IAM- Identity & Access Management SME
Atlanta, GA- onsite
6-12+ Month s C2H
JD:
This role will be responsible for executing the end to end IAM assessment across cloud, on prem, and third party identity platforms. This role focuses on technical evaluation, control analysis, maturity assessment, and risk identification, ensuring IAM capabilities align with security best practices, regulatory expectations, and business needs.
Key Responsibilities
IAM Assessment & Analysis
• Conduct detailed technical assessments across:
o Azure Entra ID (Azure AD) – authentication, conditional access, MFA, PIM, identity governance
o AWS IAM – roles, policies, permissions boundaries, federation, least privilege
o On Prem Active Directory (ADUC) – group design, privileged access, GPOs, AD hygiene
o CyberArk – PAM controls, vaulting, session management, privileged workflows
o PingID – authentication flows, MFA enforcement, integrations
o SailPoint – identity lifecycle management, access certifications, role modeling
• Evaluate current IAM architecture against industry standards (e.g., Zero Trust, least privilege, NIST/ISO concepts). • Identify control gaps, design weaknesses, and security risks. Control & Process Evaluation • Assess identity lifecycle processes: joiner, mover, leaver (JML). • Review access request, approval, provisioning, recertification, and de provisioning processes. • Assess MFA, SSO, federation, and password policies. • Evaluate privileged access controls and segregation of duties (SoD).
Risk & Recommendations
• Document IAM risks with clear impact and likelihood.
• Provide actionable remediation recommendations (short term and long term).
• Define IAM maturity levels and target state architecture.
• Align recommendations with business priorities and regulatory expectations.
Required Skills & Experience
• 8+ years of experience in Identity & Access Management
• (Preferable) Strong hands on expertise with:
o Azure Entra ID (Azure AD)
o AWS IAM
o Active Directory (ADUC)
o CyberArk PAM
o PingID
o SailPoint (IIQ or ISC)
• Strong understanding of:
o Zero Trust Architecture
o Privileged Access Management
o Identity Governance & Administration (IGA)
Best Regards,
Navneet Jha