ECS
ICAM Operations - IGA Lead (Identity Governance and Administration)
ECS, Washington, District of Columbia, us, 20022
ICAM Operations - IGA Lead (Identity Governance and Administration)
Join to apply for the
ICAM Operations - IGA Lead (Identity Governance and Administration)
role at
ECS .
Location: Washington, DC. The role will be based in the Washington, DC office.
Job Description
ECS is seeking an IGA Operations - Lead (IGA) to oversee and guide the Identity Governance & Administration (IGA) program, manage a team of developers and engineers, and provide strategic direction for future IGA tool transitions. This role requires a balance of technical expertise and leadership to ensure compliance, efficiency, and modernization of identity governance and user access management. In the interim, the IGA Lead will lead the team, make recommendations, maintain and update the current PAC application, and provide hands‑on development and troubleshooting of Java‑based components.
Key Responsibilities
Lead and manage the development team: supervise Oracle Developers, DBAs, PAC Developers, and IAM Engineers.
Drive IGA strategy & modernization: recommend and guide transition to new IGA solutions such as Saviynt, SailPoint, or ForgeRock while optimizing existing capabilities.
Define and enforce identity governance policies: establish best practices for RBAC, access reviews, privileged access management (PAM).
Optimize user lifecycle management: oversee provisioning, de‑provisioning, access certification, and workflow automation.
Integrate IGA with existing systems: ensure interoperability between IGA, Active Directory, PAC, and other enterprise applications.
Monitor and improve IAM security & compliance: implement policies to meet federal security mandates and reduce identity‑related risks.
Advise on IGA tool selection & implementation: assess current and future IGA needs, evaluate and transition to modern solutions if required.
Collaborate with stakeholders: work closely with IT security, business units, and agency leadership.
Provide technical oversight & hands‑on development: work directly on Java‑based PAC components, troubleshooting, and implementing system enhancements.
Maintain and update PAC application: oversee maintenance and updates to ensure reliability and alignment with best practices.
Required Skills
Active Top‑Secret Clearance (SCI eligibility & CI‑Poly preferred).
7+ years of IAM experience focused on IGA solutions.
Strong expertise in one or more IGA tools: Saviynt, SailPoint, ForgeRock, or equivalent.
Experience managing IAM development teams.
In‑depth knowledge of identity governance best practices, RBAC, NIST 800‑53, FISMA, Zero Trust.
Familiarity with Oracle Identity Manager (OIM) and Provisioning Access Control (PAC).
Proficiency in Java for troubleshooting and development of PAC components.
Understanding of Active Directory, SAML, OAuth, cloud IAM integrations.
Strong communication skills to provide strategic guidance.
Desired Skills
Experience transitioning legacy IAM/IGA systems to modern solutions.
Knowledge of PAM tools such as CyberArk or BeyondTrust.
Familiarity with federal IAM requirements and government security frameworks.
Experience in automation and AI‑driven identity analytics.
Salary Range $161,700 - $192,200
Benefits General description of benefits available at ECS (details omitted).
Equal Opportunity Statement ECS is an equal‑opportunity employer. All qualified applicants will receive consideration for employment without regard to disability, veteran status, or any other protected status.
Contact Referrals are encouraged. Get notified about new operations lead jobs in Washington, DC.
#J-18808-Ljbffr
ICAM Operations - IGA Lead (Identity Governance and Administration)
role at
ECS .
Location: Washington, DC. The role will be based in the Washington, DC office.
Job Description
ECS is seeking an IGA Operations - Lead (IGA) to oversee and guide the Identity Governance & Administration (IGA) program, manage a team of developers and engineers, and provide strategic direction for future IGA tool transitions. This role requires a balance of technical expertise and leadership to ensure compliance, efficiency, and modernization of identity governance and user access management. In the interim, the IGA Lead will lead the team, make recommendations, maintain and update the current PAC application, and provide hands‑on development and troubleshooting of Java‑based components.
Key Responsibilities
Lead and manage the development team: supervise Oracle Developers, DBAs, PAC Developers, and IAM Engineers.
Drive IGA strategy & modernization: recommend and guide transition to new IGA solutions such as Saviynt, SailPoint, or ForgeRock while optimizing existing capabilities.
Define and enforce identity governance policies: establish best practices for RBAC, access reviews, privileged access management (PAM).
Optimize user lifecycle management: oversee provisioning, de‑provisioning, access certification, and workflow automation.
Integrate IGA with existing systems: ensure interoperability between IGA, Active Directory, PAC, and other enterprise applications.
Monitor and improve IAM security & compliance: implement policies to meet federal security mandates and reduce identity‑related risks.
Advise on IGA tool selection & implementation: assess current and future IGA needs, evaluate and transition to modern solutions if required.
Collaborate with stakeholders: work closely with IT security, business units, and agency leadership.
Provide technical oversight & hands‑on development: work directly on Java‑based PAC components, troubleshooting, and implementing system enhancements.
Maintain and update PAC application: oversee maintenance and updates to ensure reliability and alignment with best practices.
Required Skills
Active Top‑Secret Clearance (SCI eligibility & CI‑Poly preferred).
7+ years of IAM experience focused on IGA solutions.
Strong expertise in one or more IGA tools: Saviynt, SailPoint, ForgeRock, or equivalent.
Experience managing IAM development teams.
In‑depth knowledge of identity governance best practices, RBAC, NIST 800‑53, FISMA, Zero Trust.
Familiarity with Oracle Identity Manager (OIM) and Provisioning Access Control (PAC).
Proficiency in Java for troubleshooting and development of PAC components.
Understanding of Active Directory, SAML, OAuth, cloud IAM integrations.
Strong communication skills to provide strategic guidance.
Desired Skills
Experience transitioning legacy IAM/IGA systems to modern solutions.
Knowledge of PAM tools such as CyberArk or BeyondTrust.
Familiarity with federal IAM requirements and government security frameworks.
Experience in automation and AI‑driven identity analytics.
Salary Range $161,700 - $192,200
Benefits General description of benefits available at ECS (details omitted).
Equal Opportunity Statement ECS is an equal‑opportunity employer. All qualified applicants will receive consideration for employment without regard to disability, veteran status, or any other protected status.
Contact Referrals are encouraged. Get notified about new operations lead jobs in Washington, DC.
#J-18808-Ljbffr