×
Register Here to Apply for Jobs or Post Jobs. X

Sr. IAM Administrator; IT@JH Enterprise Messaging and Directory

Job in Baltimore, Anne Arundel County, Maryland, 21276, USA
Listing for: Johns Hopkins University
Full Time position
Listed on 2026-01-06
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Administrator
Job Description & How to Apply Below
Position: Sr. IAM Administrator (IT@JH Enterprise Messaging and Directory)

Sr. IAM Administrator (IT@JH Enterprise Messaging and Directory)

IT@JH Enterprise Directory and Messaging is seeking a Sr. IAM Administrator
.

The Sr. Identity and Access Management (IAM) Administrator is responsible for planning, implementing, and managing IAM services for the University. Serves as the Lead Administrator and provides technical expertise in identity and user account management, including troubleshooting and operational support of university‑managed directory stores. Supports the university’s two‑factor authentication and privileged account management solutions.

The role ensures efficient, seamless, and secure access to business resources. It is ideal for individuals with extensive IAM experience to advance their careers. The Sr. IAM Administrator oversees day‑to‑day operations and management of IAM on‑premises and cloud‑based systems, ensuring secure access to institutional resources. Responsibilities include leading IAM initiatives, maintaining, patching, securing, evaluating, improving, and optimizing the institution’s IAM applications.

Key responsibilities include managing digital identities for humans, workloads, and service accounts, and using digital certificates to enhance security.

The Sr. IAM Administrator supports the IAM Engineers in evaluating, improving, and optimizing the University’s IAM security posture. Effective communication with technology teams, data owners, and application owners is required to implement on‑premises and cloud‑based IAM solutions. The Administrator plays a critical role in maintaining security and efficiency of IAM systems and contributes to the overall security strategy. Additionally, the role involves administration of user accounts, permissions, and access controls to ensure authorized users have proper access to systems, data, and applications.

The Sr. IAM Administrator is a leader in IAM practices, mentors IAM Administrators and Analysts, and ensures adherence to best practices.

Specific Duties & Responsibilities Digital Identity Management
  • Oversee digital identities for humans, workloads, and service accounts, ensuring accurate and secure identity lifecycle management.
IAM Solutions Implementation
  • Lead the deployment and maintenance of IAM solutions for both on‑premises and cloud environments, ensuring seamless integration and optimal performance.
User Account Administration
  • Manage user accounts, permissions, and access controls to ensure authorized access, while maintaining strict adherence to security policies.
Security Enhancements
  • Utilize digital certificates and manage Public Key Infrastructure (PKI) to enhance security measures and protect sensitive information.
Collaboration
  • Work closely with technology teams, data owners, and application owners to design, develop, and implement effective IAM solutions.
Security Posture Evaluation
  • Continuously assess and improve the institution’s IAM security posture, identifying vulnerabilities and implementing corrective actions.
Audits and Assessments
  • Conduct regular audits and assessments of IAM systems to identify and mitigate risks, ensuring compliance with regulatory requirements.
Advanced Support
  • Provide advanced‑level support for IAM‑related issues, resolving complex problems and ensuring minimal disruption to services.
Technology Updates
  • Stay updated with the latest IAM technologies and trends, recommending and implementing improvements to enhance security and efficiency.
IAM Tools Management
  • Implement, configure, administer, and maintain IAM tools according to best practices, ensuring they are up‑to‑date and functioning optimally.
Authentication and Authorization
  • Ensure users are authenticated and authorized based on job responsibilities, implementing role‑based access controls where appropriate.
Policy Development
  • Define and enforce access control policies, ensuring they align with organizational goals and regulatory requirements.
Access Monitoring
  • Monitor access logs and conduct periodic reviews to detect and respond to unauthorized access attempts.
Single Sign‑On (SSO)
  • Implement and manage SSO solutions, troubleshooting issues and ensuring secure and efficient access for users.
Collaboration with Security…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary