Back to Home

Identity Administrator - Secure and Streamline Digital Access

💰 $75,000 - $110,000

ITCybersecurityIdentity and Access Management

🎯 Role Definition

As an Identity Administrator, you will be the gatekeeper of our digital ecosystem, responsible for managing the entire lifecycle of user identities and their access privileges. You will operate at the intersection of IT, security, and business operations, ensuring that the right individuals have the right access to the right resources at the right time. This role is critical for protecting our sensitive data, enforcing security policies, and enabling productivity across the organization. You will administer our core IAM platforms, troubleshoot complex access issues, and play a key part in evolving our identity governance strategy to meet future challenges.


📈 Career Progression

Typical Career Path

Entry Point From:

  • IT Support Specialist / Help Desk Analyst
  • Junior Systems Administrator
  • Network Administrator

Advancement To:

  • Senior Identity Engineer / IAM Engineer
  • IAM Architect
  • Cybersecurity Analyst / Information Security Manager

Lateral Moves:

  • Cloud Security Administrator
  • Systems Engineer

Core Responsibilities

Primary Functions

  • Manage the end-to-end user identity lifecycle, including the seamless onboarding of new hires, processing transfers, and executing timely offboarding procedures to mitigate security risks.
  • Administer and maintain our core Identity and Access Management (IAM) platforms, such as Okta, Azure AD, or SailPoint, ensuring high availability and optimal performance.
  • Provision, modify, and de-provision user access to a wide range of on-premise and cloud-based applications, systems, and data repositories in accordance with established policies.
  • Serve as the primary point of contact for troubleshooting and resolving user access issues, authentication problems, and permission discrepancies in a timely and professional manner.
  • Develop, implement, and enforce Role-Based Access Control (RBAC) models to streamline access assignments and uphold the principle of least privilege across the enterprise.
  • Conduct regular access reviews and certification campaigns with business and application owners to ensure access rights remain appropriate and compliant with security standards.
  • Manage and maintain Active Directory (AD) and Azure Active Directory (Azure AD), including user objects, security groups, distribution lists, and Group Policy Objects (GPOs).
  • Configure and manage Single Sign-On (SSO) and federation services using protocols like SAML, OAuth, and OpenID Connect to provide a secure and frictionless user experience.
  • Implement and support Multi-Factor Authentication (MFA) solutions, ensuring robust identity verification for access to critical company resources.
  • Create and maintain comprehensive documentation for all IAM processes, procedures, system configurations, and user guides to ensure consistency and knowledge sharing.
  • Collaborate closely with HR, IT Security, and other business units to ensure identity data is accurate and that access management processes align with business needs and security policies.
  • Respond to and process access requests submitted through our IT Service Management (ITSM) system, such as ServiceNow or Jira, ensuring requests are fulfilled within SLA targets.
  • Participate in internal and external audits by providing evidence, reports, and detailed explanations of our access control mechanisms and procedures to demonstrate compliance.
  • Automate routine identity management tasks and processes using scripting languages, primarily PowerShell, to improve efficiency and reduce the potential for human error.
  • Administer Privileged Access Management (PAM) solutions like CyberArk or Delinea to secure, manage, and monitor access to highly sensitive accounts and systems.
  • Monitor IAM systems and logs for anomalous or unauthorized activity, and assist the security operations team in investigating potential identity-related security incidents.
  • Assist in the evaluation, selection, and implementation of new IAM technologies and tools to continuously enhance our security posture and operational efficiency.
  • Define and enforce password policies and other authentication standards across the organization to strengthen our first line of defense against unauthorized access.
  • Generate and analyze reports on user access, entitlement data, and compliance metrics to provide insights to leadership and support strategic decision-making.
  • Provide training and support to end-users and other IT staff on IAM-related tools, policies, and best practices to foster a culture of security awareness.
  • Participate in disaster recovery and business continuity planning and testing, specifically focusing on the restoration and availability of identity services.

Secondary Functions

  • Support ad-hoc data requests and exploratory data analysis related to user access patterns.
  • Contribute to the organization's broader data security strategy and technology roadmap.
  • Collaborate with business units to translate data access needs into technical engineering requirements.
  • Participate in sprint planning and agile ceremonies within the broader cybersecurity and IT infrastructure teams.

Required Skills & Competencies

Hard Skills (Technical)

  • IAM Platform Administration: Deep hands-on experience managing enterprise IAM solutions such as Okta, SailPoint, Ping Identity, or ForgeRock.
  • Directory Services: Advanced proficiency in administering Microsoft Active Directory (AD) and Azure Active Directory (Azure AD), including OU structure, GPOs, and hybrid identity.
  • Authentication Protocols: Strong understanding and practical experience with modern authentication and authorization standards like SAML, OAuth 2.0, OpenID Connect (OIDC), and SCIM.
  • Scripting & Automation: Proven ability to automate IAM tasks using PowerShell, Python, or other scripting languages to drive efficiency and consistency.
  • SSO/MFA Technologies: Expertise in configuring and troubleshooting Single Sign-On (SSO) application integrations and Multi-Factor Authentication (MFA) policies and technologies.
  • Privileged Access Management (PAM): Experience with the concepts and administration of PAM solutions (e.g., CyberArk, Delinea) for securing privileged credentials.
  • ITSM Tools: Familiarity with using IT Service Management platforms like ServiceNow, Jira, or BMC Remedy for managing access requests and incidents.
  • Compliance & Auditing: Knowledge of regulatory and compliance frameworks such as SOX, GDPR, HIPAA, and experience participating in access-related audits.

Soft Skills

  • Analytical & Problem-Solving: Superior ability to investigate complex access-related problems, identify root causes, and implement robust, effective solutions.
  • Attention to Detail: Meticulous and thorough in executing access changes and reviewing configurations to prevent security gaps and operational errors.
  • Communication Skills: Excellent verbal and written communication skills, with the ability to clearly explain technical concepts to non-technical stakeholders and end-users.
  • Collaboration & Teamwork: A strong collaborative mindset to work effectively with cross-functional teams, including HR, application owners, and the security team.
  • Customer Service Orientation: A commitment to providing excellent support to end-users, resolving their access issues with patience and professionalism.
  • Time Management: Strong organizational skills to manage and prioritize multiple tasks, requests, and projects in a fast-paced environment.

Education & Experience

Educational Background

Minimum Education:

  • Bachelor's degree in a technical field, or an equivalent combination of industry-recognized certifications (e.g., CompTIA Security+, Okta Certified Administrator) and relevant work experience.

Preferred Education:

  • Bachelor’s or Master’s degree in a field related to Information Technology or Cybersecurity.

Relevant Fields of Study:

  • Computer Science
  • Cybersecurity
  • Information Systems / Information Technology

Experience Requirements

Typical Experience Range:

  • 3-5 years of direct experience in an Identity and Access Management, Systems Administration, or Information Security role.

Preferred:

  • Experience working within a large, complex enterprise environment with a diverse set of on-premise and cloud applications.
  • Demonstrable project experience involving the implementation or major upgrade of an IAM system.