IAM Security Architect

Overview

Hybrid
$80 - $90
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 12 Month(s)

Skills

IAM
Architect

Job Details

IAM Security Architect

Charlotte, NC,

We are seeking a Visionary Identity Architect to design and implement a unified Identity Data Fabric that secures every identity human, machine, workload, bot, and device across our hybrid enterprise.

This role combines two critical missions:

Identity Data Fabric: Integrate all identity stores (HRIS, IGA, AD/AAD, SaaS, IoT, OT, cloud, and on-prem) into a virtualized, attribute-rich fabric that powers Zero Trust decisions, analytics, and enterprise digital-transformation initiatives.

Non-Human / Machine Identity Security: Discover, classify, vault, rotate, and continuously monitor the much larger population of service accounts, API keys, tokens, certificates, and workload identities.

You will own the end-to-end strategy, reference architectures, data models, and delivery roadmaps that make identity a real-time, reusable, policy-enforced enterprise service.

Core Outcomes (18-Month Targets)

Authoritative sources for all identities connected to the fabric

360 global profiles ( 30 core attributes) for 99% of human users and 90% of non-human identities

Significant reduction of plain-text or hard-coded secrets

Key Responsibilities

  • Strategy & Governance (40%)
  • Define a 3-year Identity Data Fabric & Machine Identity vision, OKRs, and investment roadmap
  • Map controls to NIST CSF and SOX frameworks
  • Chair the Cross-Functional Identity Architecture Council to drive enterprise standards adoption
  • Architecture & Design (40%)
  • Design logical and physical data-fabric layers: ingestion, virtualization, graph/MDM, API, and event bus
  • Develop reference patterns for non-human identity (NHI) lifecycle: provisioning, claiming, vaulting, rotation (ZSP/JIT), and decommissioning
  • Embed attribute-based access control (ABAC) and policy-as-code into CI/CD pipelines and service meshes
  • Data Analytics & Insights (20%)
  • Build dashboards and ML models to detect orphaned accounts, toxic combinations, privilege creep, and anomalous NHI usage
  • Publish KPI scorecards to executive leadership and the board s cyber committee

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About American IT Systems