Cybersecurity Senior Engineer - IAM Identity Services
Listed on 2026-02-18
-
IT/Tech
Cybersecurity, IT Consultant, IT Support
The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.
If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).
Regular or TemporaryRegular
Language FluencyEnglish (Required)
Work Shift1st shift (United States of America)
Job DescriptionWe are seeking a skilled Cybersecurity Senior Engineer with deep expertise in Microsoft Entra (Azure AD) and Identity and Access Management (IAM) to design, implement, manage, and automate Conditional Access (CA) policies across identities and applications. This role is responsible for securing user, workload, and application access while enabling business productivity through modern, zero-trust identity controls.
The ideal candidate has strong hands‑on experience with Microsoft Entra Conditional Access, Azure, and IAM lifecycle management, and is comfortable troubleshooting complex authentication and access issues in enterprise environments.
For this opportunity:
Truist will not sponsor an applicant for work visa status or employment authorization, nor will we offer any immigration‑related support for this position (including, but not limited to H-1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN-1 or TN-2, E-3, O-1, or future sponsorship for U.S. lawful permanent residence status.)
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
Conditional Access & Identity Security- Design, implement, manage, and continuously improve Microsoft Entra Conditional Access policies aligned to Zero Trust principles
- Develop CA strategies for users, administrators, service accounts, and workloads
- Enforce access controls using MFA, device compliance, risk‑based access, and session controls
- Create exception handling and break‑glass access models that balance security and availability
- Manage and secure identities, roles, and access for users, groups, and applications
- Implement and maintain RBAC, PIM, and least‑privilege access models
- Support identity lifecycle processes including onboarding, role changes, and offboarding
- Secure access to cloud and enterprise applications (SAML, OIDC, OAuth)
- Automate Conditional Access and IAM configurations using Power Shell, Microsoft Graph API, or Infrastructure‑as‑Code (IaC) tools (Terraform, Git Lab SaaS, etc.)
- Build repeatable, scalable identity security solutions and policy templates
- Implement monitoring, alerting, and reporting for authentication and access events
- Investigate and resolve Conditional Access policy failures, MFA issues, and authentication errors
- Perform root‑cause analysis on access‑related incidents and security events
- Partner with IT, cloud, and application teams to resolve access issues without weakening security
- Ensure IAM and CA configurations align with organizational security standards and compliance requirements (e.g., NIST, ISO, SOC, CMMC, etc.)
- Maintain clear documentation for Conditional Access policies, design decisions, and operational procedures
- Participate in security assessments, audits, and continuous improvement initiatives
- Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base‑lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
- Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).