This position will be fully remote and can be hired anywhere in the continental U.S. Our Advanced Fusion Center Identity practice runs and improves clients’ SailPoint ISC/IIQ and Zilla programs day-to-day. As a Sr. Identity Engineer, you will handle escalations from Tier 1, stabilize and optimize production, and drive small/medium enhancements. The Sr. Identity Engineer will keep identity lifecycle, access requests, certifications, and policy enforcement humming— with operational discipline, measurable SLAs, and crisp client communication. CyberArk and Okta integrations are nice-to-have, not the main event. Bottom line, this is a dual-platform Tier-2 identity operations role inside AFC. You’ll keep Zilla and SailPoint governance reliable at scale, automate the boring stuff, and speak plainly about risk, impact, and fixes. How you’ll make an impact Keep Sources, Identity Profiles, Access Profiles, Entitlements, Roles, Lifecycle events, Access Requests, Approvals, and Certifications healthy and on-schedule. Build and optimize workflows, transforms, and policies (SoD, RBAC) in Zilla and ISC. Monitor and resolve aggregations, account correlations, provisioning failures, and campaign anomalies, tune schedules and thresholds. Maintain and troubleshoot Virtual Appliance (VA) health, connector upgrades, and connectivity (e.g., AD/Entra, HRIS, SaaS apps, databases). Build and maintain Workflows (low code), Transforms, policies (SoD, separation of function), and request/catalog items. Run monthly health checks and deliver operational reports (KPIs, trendlines, incidents, changes, and risk/compliance signals). Act as escalation for Tier 1: triage, contain, and restore; perform root cause analysis and implement durable fixes. Create and improve runbooks/SOPs; automate recurring fixes and checks. Plan and execute low-risk changes (connector tuning, attribute mappings, workflow edits, catalog updates) within ITSM guardrails. Contribute to release readiness: sandbox validation, UAT coordination, deployment notes, and rollback plans. Translate operational signals into clear actions for client IAM owners and app teams. Advise on access modeling (Access Profiles vs. Roles), campaign design, and birthright vs. requestable access. Provide backlog intake sizing for Tier-3/architecture where code or complex redesigns are required. Okta/Entra ID Integration experience: Govern downstream via SCIM/API targets; align joiner/mover/leaver flows; validate group/entitlement posture. CyberArk (PAM) Integration experience: Support governance integrations (e.g., safe/platform entitlement visibility, request/approval via SailPoint); assist with out-of-band privilege variance findings and clean-up campaigns. Feed events and metrics to SIEM/SOC (webhooks/API), enrich tickets with context, and contribute to correlation use-cases (e.g., excessive privilege anomalies, orphan/rogue accounts). Partner with compliance teams on attestation evidence, control testing cadence, and audit responses.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed
Number of Employees
1,001-5,000 employees