×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Program Strategist – SailPoint Engineer

Job in Atlanta, Fulton County, Georgia, 30383, USA
Listing for: Truist
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below

Regular or Temporary

Language Fluency: English (Required)

Work Shift: 1st shift (United States of America)

Position Overview

We are currently seeking an experienced SailPoint Engineer to join our team. The ideal candidate will have a strong background in SailPoint with specific expertise in connector bundle functionality, Segregation of Duties (SoD) module, and Role Mining. This role will be responsible for designing, configuring, and maintaining IAM solutions that ensure secure, efficient, and compliant access across the organization. The SailPoint IAM Engineer will collaborate with cross‑functional teams to support governance, streamline role management, and enhance the overall identity lifecycle management process.

This position requires onsite presence five days per week, with Raleigh, NC designated as the preferred location. Charlotte, NC and Atlanta, GA will also be considered.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

  • Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
  • Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base‑lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
  • Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.
  • Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.
  • Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
  • Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.
  • Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Qualifications

Required Qualifications:

  • Bachelor’s degree in business administration, technology related field or equivalent education and related training.
  • More than seven years of demonstrated progressive experience in Cybersecurity, with emphasis on data lost prevention, vulnerability management, access management, firewalls, security awareness training, etc.
  • Excellent ability to express complex multi-disciplinary technical and business concepts in terms that are understandable to all levels of Lines of Business and corporate management both verbally and in writing.
  • Strong working knowledge of cybersecurity terms, concepts, disciplines, frameworks, best practices and industry/regulatory requirements.

Preferred Qualifications:

  • Master’s degree or MBA; previous experience in the banking industry.
  • 7+ years of progressive work experience in Cybersecurity.
  • Experience conducting, preparing and presenting analysis, findings and recommendations.
  • Cyber security certifications such as CISA, CISSP.
  • Hands on managing multiple IGA platforms (ex. Oracle Identity Manager, SailPoint, Saviynt).
  • Understanding of Connector bundles functionality, SOD Module and Role Mining.
Other

Job Requirements / Working Conditions

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary