IAM Engineer

IAM Engineer

Veracity Software Inc

Standort

Hexjobs Insights

Job Title: IAM Engineer

  • Duration: 12-24 Months
  • Location: Raleigh, NC/Charlotte, NC/Dallas, TX/Minneapolis, MN/Chandler, AZ - Hybrid (3 Days Onsite/2 Days WFH)
  • Focus on identity federation protocols (SAML, OAuth).

Schlüsselwörter

IAM Core Concepts
SAML
OAuth
SSO
Role-based access control
Identity lifecycle management
OpenID Connect
JWT
MFA
Security awareness

Job Title: IAM Engineer

Duration: 12-24 Months

Location: Raleigh, NC/Charlotte, NC/Dallas, TX/Minneapolis, MN/Chandler, AZ - Hybrid Role (3 Days Onsite/2 Days WFH)

Need strong profiles with IAM Core Concept, SAML Outh, and SSO products

They are getting candidates who are stronger on Configuring, troubleshooting part in their interview. However; not very strong on IAM Core concepts, SAML, OUTH and SSO products

They still need person to come in person interview, if, they go for in person then it would be 1 and done.

We should look for IAM architects/engineers who can:

  • Explain and implement identity federation protocols (SAML, OAuth, OIDC)
  • Work with SSO products beyond just configuration (actual integrations, flows, security)
  • Apply IAM core concepts to real-world automation and network identity scenarios

Screen candidates based on below:

Ask scenario-based questions:

"Explain how OAuth differs from SAML and when you'd use each.”

"Walk me through the SAML authentication flow between an IdP and SP.”

  • Look for hands-on integration experience with SSO products, not just platform administration.
  • Probe for security awareness: token expiration, replay attacks, certificate management.

Candidate Focus Areas:

  • IAM Core Concepts
  • Principles of authentication vs. authorization
  • Role-based access control (RBAC), attribute-based access control (ABAC)
  • Identity lifecycle management (provisioning, de-provisioning, governance)
  • Federation and trust models
  • SAML, OAuth, and OpenID Connect
  • SAML 2.0: Assertions, bindings, metadata, IdP vs. SP roles
  • OAuth 2.0: Grant types (Authorization Code, Client Credentials, Implicit, Device Flow), scopes, tokens (access, refresh, ID)
  • OpenID Connect (OIDC): Identity layer on top of OAuth, ID token structure, claims
  • JWT: Structure, validation, signature verification
  • SSO Products & Ecosystem
  • Hands-on with enterprise SSO platforms (Okta, Ping Identity, Azure AD, ForgeRock, etc.)
  • Experience integrating apps with SSO (SAML/OAuth flows)
  • Understanding of MFA, adaptive authentication, and conditional access policies

Anmelden, um vollständige Details zu sehen

Erstellen Sie ein kostenloses Konto, um auf die vollständige Stellenbeschreibung zuzugreifen und sich zu bewerben.

Aufrufe: 6
Veröffentlichtvor 15 Tagen
Läuft abin 6 Monaten

Ähnliche Jobs, die für Sie von Interesse sein könnten

Basierend auf "IAM Engineer"

Keine Angebote gefunden, versuchen Sie, Ihre Suchkriterien zu ändern.