SAP
FedRAMP Identity and Access Management (IAM) Engineer - Senior Level
SAP, Reston, Virginia, United States, 22090
Overview
FedRAMP Identity and Access Management (IAM) Engineer - Senior Level
to lead and support our secure, compliant, and scalable authentication, authorization, and account lifecycle processes. This role requires advanced knowledge of IAM technologies and standards, with a strong emphasis on
FedRAMP ,
FISMA , and other federal compliance frameworks. The ideal candidate is highly experienced in
Active Directory (AD) ,
Linux environments ,
Okta ,
SSO/MFA solutions , and
AWS IAM ,
EntraID ,
GCP , and understands the unique security and compliance requirements of a federal environment. Responsibilities
Design, implement, and maintain IAM solutions that meet FedRAMP Moderate/High and other compliance requirements. Design and manage secure account lifecycle processes (provisioning, modification, termination) across Windows/AD, Linux, cloud (AWS), and SaaS environments. Operate and optimize Active Directory forests, domains, and trusts, including GPO, OU design, and privileged access management. Administer Okta for identity federation, SSO, MFA, and directory integration, ensuring alignment with FedRAMP and NIST 800-53 controls. Implement and maintain AWS IAM roles, policies, SCPs, and federation for secure cloud access. Manage and secure Linux-based authentication and PAM solutions integrated with corporate directories. Partner with security, compliance, and operations teams to support audits (PCI, SOC2, FedRAMP) and produce required evidence. Develop and enforce IAM policies, standards, and procedures aligned with zero-trust principles and least privilege. Troubleshoot and resolve identity-related incidents and requests in a timely and compliant manner. Provide SME-level guidance to stakeholders on IAM technologies and security best practices. Stay current with evolving federal regulations, IAM technologies, and industry trends. Required Qualifications
Eligible for Tier 2 Public Trust security clearance (or higher) — U.S. Citizen or lawful permanent resident. 7+ years of hands-on experience in IAM engineering, including at least 2+ years supporting FedRAMP, FISMA, or similar federal programs. Expert-level knowledge of: Identity governance and administration (IGA) principles and tools. Active Directory (AD DS, ADFS, Azure AD), GPO, LDAP. Linux authentication and PAM, SSH key management. SSO/MFA protocols and technologies (SAML, OIDC, OAuth, FIDO2, Okta). AWS IAM, SCPs, role assumption, and federation. Strong understanding of NIST 800-53, FedRAMP Moderate/High controls, and least privilege / separation of duties concepts. Experience preparing for and supporting compliance audits and assessments. Proven scripting and automation experience (PowerShell, Bash, Python, etc.) for IAM-related tasks. Excellent communication, documentation, and collaboration skills Clearance Required: Eligible for Tier 2 Public Trust (Moderate Risk) or higher (background investigation required) Note : This description avoids boilerplate and unrelated postings and focuses on responsibilities and qualifications for the role.
#J-18808-Ljbffr
FedRAMP Identity and Access Management (IAM) Engineer - Senior Level
to lead and support our secure, compliant, and scalable authentication, authorization, and account lifecycle processes. This role requires advanced knowledge of IAM technologies and standards, with a strong emphasis on
FedRAMP ,
FISMA , and other federal compliance frameworks. The ideal candidate is highly experienced in
Active Directory (AD) ,
Linux environments ,
Okta ,
SSO/MFA solutions , and
AWS IAM ,
EntraID ,
GCP , and understands the unique security and compliance requirements of a federal environment. Responsibilities
Design, implement, and maintain IAM solutions that meet FedRAMP Moderate/High and other compliance requirements. Design and manage secure account lifecycle processes (provisioning, modification, termination) across Windows/AD, Linux, cloud (AWS), and SaaS environments. Operate and optimize Active Directory forests, domains, and trusts, including GPO, OU design, and privileged access management. Administer Okta for identity federation, SSO, MFA, and directory integration, ensuring alignment with FedRAMP and NIST 800-53 controls. Implement and maintain AWS IAM roles, policies, SCPs, and federation for secure cloud access. Manage and secure Linux-based authentication and PAM solutions integrated with corporate directories. Partner with security, compliance, and operations teams to support audits (PCI, SOC2, FedRAMP) and produce required evidence. Develop and enforce IAM policies, standards, and procedures aligned with zero-trust principles and least privilege. Troubleshoot and resolve identity-related incidents and requests in a timely and compliant manner. Provide SME-level guidance to stakeholders on IAM technologies and security best practices. Stay current with evolving federal regulations, IAM technologies, and industry trends. Required Qualifications
Eligible for Tier 2 Public Trust security clearance (or higher) — U.S. Citizen or lawful permanent resident. 7+ years of hands-on experience in IAM engineering, including at least 2+ years supporting FedRAMP, FISMA, or similar federal programs. Expert-level knowledge of: Identity governance and administration (IGA) principles and tools. Active Directory (AD DS, ADFS, Azure AD), GPO, LDAP. Linux authentication and PAM, SSH key management. SSO/MFA protocols and technologies (SAML, OIDC, OAuth, FIDO2, Okta). AWS IAM, SCPs, role assumption, and federation. Strong understanding of NIST 800-53, FedRAMP Moderate/High controls, and least privilege / separation of duties concepts. Experience preparing for and supporting compliance audits and assessments. Proven scripting and automation experience (PowerShell, Bash, Python, etc.) for IAM-related tasks. Excellent communication, documentation, and collaboration skills Clearance Required: Eligible for Tier 2 Public Trust (Moderate Risk) or higher (background investigation required) Note : This description avoids boilerplate and unrelated postings and focuses on responsibilities and qualifications for the role.
#J-18808-Ljbffr