IAM Engineer
Listed on 2025-12-01
-
IT/Tech
Cybersecurity, Information Security
Join to apply for the IAM Engineer role at Ryder System, Inc.
5 days ago Be among the first 25 applicants
Work Schedule:
Will have to work night shifts and weekends. REMOTE
SummaryThe identity and access management (IAM) engineer is a practitioner role working under the leadership of Information Security management. The IAM engineer helps define, establish, maintain, and manage identities across the organization. The engineer manages and maintains access to systems and applications following rigorous security, engineering, and governance principles, especially when provisioning and de-provisioning access. This position works closely with IT, cybersecurity operations, incident response, business units, and third parties.
In addition, the IAM engineer helps with provisioning, governing access, SSO, directory services, technical integrations and supporting behavioral analytics.
- Implement and configure global identity solutions and capabilities including Identity Governance, Single Sign On (SSO), Multi-Factor Authentication (MFA), privileged accounts, automation, and behavior analytics systems.
- Make recommendations and implement improvements in automation, onboarding, and provisioning configurations to improve the end-user experience.
- Document access workflows, policies, and exceptions, and maintain integrity of implemented identity solutions for audit reviews.
- Work closely with security leadership, teammates, and stakeholders to evaluate and implement access models that align with organizational risk posture.
- Assess and resolve IAM issues that occur across the employee base, as well as with external entities.
- Evaluate business impact and risk exposure based on the level of access granted and make recommendations where improvements should be made.
- Work closely with incident responders during potential incidents and elevate to management as needed.
- Frequently interact with business units to understand their plans, risk posture and tolerance, and how IAM supports their vision and business obligations with security in mind.
- Perform other duties as assigned.
- Familiarity with administering directory services, Windows and Azure AD, SSO, MFA and role-based access control (RBAC).
- Experience administering IAM systems, access controls, security and risk management, and security governance fundamentals.
- High degree of integrity, trustworthiness and confidence; represents the company and its management team with the highest level of professionalism.
- Demonstrates excellent judgment and decision making skills.
- Organized, with the ability to prioritize and complete tasks within defined SLAs.
- Understanding of service design, delivery concepts and control frameworks.
- Strong verbal and written communication skills.
- Track record acting with integrity, taking pride in work, seeking to excel, and being curious and flexible.
- Ideally familiar with one or more regulatory requirements and laws such as PCI, FFIEC, SOX, HIPAA, GDPR, GLBA, CCPA, NY DFS Cybersecurity Regulation; and preferred experience with ISO 27001, ITIL, and NIST.
- Experience with one or more scripting languages (e.g., Python, Power Shell, Bash) – intermediate preferred.
- H.S. diploma/GED required.
- Bachelor's degree preferred in Information Security, Computer Science, Information Technology, Information Assurance, or related technical field.
- Three (3) years or more Information Security or Information Technology practitioner experience required.
- Two (2) years or more related security systems administration with IAM solutions, and preferably some experience with endpoint, network or application security solutions.
- Experience with one or more scripting languages (e.g., Python, Power Shell, Bash) – intermediate preferred.
- Other security certifications such as Security+, CISSP, GSEC, GISF, or related information security certification.
Travel: 1-10%
DOT Regulated: None
Job Category: Information Security
Compensation InformationThe compensation offered to a candidate may be influenced by a variety of factors, including the candidate’s relevant experience, education, work location, market data, internal equity,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).