Identity and Access Management (IAM) Engineer at Piper Companies
Reston, Virginia, USA -
Full Time


Start Date

Immediate

Expiry Date

16 Sep, 25

Salary

170000.0

Posted On

17 Jun, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Aws, Computer Science, It, Technology, Cissp, Java, Python, Sailpoint, Azure

Industry

Information Technology/IT

Description

Piper Companies is seeking an Identity and Access Management (IAM) Engineer to join a leading cybersecurity organization. This role is critical in managing and optimizing enterprise IAM systems, with a strong focus on operational excellence, security, and strategic alignment with compliance frameworks. This position is onsite in Reston, VA!

QUALIFICATIONS FOR THE IAM ENGINEER:

  • 8+ years of experience in IT with a focus on IAM security architecture and platform administration
  • Relevant certifications such as CIAM, CISSP, or IAM vendor-specific credentials
  • Proficiency in Java, Python, and Ansible
  • Deep understanding of SSO, MFA, PAM, and IAM protocols (SAML, OAuth, OIDC)
  • Experience with SailPoint IdentityIQ, including connector development and REST API integrations
  • Direct experience with Ping Identity and SailPoint solutions
  • Familiarity with IAM in cloud environments (AWS, Azure) and cloud IAM roles and policies
  • Ability to design IAM solutions for complex, high-availability infrastructures
  • Bachelor’s degree in computer science, technology, or a related field
Responsibilities
  • Provide hands-on technical administration of IAM systems and applications, ensuring performance, integration, and security
  • Design, implement, and manage Single Sign-On (SSO) solutions using Ping Identity
  • Develop and execute Multi-Factor Authentication (MFA) strategies and integrate them into the IAM framework
  • Lead Identity Governance and Administration (IGA) projects using SailPoint, including application onboarding, access certification, and lifecycle events
  • Deploy and manage Privileged Access Management (PAM) solutions to secure critical systems and monitor privileged access
  • Align IAM architecture with security objectives and compliance frameworks such as NIST and CIS
  • Collaborate with cross-functional teams and vendors to enhance IAM capabilities and evaluate new technologies
Loading...