About this role
This role involves leading the design and implementation of enterprise-wide IAM and zero trust security architectures, ensuring compliance and security across hybrid, cloud, and on-premises environments.
Key Responsibilities
- Define enterprise IAM strategy
- Design identity architectures
- Lead IAM technology implementation
- Establish identity standards
- Partner with security teams
Technical Overview
The technical scope includes designing identity protocols, implementing IAM technologies like SSO, MFA, PAM, and IGA, and integrating security controls within cloud and on-premises systems.
Ideal Candidate
The ideal candidate is a senior cybersecurity professional with extensive experience in IAM architecture, security controls, and zero trust principles. They possess strong leadership skills and a strategic mindset to enhance enterprise security posture.
Must-Have Skills
8+ years of experience in cybersecurityat least 6+ years focused on IAM architectureengineeringor operationsDesigning enterprise IAM strategiesImplementing IAM technologies such as SSOMFAPAMIGAPartnering with security engineeringcloudand app teamsEvaluating and recommending IAM tools and vendorsMonitoring identity threat landscape
Nice-to-Have Skills
experience with cloud-native environmentsexperience with security frameworks and regulationsexperience with identity threat detection and response tools
Tools & Platforms
SAMLOAuthOpenID ConnectSCIMLDAPKerberosIAM platformsConditional Access toolsThreat Detection tools
Required Skills
IAMIdentity Access ManagementSAMLOAuthOpenID ConnectSCIMLDAPKerberosSSOMFAPrivileged Access ManagementPAMIdentity GovernanceIGAZero TrustThreat ModelingSecurity ControlsConditional AccessContinuous AuthenticationIdentity Threat Detection and ResponseCybersecurity
Hard Skills
IAMIdentity Access ManagementSAMLOAuthOpenID ConnectSCIMLDAPKerberosSSOMulti-Factor AuthenticationMFAPrivileged Access ManagementPAMIdentity GovernanceIGACloudOn-premisesHybridThreat ModelingSecurity ControlsZero TrustConditional AccessContinuous AuthenticationIdentity Threat Detection and ResponseCybersecurity
Soft Skills
collaborationleadershipstrategic thinkingproblem-solvingcommunication
Keywords for Your Resume
IAMIdentity Access ManagementSAMLOAuthOpenID ConnectSCIMLDAPKerberosSSOMulti-Factor AuthenticationMFAPrivileged Access ManagementPAMIdentity GovernanceIGAZero TrustThreat ModelingSecurity ControlsConditional AccessContinuous AuthenticationIdentity Threat Detection and ResponseCybersecurity
Deal Breakers
Lack of experience in IAM architecture, No experience with zero trust principles, Insufficient cybersecurity background
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile