IAM Engineer

IAM Engineer

Veracity Software Inc

Raleigh
IAM Core Concepts
🧠 SAML
OAuth
SSO
Role-based access control
Identity lifecycle management
OpenID Connect
JWT
MFA
Security awareness

Podsumowanie

Job Title: IAM Engineer

  • Duration: 12-24 Months
  • Location: Raleigh, NC/Charlotte, NC/Dallas, TX/Minneapolis, MN/Chandler, AZ - Hybrid (3 Days Onsite/2 Days WFH)
  • Focus on identity federation protocols (SAML, OAuth).

Słowa kluczowe

IAM Core ConceptsSAMLOAuthSSORole-based access controlIdentity lifecycle managementOpenID ConnectJWTMFASecurity awareness

Opis stanowiska

Job Title: IAM Engineer

Duration: 12-24 Months

Location: Raleigh, NC/Charlotte, NC/Dallas, TX/Minneapolis, MN/Chandler, AZ - Hybrid Role (3 Days Onsite/2 Days WFH)

Need strong profiles with IAM Core Concept, SAML Outh, and SSO products

They are getting candidates who are stronger on Configuring, troubleshooting part in their interview. However; not very strong on IAM Core concepts, SAML, OUTH and SSO products

They still need person to come in person interview, if, they go for in person then it would be 1 and done.

We should look for IAM architects/engineers who can:

  • Explain and implement identity federation protocols (SAML, OAuth, OIDC)
  • Work with SSO products beyond just configuration (actual integrations, flows, security)
  • Apply IAM core concepts to real-world automation and network identity scenarios

Screen candidates based on below:

Ask scenario-based questions:

"Explain how OAuth differs from SAML and when you'd use each.”

"Walk me through the SAML authentication flow between an IdP and SP.”

  • Look for hands-on integration experience with SSO products, not just platform administration.
  • Probe for security awareness: token expiration, replay attacks, certificate management.

Candidate Focus Areas:

  • IAM Core Concepts
  • Principles of authentication vs. authorization
  • Role-based access control (RBAC), attribute-based access control (ABAC)
  • Identity lifecycle management (provisioning, de-provisioning, governance)
  • Federation and trust models
  • SAML, OAuth, and OpenID Connect
  • SAML 2.0: Assertions, bindings, metadata, IdP vs. SP roles
  • OAuth 2.0: Grant types (Authorization Code, Client Credentials, Implicit, Device Flow), scopes, tokens (access, refresh, ID)
  • OpenID Connect (OIDC): Identity layer on top of OAuth, ID token structure, claims
  • JWT: Structure, validation, signature verification
  • SSO Products & Ecosystem
  • Hands-on with enterprise SSO platforms (Okta, Ping Identity, Azure AD, ForgeRock, etc.)
  • Experience integrating apps with SSO (SAML/OAuth flows)
  • Understanding of MFA, adaptive authentication, and conditional access policies

Zaloguj się, aby zobaczyć pełny opis oferty

Wyświetlenia: 2
Opublikowana10 dni temu
Wygasaza 6 miesięcy
Źródło

Podobne oferty, które mogą Cię zainteresować

Na podstawie "IAM Engineer"

Nie znaleziono ofert, spróbuj zmienić kryteria wyszukiwania.