Senior IAM Engineer
Listed on 2025-12-07
-
IT/Tech
Cybersecurity, IT Consultant
Digi Key is one of the fastest growing distributors of electronic components in the world. In addition to offering the broadest selection of in-stock electronic components and providing the best service possible to customers, employees have access to a highly competitive benefits package. To learn more, visit our benefits and perks page .
______________________________________________________________________
Position Overview: As a Senior IAM Engineer, you will be responsible for the full lifecycle management of identity and access systems, including architecture, design, implementation, and ongoing operations. You will collaborate with cross-functional teams to integrate IAM solutions with existing and new systems, support the development of security policies, and ensure compliance with security standards. The Senior IAM Engineer will also provide guidance and mentorship to junior engineers and work closely with stakeholders to develop and implement access managementstrategies.
Responsibilities:
Design and implement identity and access management solutions, including single signon (SSO), multi-factor authentication (MFA), and role-based access control (RBAC).
Manage and maintain IAM systems, ensuring high availability, scalability, and security.
Develop and enforce IAM policies and procedures, ensuring compliance with industry regulations and standards.
Integrate IAM systems with existing applications, infrastructure, and cloud services.
Conduct regular security assessments and audits of IAM systems and processes.
Lead the design and implementation of user provisioning, de-provisioning, and access certification processes.
Troubleshoot and resolve complex IAM-related issues, providing support to internal teams as needed.
Collaborate with IT, security, and business stakeholders to identify IAM requirementsand solutions.
Provide technical guidance and mentorship to junior engineers and IT staff
Stay current with the latest IAM trends, technologies, and best practices.
Required Knowledge, Skills, and Experience
Bachelor's degree in computer science, Information Technology, or arelated field, or equivalent work experience.
Experience:
At least 4-8 years of experience in identity and access management, with aproven track record of designing and implementing IAM solutions.
Technical Expertise
Strong knowledge of IAM technologies such as LDAP, Active Directory, SAML,OAuth, OpenID Connect, and PKI.
Experience with IAM tools such as SailPoint, Okta, Ping Identity, Microsoft Azure AD, or similar platforms.
Proficiency in scripting and automation using languages such as Power Shell,Python, or Bash.
Experience with cloud environments (e.g., AWS, Azure, Google Cloud) and integrating IAM solutions with cloud services.
Understanding of regulatory requirements and standards related to IAM, such asGDPR, HIPAA, and NIST.
Strong problem-solving skills and the ability to think critically and creatively.
Excellent communication skills, both written and verbal, with the ability toexplain complex concepts to non-technical stakeholders.
Strong project management skills, with the ability to manage multiple priorities and projects simultaneously.
Team-oriented mindset with the ability to collaborate effectively with cross functional teams.
Preferred Qualifications
Relevant certifications such as Certified Information Systems Security
Professional (CISSP), Certified Identity or Access Manager (CIAM).
Advanced
Experience:
Experience leading IAM projects or teams, with a focus onlarge-scale implementations in complex environments.Familiarity with emerging IAM trends and technologies, such as identity governance, privileged access management (PAM), and zero trust architecture.
Analytical
Skills:
Strong analytical and troubleshooting skills, with the ability to assessrisks and make informed decisions
Work is primarily performed at a desk and/or in an office environment for 3/4 of the day and up
The office noise level in the work environment is typically, moderate
Generally, spend the workday sitting at a workstation and operating computer devices, such as, but not limited to keyboard, mouse, and screen
Generally, spend the workday performing…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).