Title: Identity and Access Management Consultant
Location: Washington, DC
Length: Full Time Position
An IDAM (Identity and Access Management) engineer is a cybersecurity professional responsible for designing, implementing, and maintaining systems that manage user identities and control access to IT resources.
Role and Responsibilities
An IDAM engineer focuses on ensuring secure and efficient access to systems and data within an organization. Key responsibilities include:
Designing and implementing IDAM solutions to manage user accounts, authentication, and authorization across applications and platforms.
Managing account lifecycle processes, including onboarding, offboarding, and role changes (Joiner-Mover-Leaver processes),.
Configuring and maintaining IAM platforms such as Active Directory, Okta, SailPoint, CyberArk, or MS Entra.
Automating IAM processes using scripting languages like PowerShell or Python to reduce manual tasks and improve efficiency.
Supporting compliance and audits, ensuring that access policies meet regulatory and organizational standards.
Collaborating with cross-functional teams including security architects, GRC consultants, and IT operations to integrate IDAM solutions into broader IT infrastructure.
Skills and Expertise
IDAM engineers typically require:
Strong hands-on experience with identity and access management tools and platforms.
Knowledge of access management and privileged access controls, including PAM systems.
Automation and scripting skills to streamline processes and reporting.
Understanding of security frameworks and compliance requirements, often including ISO/IEC 27001 and ITIL standards.
Ability to work in global or hybrid environments, coordinating with stakeholders across multiple regions.
Work Environment
IDAM engineers often work in large organizations, public sector agencies, or global enterprises, supporting thousands of users and complex IT environments. They may be involved in high-profile transformation projects, such as modernizing IAM platforms, implementing Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) systems. Roles can be hands-on engineering-focused or include architecture and design input, depending on the organization.