Hi..
Greetings...!
Hope you are doing well.
Tittle: Identity & Access Management (IAM) SME
Location: Atalanta, GA (“Onsite”)
Duration: 6+ months
Hourly Pay Rate-$60/hr - $65/C2C
Role Descriptions:
Developer
Essential Skills: Azure Entra ID (Azure AD) authentication| conditional access|
MFA| PIM| identity governanceAWS IAM roles| policies| permissions boundaries|
federation| least privilegeOnPrem Active Directory (ADUC) group design|
privileged access| GPOs| AD hygieneCyberArk PAM controls| vaulting| session
management| privileged workflowsPingID authentication flows| MFA enforcement|
integrationsSailPoint
Skills: Digital : AWS Mobile Hub & AWS Mobile Services~Sailpoint~Cyber Ark~Microsoft
IAM~Azure Data Factory
Experience Required: 10 & Above
Identity & Access Management SME
Onsite/Offshore
This role will be responsible for executing the end to end IAM assessment
across cloud, on prem, and third party identity platforms. This role focuses on
technical evaluation, control analysis, maturity assessment, and risk
identification, ensuring IAM capabilities align with security best practices,
regulatory expectations, and business needs.
Key Responsibilities
IAM Assessment & Analysis
• Conduct detailed technical assessments across:
o Azure Entra ID (Azure AD) – authentication, conditional access, MFA, PIM,
identity governance
o AWS IAM – roles, policies, permissions boundaries, federation, least
privilege
o On Prem Active Directory (ADUC) – group design, privileged access, GPOs, AD
hygiene
o CyberArk – PAM controls, vaulting, session management, privileged workflows
o PingID – authentication flows, MFA enforcement, integrations
o SailPoint – identity lifecycle management, access certifications, role
modeling
• Evaluate current IAM architecture against industry standards (e.g., Zero
Trust, least privilege, NIST/ISO concepts).
• Identify control gaps, design weaknesses, and security risks.
Control & Process Evaluation
• Assess identity lifecycle processes: joiner, mover, leaver (JML).
• Review access request, approval, provisioning, recertification, and de
provisioning processes.
• Assess MFA, SSO, federation, and password policies.
• Evaluate privileged access controls and segregation of duties (SoD).
Risk & Recommendations
• Document IAM risks with clear impact and likelihood.
• Provide actionable remediation recommendations (short term and long term).
• Define IAM maturity levels and target state architecture.
• Align recommendations with business priorities and regulatory expectations.
Thanks & Regards!
Ankita Pal
Lead IT Recruiter
Email: ankit...@pacerstaffing.com