Ce recruteur est en ligne!

Voilà ta chance d'être vu en premier!

Postuler maintenant

IAM Engineer to support Incident Response Efforts with our client in the Public Sector

Toronto, ON
  • Nombre de poste(s) à combler : 1

  • À discuter
  • Emploi Contrat

  • Publié il y a 4 semaines
  • Date d'entrée en fonction : 1 poste à combler dès que possible

Location: Hamilton, ON

Onsite 2 days/week - Tues/Wed MANDATORY - the schedule will alternate between two days onsite, then three days, and back to two days, and so on.

Hours: 35/Week

Contract: 4+ months + extension



Overview

We’re looking for a hands‑on Identity & Access Management (IAM) Engineer to build and support our identity platforms, including SSO, Okta, Microsoft Entra (Azure AD), Active Directory, PAM, and Identity Governance tools.

Day‑to‑Day Responsibilities
  • Manage and support SSO integrations (SAML, OIDC, OAuth).
  • Administer Okta and Microsoft Entra ID (MFA, Conditional Access, app integrations).
  • Maintain Active Directory users, groups, policies, and service accounts.
  • Support and operate PAM tools (CyberArk, BeyondTrust, or Entra PIM).
  • Assist with Identity Governance: access reviews, role management, JML (joiner/mover/leaver).
  • Automate identity tasks using PowerShell, Graph API, or Okta APIs.
  • Troubleshoot authentication issues for users and applications.
  • Work with app teams to onboard apps to SSO and provisioning.
  • Maintain documentation and follow security best practices.
Must‑Haves
  • 4-7+ years experience in hands‑on IAM engineering.
  • Strong experience with SSO (SAML/OIDC/OAuth).
  • Deep knowledge of Okta and Microsoft Entra (Azure AD).
  • Solid experience with Active Directory.
  • Experience with PAM (CyberArk, BeyondTrust, Delinea, or Entra PIM).
  • Experience with Identity Governance (SailPoint, Saviynt, or Entra Governance).
  • Good automation skills (PowerShell, API integrations).
  • Strong troubleshooting skills for authentication and access issues.
Nice to Have
  • Experience with SCIM provisioning.
  • Experience with Zero Trust, Conditional Access hardening, MFA rollouts.
  • Cloud identity experience (Azure, AWS, GCP).
  • Terraform or other infrastructure-as-code for identity.


Disclaimer:
AI may be used in evaluating candidates.
This posting is for an existing vacancy.
Apply

Exigences

Niveau d'études

non déterminé

Années d'expérience

non déterminé

Langues écrites

non déterminé

Langues parlées

non déterminé