IAM Engineer at Ensono
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

30 Nov, 25

Salary

95000.0

Posted On

31 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Computer Science, Automation Tools, Scripting Languages, Vulnerability Management, Hipaa, Cissp, Communication Skills, It, Information Technology, Client Requirements, Assessment Methodologies, Powershell, Vulnerability

Industry

Information Technology/IT

Description

At Ensono, our Purpose is to be a relentless ally, disrupting the status quo and unleashing our clients to Do Great Things! We enable our clients to achieve key business outcomes that reshape how our world runs. As an expert technology adviser and managed service provider with cross-platform certifications, Ensono empowers our clients to keep up with continuous change and embrace innovation.
We can Do Great Things because we have great Associates. The Ensono Core Values unify our diverse talents and are woven into how we do business. These five traits are the key to achieving our purpose: Honesty, Reliability, Curiosity, Collaboration, and Passion.
About the role and what you’ll be doing: The IAM Engineer is responsible for designing, implementing, and maintaining identity and access management solutions with a particular emphasis on vulnerability management across systems and applications. This role leverages automation (including PowerShell scripting) integrates with leading IAM platforms such as CyberArk, and collaborates with security and IT teams to ensure robust access controls and risk mitigation.

Key Responsibilities:

  • Design, deploy, and manage IAM solutions, including privileged access management using tools such as CyberArk and other life cycle management platforms.
  • Develop and maintain automation scripts (primarily in PowerShell) to streamline IAM processes, user provisioning, access reviews, and remediation activities.
  • Integrate IAM systems with enterprise applications, cloud platforms, and infrastructure, ensuring secure and efficient access management.
  • Configure and manage user, group, and role-based access controls across multiple environments.
  • Collaborate with vulnerability management teams to baseline and manage risks due to vulnerabilities in systems and applications.
  • Enable authenticated scanning for critical systems and validate remediation efforts.
  • Ensure IAM and vulnerability management processes comply with regulatory requirements and internal security policies.
  • Assist with audit requirements by providing evidence of access controls, scan results, and remediation activities.
  • Monitor and respond to security events related to identity and access, escalating issues as necessary.
  • Communicate technical findings and recommendations to stakeholders through detailed reports and presentations.

Required Qualifications:

  • Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field, or equivalent experience.
  • Hands-on experience with IAM platforms (CyberArk, Forge Rock, IGL, etc.) and vulnerability management tools.
  • Strong experience with automation scripting (PowerShell required).
  • Strong understanding of access control models, privileged access management, and vulnerability assessment methodologies.
  • Experience with cloud platforms, enterprise applications, and hybrid environments.
  • Excellent analytical, problem-solving, and communication skills.
  • Must be a US citizen due to client requirements

Preferred Qualifications:

  • Certifications in IAM, cybersecurity, or vulnerability management (e.g., CyberArk Certified Delivery Engineer, CompTIA Security+, CISSP).
  • Experience with additional automation tools and scripting languages.
  • Familiarity with regulatory compliance frameworks (PCI-DSS, GDPR, HIPAA, etc)
Responsibilities

WE WANT ALL NEW ASSOCIATES TO SUCCEED IN THEIR ROLES AT ENSONO. THAT’S WHY WE’VE OUTLINED THE JOB REQUIREMENTS BELOW. TO BE CONSIDERED FOR THIS ROLE, IT’S IMPORTANT THAT YOU MEET ALL REQUIRED QUALIFICATIONS. IF YOU DO NOT MEET ALL OF THE PREFERRED QUALIFICATIONS, WE STILL ENCOURAGE YOU TO APPLY.

Required Qualifications:

  • Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field, or equivalent experience.
  • Hands-on experience with IAM platforms (CyberArk, Forge Rock, IGL, etc.) and vulnerability management tools.
  • Strong experience with automation scripting (PowerShell required).
  • Strong understanding of access control models, privileged access management, and vulnerability assessment methodologies.
  • Experience with cloud platforms, enterprise applications, and hybrid environments.
  • Excellent analytical, problem-solving, and communication skills.
  • Must be a US citizen due to client requirements.

Preferred Qualifications:

  • Certifications in IAM, cybersecurity, or vulnerability management (e.g., CyberArk Certified Delivery Engineer, CompTIA Security+, CISSP).
  • Experience with additional automation tools and scripting languages.
  • Familiarity with regulatory compliance frameworks (PCI-DSS, GDPR, HIPAA, etc).

Key Responsibilities:

  • Design, deploy, and manage IAM solutions, including privileged access management using tools such as CyberArk and other life cycle management platforms.
  • Develop and maintain automation scripts (primarily in PowerShell) to streamline IAM processes, user provisioning, access reviews, and remediation activities.
  • Integrate IAM systems with enterprise applications, cloud platforms, and infrastructure, ensuring secure and efficient access management.
  • Configure and manage user, group, and role-based access controls across multiple environments.
  • Collaborate with vulnerability management teams to baseline and manage risks due to vulnerabilities in systems and applications.
  • Enable authenticated scanning for critical systems and validate remediation efforts.
  • Ensure IAM and vulnerability management processes comply with regulatory requirements and internal security policies.
  • Assist with audit requirements by providing evidence of access controls, scan results, and remediation activities.
  • Monitor and respond to security events related to identity and access, escalating issues as necessary.
  • Communicate technical findings and recommendations to stakeholders through detailed reports and presentations
Loading...