Role Summary
The IAM Integration Engineer is responsible for designing, developing, and delivering robust integrations that support the secure onboarding and lifecycle management of connected applications within the enterprise Identity and Access Management (IAM) ecosystem. This role requires deep hands‑on experience with IIQ connector engineering, aggregation pipelines, provisioning workflows, plugin/rule development, and enterprise‑grade data transformations supporting onboarding automation. You will collaborate closely with IAM engineering, IAM integration team, application teams, and security/compliance stakeholders to deliver high‑quality, audit‑ready identity services that meet enterprise regulatory and operational standards.
Key Responsibilities
1. Identity Integration & Connector Engineering
- Develop and maintain integration components across IAM/IGA platforms, with current emphasis on SailPoint IdentityIQ.
- Build and tune aggregation connectors, including REST, SOAP, JDBC, AD/LDAP, and custom connector patterns.
- Implement schema discovery, entitlement modeling, correlation logic, and provisioning policies to ensure accurate identity lifecycle operations.
- Develop secure, reusable Java-based components—including rules, plugins, workflows, and JAR modules—leveraging SailPoint’s object model and best‑practice coding standards..
- Drive connector enhancements, refactors, defect resolution, and performance optimization.
- Design onboarding patterns for new application integrations, including standardized templates for schemas, correlation, provisioning, and entitlement modeling.
- Implement connector-level error handling, retry logic, and reconciliation tuning to ensure reliability and auditability of identity operations.
- Develop extensible integration frameworks that support future connectors, custom endpoints, and reusable provisioning logic.
2. Data Engineering & Transformation
- Build and maintain robust identity data flows across SQL Server and/or Oracle environments.
- Develop schema mapping logic, attribute transformation routines, and normalization rules for account, entitlement, and role data.
- Troubleshoot data integrity issues, reconcile inconsistencies, and ensure completeness/accuracy of identity data sources.
3. Application Onboarding Automation
- Engineer onboarding automation frameworks supporting metadata ingestion, entitlement cataloging, user‑to‑entitlement assignments, and lifecycle management.
- Build bulk-data workflows with rollback, validation, tracking, and audit evidence.
- Create standardized onboarding templates, scripts, and validation utilities to accelerate application integration efficiency.
4. CI/CD & Environment Promotion
- Implement Git‑driven workflows for version control, code review, and artifact promotion across DEV, IT, UAT, and PROD environments.
- Package, test, and deploy rulesets, workflows, and integration modules using standardized release governance.
- Maintain environment configuration parity and support deployment verification during go‑live.
5. Testing & Quality Assurance
- Write and execute unit tests, system integration tests (SIT), user acceptance tests (UAT), and production validation tests.
- Conduct root‑cause analysis for defects and coordinate with development, operations, and application teams for remediation.
- Ensure integration changes adhere to enterprise quality, reliability, and security expectations.
6. IAM Security, Governance & Compliance
- Apply IAM governance principles including Segregation of Duties (SoD), auditability, certification processes, and evidence capture.
- Ensure integrations meet SOX, SOC, internal audit, and enterprise security standards.
- Create documentation supporting audit readiness—design documents, test evidence, deployment runbooks, and compliance mappings.
7. Collaboration & Technical Leadership
- Partner with application owners, IAM engineering teams, security architects, and platform admins to design scalable integration solutions.
- Translate requirements into technical designs and provide guidance on integration patterns and identity best practices.
- Deliver knowledge‑transfer sessions to operational teams and contribute to shared engineering standards.
Required Skills & Qualifications
Technical Skills
- 4–7+ years of experience in IAM/IGA engineering roles.
- Hands‑on experience with SailPoint IdentityIQ.
- Strong Java (JDK 8+) engineering background, including plugin, rule, and JAR development.
- Proficiency with SQL Server and/or Oracle; advanced understanding of relational identity data structures.
- Expertise in REST/SOAP APIs, schema mapping, ETL‑like transformations, and integration pipelines.
- Familiarity with IGA object models and identity data constructs (accounts, entitlements, roles, policies).
IAM & Security Skills
- Solid understanding of identity lifecycle management, provisioning/deprovisioning processes, and governance workflows.
- Experience applying IAM controls such as SoD, recertification, audit trails, and privileged access standards.
- Knowledge of authentication and directory technologies (AD/LDAP, cloud identity providers, SCIM, SSO/MFA patterns).
DevOps & Delivery Skills
- Experience with Git-based CI/CD workflows, environment promotion, and release governance.
- Strong testing discipline across unit, integration, and functional testing.
- Ability to build reusable, scalable integration frameworks and adhere to secure coding practices.
Soft Skills
- Excellent communication and documentation capabilities.
- Ability to lead discussions with technical and non‑technical users.
- Strong analytical problem‑solving skills and high accountability for quality and reliability.
Preferred Qualifications
- Experience with cloud-based identity systems (Azure AD/Entra ID, Okta, Saviynt, ForgeRock, etc.).
- Knowledge of scripting languages (Python, PowerShell, Groovy).
- Experience building identity integrations in highly regulated environments.
- Background in data engineering or API orchestration.
Success Criteria
- Delivery of accurate, high‑performing identity integrations with minimal production defects.
- Reduction in onboarding cycle time through automation and reusable integration frameworks.
- Strong cross‑team collaboration enabling smooth onboarding of applications and identity data sources.
- Compliance with security, audit, and governance requirements across all integration activities.