RE: : Identity & Access Management (IAM) SME // Location :: Atalanta, GA (“Onsite”) // Duration: 6+ months //

0 views
Skip to first unread message

Ankita

unread,
Apr 8, 2026, 2:41:17 PM (4 days ago) Apr 8
to ankit...@pacerstaffing.com

Hi..

Greetings...!                                                                                                      
Hope you are doing well.        

Tittle: Identity & Access Management (IAM) SME

Location:  Atalanta, GA (“Onsite”)

Duration: 6+ months

Hourly Pay Rate-$60/hr - $65/C2C

Role Descriptions: Developer
Essential Skills: Azure Entra ID (Azure AD) authentication| conditional access| MFA| PIM| identity governanceAWS IAM roles| policies| permissions boundaries| federation| least privilegeOnPrem Active Directory (ADUC) group design| privileged access| GPOs| AD hygieneCyberArk PAM controls| vaulting| session management| privileged workflowsPingID authentication flows| MFA enforcement| integrationsSailPoint


Skills: Digital : AWS Mobile Hub & AWS Mobile Services~Sailpoint~Cyber Ark~Microsoft IAM~Azure Data Factory

Experience Required: 10 & Above

Identity & Access Management SME
Onsite/Offshore
This role will be responsible for executing the end to end IAM assessment across cloud, on prem, and third party identity platforms. This role focuses on technical evaluation, control analysis, maturity assessment, and risk identification, ensuring IAM capabilities align with security best practices, regulatory expectations, and business needs.

Key Responsibilities
IAM Assessment & Analysis
• Conduct detailed technical assessments across:
o Azure Entra ID (Azure AD) – authentication, conditional access, MFA, PIM, identity governance
o AWS IAM – roles, policies, permissions boundaries, federation, least privilege
o On Prem Active Directory (ADUC) – group design, privileged access, GPOs, AD hygiene
o CyberArk – PAM controls, vaulting, session management, privileged workflows
o PingID – authentication flows, MFA enforcement, integrations
o SailPoint – identity lifecycle management, access certifications, role modeling
• Evaluate current IAM architecture against industry standards (e.g., Zero Trust, least privilege, NIST/ISO concepts).
• Identify control gaps, design weaknesses, and security risks.
Control & Process Evaluation
• Assess identity lifecycle processes: joiner, mover, leaver (JML).
• Review access request, approval, provisioning, recertification, and de provisioning processes.
• Assess MFA, SSO, federation, and password policies.
• Evaluate privileged access controls and segregation of duties (SoD).
Risk & Recommendations
• Document IAM risks with clear impact and likelihood.
• Provide actionable remediation recommendations (short term and long term).
• Define IAM maturity levels and target state architecture.
• Align recommendations with business priorities and regulatory expectations.

Thanks & Regards!

Ankita Pal

Lead IT Recruiter

Email: ankit...@pacerstaffing.com

Reply all
Reply to author
Forward
0 new messages