Macpower Digital Assets Edge
Senior Identity Services Engineer
Macpower Digital Assets Edge, New York, New York, us, 10261
Position Summary:
Operate and maintain the organization's Identity and Access Management (IAM) products.
Integrate applications and implement access control systems.
Perform data analysis, reporting, incident investigation, and remediation.
Manage basic server administration tasks.
Contribute to architecture and planning for new technologies and policies.
Provide leadership and guidance to the team.
Essential Job Duties:
Design, implement, and support enterprise SSO solutions using PingFederate, Azure AD, or Okta. Maintain and enhance access management platforms and federation infrastructure. Lead application integrations using SAML, OAuth2, and OIDC. Implement and support RBAC and modern authentication methods. Improve authentication strategies across the organization. Collaborate with security, application owners, and infrastructure teams. Troubleshoot complex authentication and federation issues across environments. Participate in IAM roadmap planning and architectural decisions. Mentor and provide technical guidance to IAM engineers. Support governance for authentication, authorization, and access control standards Preferred Qualifications:
Hands-on experience with Ping Identity tools such as PingFederate, PingOne, PingID, and PingDirectory. Experience with MFA and passwordless methods including FIDO2 and WebAuthn. Experience building and configuring enterprise SSO apps in Azure AD or Entra ID. Exposure to IAM orchestration platforms such as PingOne DaVinci or similar tools. Experience supporting cloud identity integrations in Azure, AWS, or GCP. Familiarity with hybrid SSO for on-premises and cloud applications. Strong documentation and communication skills. bility to collaborate across technical and non-technical teams. bility to lead projects and mentor junior engineers. Required Qualifications:
5+ years of IAM experience focused on SSO and federation. Deep knowledge of PingFederate, Azure AD, Okta, and ADFS. Strong understanding of SAML, OIDC, and OAuth2. Experience with LDAP, Active Directory, and SCIM. Proficiency with PowerShell, Python, and Java. Experience with REST APIs and tools such as Postman. Familiarity with OGNL for customizing PingFederate policies. Front-end customization using HTML, CSS, and JavaScript. Basic Linux administration skills. Knowledge of PKI and certificates, including X.509, certificate chains, signing, encryption, and keystore management. Strong troubleshooting skills across application, identity, and network layers. Understanding of Zero Trust, adaptive authentication, and conditional access.
Design, implement, and support enterprise SSO solutions using PingFederate, Azure AD, or Okta. Maintain and enhance access management platforms and federation infrastructure. Lead application integrations using SAML, OAuth2, and OIDC. Implement and support RBAC and modern authentication methods. Improve authentication strategies across the organization. Collaborate with security, application owners, and infrastructure teams. Troubleshoot complex authentication and federation issues across environments. Participate in IAM roadmap planning and architectural decisions. Mentor and provide technical guidance to IAM engineers. Support governance for authentication, authorization, and access control standards Preferred Qualifications:
Hands-on experience with Ping Identity tools such as PingFederate, PingOne, PingID, and PingDirectory. Experience with MFA and passwordless methods including FIDO2 and WebAuthn. Experience building and configuring enterprise SSO apps in Azure AD or Entra ID. Exposure to IAM orchestration platforms such as PingOne DaVinci or similar tools. Experience supporting cloud identity integrations in Azure, AWS, or GCP. Familiarity with hybrid SSO for on-premises and cloud applications. Strong documentation and communication skills. bility to collaborate across technical and non-technical teams. bility to lead projects and mentor junior engineers. Required Qualifications:
5+ years of IAM experience focused on SSO and federation. Deep knowledge of PingFederate, Azure AD, Okta, and ADFS. Strong understanding of SAML, OIDC, and OAuth2. Experience with LDAP, Active Directory, and SCIM. Proficiency with PowerShell, Python, and Java. Experience with REST APIs and tools such as Postman. Familiarity with OGNL for customizing PingFederate policies. Front-end customization using HTML, CSS, and JavaScript. Basic Linux administration skills. Knowledge of PKI and certificates, including X.509, certificate chains, signing, encryption, and keystore management. Strong troubleshooting skills across application, identity, and network layers. Understanding of Zero Trust, adaptive authentication, and conditional access.