There are still lots of open positions. Let's find the one that's right for you.
The Enterprise IAM Solutions Architect's primary role is to administer, implement, and support identity governance and access technologies at Stride. This position is crucial for designing, building, and improving systems that secure workforce and privileged identities using both cloud-native and traditional approaches. The architect will collaborate closely with other IT professionals, including system engineers and security specialists, to ensure seamless integrations into the overall IT infrastructure. Troubleshooting IAM and IGA issues, developing creative solutions, and implementing IGA and IAM controls are key responsibilities, along with supporting IT IAM Controls testing for both SOX and non-SOX requirements. Additionally, the architect will create detailed technical documentation and architectural diagrams to support IAM and PAM initiatives. To excel in this role, candidates should possess extensive experience in IAM, IGA, and PAM technologies, coupled with strong project management skills to lead and coordinate projects across multiple teams and stakeholders. Excellent communication and interpersonal skills are essential, as the architect will work closely with stakeholders at all levels of the organization to develop and implement IAM solutions. A solid understanding of IT governance frameworks and compliance with relevant regulations and standards is also crucial for success in this position. The essential functions of this role include designing, implementing, and maintaining Stride's Identity Governance, Management, and Privileged Access Management technologies, enforcing company policies related to IAM, IGA, and PAM, and leading IAM, IGA, and PAM projects from inception to completion. The architect will also be responsible for creating detailed technical documentation, providing expert guidance on workforce identity management best practices, and ensuring compliance with FERPA regulatory standards. This position requires interfacing across multiple business areas to coordinate deliverables, build consensus, and influence outcomes, while also monitoring the regulatory environment for impacts on security and IT risk programs.