MathWorks-posted 9 days ago
Full-time • Mid Level
Hybrid • Natick, MA

MathWorks has a hybrid work model that enables staff members to split their time between office and home. The hybrid model provides the advantage of having both in-person time with colleagues and flexible at-home life optimizations. Learn More: https://www.mathworks.com/company/jobs/resources/applying-and-interviewing.html#onboarding. Do you design secure, resilient Active Directory at scale and enjoy automating identity operations? Join our Security Operations IAM team responsible for enterprise identity foundations across on‑prem Active Directory and Microsoft Entra ID. We partner with Security Engineering, IT, and Compliance to deliver hardened directory services, modern authentication, ITDR capabilities and Zero Trust controls that enable the business. MathWorks nurtures growth, appreciates inclusivity, encourages initiative, values teamwork, shares success, and rewards excellence. Responsibilities Operate and maintain on‑premises Active Directory: domain controller health, patching, promotion/demotion, replication, sites/subnets, time services, SYSVOL/GPO health, and capacity monitoring. Implement and manage Entra ID capabilities: Conditional Access, Identity Protection risk policies, PIM, and app registrations/service principals. Monitor, troubleshoot, and optimize directory synchronization and identity lifecycle flows. Partner with our SOC to drive a successfulITDRprogram.Helpbuild and tune detections to identify threats such as DCSync, Golden/Silver Ticket, Kerberoasting, pass‑the‑hash/ticket, risky sign‑ins, and impossible travel. Harden AD and Entra ID: apply baselines, admin tiering, PAW usage, secure delegation, privileged workflow controls, regular access reviews, and identity threat hunting. Automate identity operations and ITDR tasks with PowerShell and APIs (Graph/Entra): alert enrichment, response runbooks, access certifications, reporting, and drift remediation. Lead complex troubleshooting and incident response for identity (Kerberos/NTLM, replication, DCSync/Golden/Silver Ticket detections, Conditional Access failures); drive root cause and preventive actions. Produce runbooks, standards, and change records; mentor team members and collaborate with stakeholders to align IAM operations with business needs. Qualifications A bachelor's degree and 10 years of professional work experience (or equivalent experience) is required. Additional Qualifications A successful candidate for this role will have a combination of some or all of the following skills/experience: 7+ years in enterprise Active Directory operations and hardening including DC lifecycle management, sites/services, replication, BCDR, and observability. Hands-on experience with Microsoft Entra ID: Conditional Access, MFA, Identity Protection, PIM, app registration and service principal governance. Experience operating Azure AD Connect or Cloud Sync in hybrid identity environments. Identity Governance and Administration experience for provisioning, role/entitlement models, and access certifications. Proficiency with PowerShell, Python and Microsoft Graph/Entra APIs for automation. Experience with privileged access models and administrative tiering. Ability to support after-hours maintenance and incident response as needed. SSO/Federation: SAML/OIDC/OAuth; SCIM provisioning to SaaS apps. AD security: trusts, LDAP/LDAPS, constrained delegation, GPO hardening. PKI and certificates: AD CS, CRL/OCSP, auto enrollment, renewal automation for workloads and service principals/certs. Backup/Recovery: authoritative restore, forest recovery planning and drills. IaC/automation: DSC, GPO as Code, Git workflows; CI/CD familiarity for scripts/policies. Compliance familiarity: CMMC, NIST CSF/800‑53/171, ISO 27001

  • Operate and maintain on‑premises Active Directory: domain controller health, patching, promotion/demotion, replication, sites/subnets, time services, SYSVOL/GPO health, and capacity monitoring.
  • Implement and manage Entra ID capabilities: Conditional Access, Identity Protection risk policies, PIM, and app registrations/service principals.
  • Monitor, troubleshoot, and optimize directory synchronization and identity lifecycle flows.
  • Partner with our SOC to drive a successfulITDRprogram.
  • Helpbuild and tune detections to identify threats such as DCSync, Golden/Silver Ticket, Kerberoasting, pass‑the‑hash/ticket, risky sign‑ins, and impossible travel.
  • Harden AD and Entra ID: apply baselines, admin tiering, PAW usage, secure delegation, privileged workflow controls, regular access reviews, and identity threat hunting.
  • Automate identity operations and ITDR tasks with PowerShell and APIs (Graph/Entra): alert enrichment, response runbooks, access certifications, reporting, and drift remediation.
  • Lead complex troubleshooting and incident response for identity (Kerberos/NTLM, replication, DCSync/Golden/Silver Ticket detections, Conditional Access failures); drive root cause and preventive actions.
  • Produce runbooks, standards, and change records; mentor team members and collaborate with stakeholders to align IAM operations with business needs.
  • A bachelor's degree and 10 years of professional work experience (or equivalent experience) is required.
  • 7+ years in enterprise Active Directory operations and hardening including DC lifecycle management, sites/services, replication, BCDR, and observability.
  • Hands-on experience with Microsoft Entra ID: Conditional Access, MFA, Identity Protection, PIM, app registration and service principal governance.
  • Experience operating Azure AD Connect or Cloud Sync in hybrid identity environments.
  • Identity Governance and Administration experience for provisioning, role/entitlement models, and access certifications.
  • Proficiency with PowerShell, Python and Microsoft Graph/Entra APIs for automation.
  • Experience with privileged access models and administrative tiering.
  • Ability to support after-hours maintenance and incident response as needed.
  • SSO/Federation: SAML/OIDC/OAuth; SCIM provisioning to SaaS apps.
  • AD security: trusts, LDAP/LDAPS, constrained delegation, GPO hardening.
  • PKI and certificates: AD CS, CRL/OCSP, auto enrollment, renewal automation for workloads and service principals/certs.
  • Backup/Recovery: authoritative restore, forest recovery planning and drills.
  • IaC/automation: DSC, GPO as Code, Git workflows; CI/CD familiarity for scripts/policies.
  • Compliance familiarity: CMMC, NIST CSF/800‑53/171, ISO 27001
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service