We are seeking a dedicated and detail-oriented IAM Engineer to join our Information Security team! This role is ideal for professionals passionate about identity security, governance, zero-trust architecture, and delivering secure, scalable, and user-friendly authentication solutions. You will play a key role in designing, deploying, and managing IAM platforms and policies to support secure access to enterprise and cloud systems while ensuring compliance with global security standards.
Requirements
- Manage and operate end-to-end IAM processes including user provisioning, de-provisioning, and Joiner-Mover-Leaver (JML) lifecycle workflows
- Design and maintain account lifecycle management for service accounts, privileged accounts, and application identities
- Lead access certification campaigns, privileged access reviews, and continuous access verification
- Implement and manage self-service IAM capabilities (e.g., account requests, password resets, access approvals) to improve user experience and reduce administrative overhead
- Define and enforce Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and least-privilege models across all environments
- Integrate with on-prem and cloud systems such as Active Directory, Azure AD (IDP), LDAP, AWS SSO, and various SaaS platforms
- Enable secure access through Single Sign-On (SSO), Multi-Factor Authentication (MFA), and password less authentication
- Support Privileged Access Management (PAM) and Endpoint Privilege Management (EPM) through tools such as Beyond Trust or other market-leading IAM suites
- Implement automated access request workflows and integration with ITSD systems
- Deploy Zero Trust access policies leveraging context-based controls (e.g., device posture, geolocation, user risk scores)
- Enable identity threat detection, behavioural analytics, and adaptive authentication mechanisms
- Integrate IAM platforms with PAM/EPM tools to secure high-risk roles and critical service accounts
- Support and maintain password less authentication technologies and identity proofing workflows for remote and secure onboarding
- Define and maintain automated access provisioning/de-provisioning, multi-level approval workflows, and policy enforcement
- Conduct periodic access reviews across applications, infrastructure, and databases
- Monitor IGA platforms for anomalies, policy violations, and risk indicators
- Monitor IAM infrastructure and services for availability, SLA adherence, MFA adoption, and compliance posture
- Ensure alignment with SOX, SOC 2, ISO 27001, SOC2, NIST CSF, and organizational policies
- Identify IAM risks, document them in the IS Risk Register, and work with risk teams for remediation
- Assist with internal and external audits related to IAM, IGA, and privileged access controls