Description
incident response
pki deployment
sso integration
scim provisioning
iam governance
directory services
Under the direction of the Identity and Access Manager, the Identity & Access Engineer will play a critical role in the implementation, integration, and support of advanced Identity and Access Management (IAM) solutions across the Clayco Enterprise. This role contributes to the design, configuration, and lifecycle management of IAM platforms and policies that enforce secure, scalable, and compliant access to internal systems, cloud services, and third-party applications. This role focuses on the engineering and integration of IAM capabilities, such as directory services, SSO/MFA platforms, PKI, and access provisioning automation, while also serving as a technical escalation point for operational IAM functions.
The Identity & Access Engineer also contributes to the ongoing adoption and expansion of Data-driven identity life-cycles and the dynamic modification of access and entitlements as identity context and details change. This role also ensures compliance with regulatory requirements, enhancing security through access control and identity verification mechanisms.
- As a member of the Information Security Team, contributes however and whenever necessary to Incident Response efforts as circumstance dictates
- Integrations of identity management solutions with in-house applications, third party applications, and Cloud services
- Maintain and support automated provisioning/deprovisioning workflows using tools like SCIM, orchestration workflows, API-based connectors, etc.
- Lead the implementation, deployment, and maturing of PKI Services to support Certificate-based authentication and trust mechanisms across Clayco’s Email infrastructure, Client Infrastructure, and Document Signing processes.
- Collaborate on standard integrations of cloud and on-premise apps into the SSO/MFA ecosystem, leveraging standards like SAML 2.0, OAuth 2.0, and SCIM, Lead on more complex integrations.
- Serve as technical escalation point and operational coverage when necessary for the following technologies:
- Integration & tuning of related IAM Security Log Sources for SIEM ingestion
- Ensure all IAM integrations and implementations align with least-privilege, role-based access models, identity governance policies, and regulatory/contractual requirements.
- Collaborate with the Information Security and Architecture teams on the design and implementation of new IAM services, including PKI, PIM/PAM, federated authentication, and certificate-based access control.
- Participate in solution evaluations, proof of concept testing, and implementation planning for emerging IAM capabilities.
- Document system and component configurations, integrations, testing and validation procedures, and knowledgebase articles for long-term operational sustainability.
- Contribute to infrastructure readiness assessments and configuration planning during IAM-related project initiatives and system rollouts.
- Design and implement Directory Services integrations and Identity Provider (IdP) connections for both internal and third-party applications