Logo
Kappaalphapsi1911

Principal IAM/AD Engineer (36396-MMCC)

Kappaalphapsi1911, Natick, Massachusetts, us, 01760

Save Job

MathWorks has a hybrid work model that enables staff members to split their time between office and home. The hybrid model provides the advantage of having both in-person time with colleagues and flexible at-home life optimizations. Learn More: https://www.mathworks.com/company/jobs/resources/applying-and-interviewing.html#onboarding.

Do you design secure, resilient Active Directory at scale and enjoy automating identity operations? Join our Security Operations IAM team responsible for enterprise identity foundations across onprem Active Directory and Microsoft Entra ID. We partner with Security Engineering, IT, and Compliance to deliver hardened directory services, modern authentication, ITDR capabilities and Zero Trust controls that enable the business.

MathWorks nurtures growth, appreciates inclusivity, encourages initiative, values teamwork, shares success, and rewards excellence.

Responsibilities

Operate and maintain onpremises Active Directory: domain controller health, patching, promotion/demotion, replication, sites/subnets, time services, SYSVOL/GPO health, and capacity monitoring.

Implement and manage Entra ID capabilities: Conditional Access, Identity Protection risk policies, PIM, and app registrations/service principals.

Monitor, troubleshoot, and optimize directory synchronization and identity lifecycle flows.

Partner with our SOC to drive a successful ITDR program. Build and tune detections to identify threats such as DCSync, Golden/Silver Ticket, Kerberoasting, passthehash/ticket, risky signins, and impossible travel.

Harden AD and Entra ID: apply baselines, admin tiering, PAW usage, secure delegation, privileged workflow controls, regular access reviews, and identity threat hunting.

Automate identity operations and ITDR tasks with PowerShell and APIs (Graph/Entra): alert enrichment, response runbooks, access certifications, reporting, and drift remediation.

Lead complex troubleshooting and incident response for identity (Kerberos/NTLM, replication, DCSync/Golden/Silver Ticket detections, Conditional Access failures); drive root cause and preventive actions.

Produce runbooks, standards, and change records; mentor team members and collaborate with stakeholders to align IAM operations with business needs.

Qualifications

7+ years in enterprise Active Directory operations and hardening including DC lifecycle management, sites/services, replication, BCDR, and observability.

Hands‑on experience with Microsoft Entra ID: Conditional Access, MFA, Identity Protection, PIM, app registration and service principal governance.

Experience operating Azure AD Connect or Cloud Sync in hybrid identity environments.

Identity Governance and Administration experience for provisioning, role/entitlement models, and access certifications.

Proficiency with PowerShell, Python and Microsoft Graph/Entra APIs for automation.

Experience with privileged access models and administrative tiering.

Ability to support after‑hours maintenance and incident response as needed.

SSO/Federation: SAML/OIDC/OAuth; SCIM provisioning to SaaS apps.

AD security: trusts, LDAP/LDAPS, constrained delegation, GPO hardening, PAWs.

PKI and certificates: AD CS, CRL/OCSP, auto enrollment, renewal automation for workloads and service principals/certs.

Backup/Recovery: authoritative restore, forest recovery planning and drills.

IaC/automation: DSC, GPO as Code, Git workflows; CI/CD familiarity for scripts/policies.

Compliance familiarity: CMMC, NIST CSF/80053/171, ISO 27001

Required Qualifications

A bachelor's degree and 10 years of professional work experience (or equivalent experience) is required.

The MathWorks, Inc. is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics. The EEO is the Law poster is available here. MathWorks participates in E‑Verify. View the E‑Verify posters here. PDN-a03948c6-31c5-489b-970f-c11be1ad3b2f

#J-18808-Ljbffr