×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Senior Engineer - IAM Identity Services

Job in Wilson, Wilson County, North Carolina, 27893, USA
Listing for: Truist
Full Time position
Listed on 2026-02-18
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, IT Support
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary

Regular

Language Fluency

English (Required)

Work Shift

1st shift (United States of America)

Job Description

We are seeking a skilled Cybersecurity Senior Engineer with deep expertise in Microsoft Entra (Azure AD) and Identity and Access Management (IAM) to design, implement, manage, and automate Conditional Access (CA) policies across identities and applications. This role is responsible for securing user, workload, and application access while enabling business productivity through modern, zero-trust identity controls.

The ideal candidate has strong hands‑on experience with Microsoft Entra Conditional Access, Azure, and IAM lifecycle management, and is comfortable troubleshooting complex authentication and access issues in enterprise environments.

For this opportunity:
Truist will not sponsor an applicant for work visa status or employment authorization, nor will we offer any immigration‑related support for this position (including, but not limited to H-1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN-1 or TN-2, E-3, O-1, or future sponsorship for U.S. lawful permanent residence status.)

Essential Duties And Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

Conditional Access & Identity Security
  • Design, implement, manage, and continuously improve Microsoft Entra Conditional Access policies aligned to Zero Trust principles
  • Develop CA strategies for users, administrators, service accounts, and workloads
  • Enforce access controls using MFA, device compliance, risk‑based access, and session controls
  • Create exception handling and break‑glass access models that balance security and availability
Identity & Access Management (IAM)
  • Manage and secure identities, roles, and access for users, groups, and applications
  • Implement and maintain RBAC, PIM, and least‑privilege access models
  • Support identity lifecycle processes including onboarding, role changes, and offboarding
  • Secure access to cloud and enterprise applications (SAML, OIDC, OAuth)
Automation & Engineering
  • Automate Conditional Access and IAM configurations using Power Shell, Microsoft Graph API, or Infrastructure‑as‑Code (IaC) tools (Terraform, Git Lab SaaS, etc.)
  • Build repeatable, scalable identity security solutions and policy templates
  • Implement monitoring, alerting, and reporting for authentication and access events
Troubleshooting & Operations
  • Investigate and resolve Conditional Access policy failures, MFA issues, and authentication errors
  • Perform root‑cause analysis on access‑related incidents and security events
  • Partner with IT, cloud, and application teams to resolve access issues without weakening security
Governance, Compliance & Documentation
  • Ensure IAM and CA configurations align with organizational security standards and compliance requirements (e.g., NIST, ISO, SOC, CMMC, etc.)
  • Maintain clear documentation for Conditional Access policies, design decisions, and operational procedures
  • Participate in security assessments, audits, and continuous improvement initiatives
Additional Responsibilities
  • Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base‑lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
  • Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary