Share this job
Enterprise ICAM Architect
IT Federal Sales
Apply for this job

**** This position is remote with flexible travel requirements generally 25%



Roles & Responsibilities:


The ideal candidate would be able to accomplish the vast majority of the following enterprise-level tasks for a federal Department with multiple subordinate agencies and bureaus.


Design, document, and establish a consolidated service delivery model for SailPoint and RadiantOne; to include:

  • Identity governance and change management coordination inclusive of enterprise stakeholders
  • Identity data strategy and standardized model for managing identity data sources and resolving discrepancies/clean-up
  • Design service desk, incident response, and problem management for responding to requests and incidents and providing identity and access troubleshooting for the enterprise 
  • Develop roadmap for future bureau/application onboarding (intake, discovery, and integration) 
  • Assist in developing cost and charge model for bureau/application customers (align scalable costs with services provided) 


Coordinate Workload Migration

  • Realign SailPoint resources to migrate existing workloads
  • Redesign to streamline cloud platform approval processes


Contribute to overarching project plan, schedule/timeline, and identification of dependencies and risks to ensure transparency and communication of progress to executives.


Required Education: Bachelor's degree in computer science, information technology, MIS or related field, or equivalent industry experience.


Professional Certification: Required in either cybersecurity or ICAM related disciplines. Vendor-specific certifications such as SailPoint, Okta, CyberArk, Azure AD are considered a plus. SailPoint experience is most preferred.


Relevant Experience: 8+ years, 2 years’ experience may be replaced by a Master’s Degree. At least 7-10 years’ experience in ICAM.

Works with Project Managers and customers to manage expectations and timelines to ensure expectations and commitments are met. May regularly interface with technical and business staff of customers, including the project sponsor and stakeholders of projects in more complex engagements. Performs as a team lead directing and coordinating the work of all technical team members to complete projects successfully.


***Experience as a Federal Chief Information Security Officer (CISO) preferred


  • Provides guidance to formulate and define ICAM systems scope and objectives based on both user requirements and a thorough understanding of business and security requirements.
  • Directs the process to gathers requirements, estimate effort and to deploy and maintain ICAM solutions.
  • Provides expertise for best practices for identity management, access controls and credential integration for multi-factor authentication (MFA).
  • Extensive knowledge of SSO, Active Directory (AD), public key infrastructure (PKI), role-based access controls (RBAC), privileged accounts and integration application program interface (API) capabilities.
  • Devises or modifies procedures to solve complex ICAM related software and hardware issues.
  • Experience in ICAM solutions both on-premises and in the cloud.
  • Includes analysis of security policy and regulations, assessment of ICAM requirements and their translation into proper ICAM system requirements specifications and implementation.
  • Provides consultation on complex ICAM related projects and is the top-level contributor/specialist in most phases of ICAM systems analysis and implementation.
  • Develops migration approach and tools for applications and users using different forms of authentication, authorization, and provisioning to enterprise ICAM platforms.
  • Provides SME to develop concept of operations on administration, identity policy enforcement, migration, separation of duties and change management for ICAM solutions.
  • Highly technical and analytical, with a proven deep background in ICAM technology design, implementation and delivery.
  • Experience administering ICAM systems, access controls, security, and risk management, as well as a security governance framework at scale.
  • Track record acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.


Apply for this job
Powered by