IAM Architect; W2
Listed on 2026-03-08
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Dice is the leading career destination for tech experts at every stage of their careers. Our client, ERPA, is seeking the following. Apply via Dice today!
Title:IAM Architect
Locations:
Fort Mill, SC (outside of Charlotte, NC)/ Austin, TX / San Diego, CA – 3x hybrid (Must be local)
Must be able to convert full time without requiring sponsorship
Quick Hits- IAM Architect
- Tech:
Ping & Entra are most important - Ideally has Merger & Acquisition experience but can flex if someone has heavy consolidation/migration experience on resume
We are seeking an experienced Identity and Access Management (IAM) Architect to lead the design, implementation, and integration of IAM solutions as part of a merger and acquisition (M&A) activity for a wealth management firm. The ideal candidate will have expertise in Microsoft Entra (Azure AD), SailPoint Identity
IQ (IIQ), SailPoint Identity Security Cloud (ISC), Ping One Advanced Identity Cloud (AIC), Cyber Ark, Auth0, Core View, and Directory Services. This role will focus on discovery, design, and implementation of IAM solutions for the new organization, ensuring seamless integration of systems, secure access, and compliance with industry standards.
The IAM Architect will play a critical role in designing and implementing SSO, MFA, and federation solutions (SAML, OAuth, OIDC) to enable secure and efficient access for users during the conversion process. Additionally, the role will involve early access federation for the acquired organization during the transition and the development of a comprehensive IAM strategy for the new organization.
The IAM Architect will partner with engineering, security, infrastructure, and application teams to define and implement identity solutions that support business and security objectives.
Key Responsibilities- Discovery and Assessment
- Conduct a detailed discovery of the acquired organization’s IAM infrastructure, including Entra , directory services, and existing IAM tools.
- Assess the current state of SSO, MFA, and federation implementations (SAML, OAuth, OIDC) in both organizations.
- Identify gaps, risks, and opportunities for improvement in the IAM landscape.
- Design and Architecture
- Design comprehensive IAM architecture for the new organization, ensuring alignment with business goals, security requirements, and compliance standards.
- Develop a federation strategy to enable early access for the acquired organization during the conversion process.
- Architect solutions for SSO, MFA, and federation to ensure seamless access for users across systems and applications.
- Design and implement Entra t consolidation or coexistence strategies for the new organization.
- Implementation and Integration
- Lead the integration of IAM platforms, including Entra , SailPoint IIQ, SailPoint Identity Security Cloud (ISC), Ping One AIC, Cyber Ark, Delinea, Auth0, Core View, and Directory Services.
- Implement SSO and MFA solutions for secure access to applications and systems.
- Configure and manage federation protocols (SAML, OAuth, OIDC) to enable secure authentication and authorization across organizations.
- Collaborate with IT and security teams to ensure smooth migration and integration of IAM systems.
- Conversion Planning and Execution
- Develop a conversion strategy for migrating users, roles, and access policies from the acquired organization to the new IAM environment.
- Ensure minimal disruption to business operations during the conversion process.
- Provide technical leadership and guidance during the migration of Entra and other IAM components.
- Documentation and Communication
- Update and maintain IAM documentation to reflect the new architecture, processes, and policies.
- Create detailed design documents, runbooks, and operational guides for the new IAM environment.
- Communicate progress, risks, and challenges to stakeholders and leadership.
- Compliance and Security
- Ensure the IAM solution complies with industry regulations (e.g., FINRA, SEC, GDPR).
- Implement robust security measures to protect sensitive data and prevent unauthorized access.
- Collaboration and Stakeholder Management
- Work closely with IT, security, and business teams to gather requirements and ensure alignment with…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).