Overview
Skills
Job Details
IAM Security Architect
Charlotte, NC,
We are seeking a Visionary Identity Architect to design and implement a unified Identity Data Fabric that secures every identity human, machine, workload, bot, and device across our hybrid enterprise.
This role combines two critical missions:
Identity Data Fabric: Integrate all identity stores (HRIS, IGA, AD/AAD, SaaS, IoT, OT, cloud, and on-prem) into a virtualized, attribute-rich fabric that powers Zero Trust decisions, analytics, and enterprise digital-transformation initiatives.
Non-Human / Machine Identity Security: Discover, classify, vault, rotate, and continuously monitor the much larger population of service accounts, API keys, tokens, certificates, and workload identities.
You will own the end-to-end strategy, reference architectures, data models, and delivery roadmaps that make identity a real-time, reusable, policy-enforced enterprise service.
Core Outcomes (18-Month Targets)
Authoritative sources for all identities connected to the fabric
360 global profiles ( 30 core attributes) for 99% of human users and 90% of non-human identities
Significant reduction of plain-text or hard-coded secrets
Key Responsibilities
- Strategy & Governance (40%)
- Define a 3-year Identity Data Fabric & Machine Identity vision, OKRs, and investment roadmap
- Map controls to NIST CSF and SOX frameworks
- Chair the Cross-Functional Identity Architecture Council to drive enterprise standards adoption
- Architecture & Design (40%)
- Design logical and physical data-fabric layers: ingestion, virtualization, graph/MDM, API, and event bus
- Develop reference patterns for non-human identity (NHI) lifecycle: provisioning, claiming, vaulting, rotation (ZSP/JIT), and decommissioning
- Embed attribute-based access control (ABAC) and policy-as-code into CI/CD pipelines and service meshes
- Data Analytics & Insights (20%)
- Build dashboards and ML models to detect orphaned accounts, toxic combinations, privilege creep, and anomalous NHI usage
- Publish KPI scorecards to executive leadership and the board s cyber committee