×
Register Here to Apply for Jobs or Post Jobs. X

IAM Architect; Identity & Access Management Architect

Job in Juno Beach, Palm Beach County, Florida, USA
Listing for: Computer Task
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: IAM Architect (Identity & Access Management Architect)
Location: Juno Beach

CTG is seeking to fill an IAM Architect (Identity & Access Management Architect) position for our client.

Location

Juno Beach, FL

Duration

12 months

Duties
  • Design, develop, and manage the enterprise Identity and Access Management (IAM) architecture to ensure secure and efficient access to organizational systems and data.
  • Translate business goals and security requirements into IAM technology strategies, architectural standards, and implementation roadmaps.
  • Develop and maintain IAM architecture artifacts, including reference architectures, blueprints, and design standards.
  • Define, communicate, and enforce IAM security architecture, policies, and governance across application and infrastructure initiatives.
  • Collaborate with Enterprise Architects, Security Architects, solution architects, engineering teams, product owners, and business leaders to establish long‑term IAM strategy and roadmap.
  • Provide architecture guidance for IAM capabilities such as identity lifecycle management, authentication, authorization, privileged access, and access governance.
  • Support solution‑level architecture design to ensure alignment with enterprise IAM standards.
  • Participate in design reviews and approve detailed IAM solution designs.
  • Perform IAM operational activities including user provisioning, de‑provisioning, access modifications, and periodic access reviews.
  • Partner with business units to gather IAM requirements and ensure solutions meet operational and security needs.
  • Ensure IAM solutions comply with internal policies, industry standards, and regulatory requirements.
  • Manage IAM‑related incidents, changes, and remediation activities.
  • Conduct periodic access certifications and support audit readiness.
Skills
  • Strong understanding of IAM technologies, frameworks, and standards, with experience designing and implementing enterprise IAM solutions.
  • Deep knowledge of identity lifecycle management, role‑based access control (RBAC), authentication, federation, and single sign‑on (SSO).
  • Solid understanding of IT security architecture principles and their application to IAM strategies.
  • Experience integrating IAM solutions with enterprise applications, directories, databases, and cloud platforms.
  • Knowledge of programming/scripting concepts, databases, and system integration methodologies.
  • Strong analytical and problem‑solving skills to identify and resolve IAM‑related technical and procedural issues.
  • Knowledge of compliance and regulatory frameworks such as GDPR, HIPAA, SOX, and related security standards.
  • Excellent interpersonal and collaboration skills for working with cross‑functional teams, stakeholders, and vendors.
  • Exceptional communication skills to clearly present IAM strategies, risks, and recommendations to both technical and non‑technical audiences.
  • Project management skills, including planning, prioritization, and execution of IAM initiatives.
Experience
  • Proven experience as an IAM Architect, IAM Engineer, or similar identity/security architecture role.
  • Hands‑on experience with enterprise IAM platforms and technologies (e.g., identity governance, access management, privileged access management, directory services, SSO, MFA).
  • Experience developing IAM architecture strategies, roadmaps, and governance models.
  • Experience supporting audits, compliance initiatives, and access certification processes.
  • Demonstrated experience working in complex enterprise environments and collaborating across multiple IT and business domains.
Education
  • Bachelor’s degree in Computer Science, Information Technology, Information Security, or a related field.

Excellent verbal and written English communication skills and the ability to interact professionally with a diverse group are required.

To Apply

To be considered, please apply directly to this requisition using the link provided. For additional information, please contact Recruiter Tana Stilloe at  Kindly forward this to any other interested parties. Thank you!

CTG will consider for employment all qualified applicants including those with criminal histories in a manner consistent with the requirements of all applicable local, state, and federal laws.

CTG is an Equal Opportunity Employer. CTG will assure equal opportunity and consideration to all applicants and employees in recruitment, selection, placement, training, benefits, compensation, promotion, transfer, and release of individuals without regard to race, creed, religion, color, national origin, sex, sexual orientation, gender identity and gender expression, age, disability, marital or veteran status, citizenship status, or any other discriminatory factors as required by law.

CTG is fully committed to promoting employment opportunities for members of protected classes.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary