication solutions.
Security & Compliance Alignment
- Ensure IAM controls meet NIST 800-53 AC, IA, and AU control families and other state/federal compliance frameworks.
- Conduct access reviews, lifecycle audits, and produce evidence for compliance reporting.
- Monitor and audit IAM logs for anomalies to aid in performance issue resolution.
- Participate in security incident response, providing IAM-specific support.
IAM Architecture & Modernization
- Contribute to the State's Zero Trust Architecture (ZTA) strategy, with IAM as a cornerstone.
- Evaluate and implement emerging IAM technologies (password-less auth, risk-based authentication, and advanced conditional access policies).
- Collaborate with enterprise stakeholders and technical leads to ensure IAM integration with ERP and cloud modernization projects.
Governance & Leadership
- Mentor junior operations colleagues on zero trust principles, risk-based authentication, and IAM best practices.
- Act as a subject matter expert for IAM during audits, compliance reviews, and legislative inquiries.
- Partner with agency focused support teams to design secure access aligned with operational needs.
- Provide input to IAM-related policies, procedures, and standards.
Qualifications
Required
- Bachelor's degree in information technology, Cybersecurity, or related field, or equivalent experience.
- 5+ years of IT experience with at least 4 years in IAM engineering/administration.
- Strong expertise in Active Directory administration, LDAP, OU/GPO design, and AD hardening.
- Proven experience with Azure Entra ID P2, Conditional Access, MFA, and PIM.
- Demonstrated knowledge of SAML/OAuth federation and SaaS integrations (Workday strongly preferred).
- Familiarity with NIST CSF 2.0 and NIST SP 800-53 moderate baseline; ability to map IAM controls to compliance requirements.
- Strong scripting/automation skills (e.g., PowerShell, Python).
Preferred
- Experience in a public sector or regulated environment (FedRAMP, IRS 1075, MARS-E).
- Knowledge of Zero Trust Architecture frameworks (DoD ZTA, NIST SP 800-207).
- Certifications: Microsoft Identity & Access Administrator Associate, CISSP, CISM, or equivalent.
- Experience supporting ERP systems (Workday, PeopleSoft, Oracle HCM) from an IAM perspective.
Core Competencies
- Strong problem-solving and analytical skills in complex IAM environments.
- Ability to translate compliance requirements into technical controls.
- Excellent communication skills with both technical and non-technical stakeholders.
- Demonstrated leadership in mentoring and guiding junior staff.
- Balance of operational hands-on skills with strategic architecture awareness.