Home/Resume Examples/Identity & Access Management Engineer
Cybersecurity

Identity & Access Management Engineer Resume Example

Use this identity & access management engineer resume example as a reference. Our AI tailors it to any job description in seconds.

Identity & Access Management EngineerIdentity ManagementAccess ManagementIAM EngineeringSecurity AnalystInformation Security SpecialistSecurity Engineer

Avg. Salary

$105,000 - $155,000

Level

Mid-Senior Level

Identity & Access Management Engineer Resume Preview

Alex Johnson
Identity & Access Management Engineer  |  alex.johnson@email.com  |  (555) 123-4567  |  San Francisco, CA  |  linkedin.com/in/alexjohnson
Summary
IAM engineer with 5 years of experience designing and implementing identity governance, single sign-on, and privileged access management solutions for enterprises with 10,000+ users. Skilled in Okta, Azure AD, and SailPoint with deep expertise in RBAC design, lifecycle automation, and zero trust architecture. Skilled in Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow, Privileged Access Management, RBAC/ABAC Design, and LDAP/Active Directory, MFA Implementation, SCIM Provisioning with hands-on experience across identity management, access management, IAM engineering. Strong communicator who works effectively with cross-functional teams including product, design, and QA.
Experience
Senior Identity & Access Management EngineerJan 2022 - Present
TechCorp Inc.San Francisco, CA
  • Designed and deployed Okta SSO for 12,000 users across 85 SaaS applications using SAML and OIDC, reducing password-related helpdesk tickets by 60% and cutting average login time from 45 seconds to under 10 seconds
  • Implemented SailPoint IdentityNow for identity governance covering 15,000 identities and 200 applications, automating joiner-mover-leaver workflows that previously required 8 hours of manual provisioning per week
  • Built a role-based access control model with 120 business roles mapped to 400+ application entitlements, reducing excessive access findings in quarterly access reviews from 2,500 to under 200
  • Deployed CyberArk Privileged Access Management for 800 privileged accounts across 3,000 servers, implementing session recording, password rotation every 24 hours, and just-in-time access that reduced standing admin privileges by 90%
  • Integrated MFA using Okta Verify and FIDO2 security keys for all 12,000 employees, achieving 99.5% enrollment within 6 weeks and blocking 100% of credential stuffing attacks that were averaging 500 attempts per day
  • Automated user provisioning and deprovisioning across 40 applications using SCIM and custom API integrations, reducing the average onboarding time from 3 days to 2 hours and ensuring terminated users lost access within 15 minutes
Identity & Access Management EngineerJun 2019 - Dec 2021
InnovateLabsAustin, TX
  • Conducted quarterly access certification campaigns covering 200 applications and 15,000 users through SailPoint, processing 50,000+ entitlement reviews per cycle with a 95% manager completion rate within the 2-week window
  • Designed the zero trust network access architecture using Azure AD Conditional Access policies with 35 rules covering device compliance, location, risk level, and application sensitivity, replacing the legacy VPN for 80% of remote access use cases
  • Migrated 8,000 user accounts from on-premises Active Directory to Azure AD using Azure AD Connect with seamless SSO, completing the migration over 3 weekends with zero user-reported access disruptions
  • Created a self-service access request portal integrated with ServiceNow and Okta that handled 2,000+ requests per month, reducing the average access provisioning time from 2 days to 30 minutes and freeing IT staff from 20 hours of weekly manual work
  • Implemented Okta Identity Threat Protection that analyzed login behavior patterns for 12,000 users, detecting and automatically remediating 40+ compromised accounts per quarter that would have bypassed static MFA policies
Education
Bachelor of Science in Computer Science, University of California, Berkeley - Berkeley, CA2019
Skills

Languages & Frameworks: Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow, Privileged Access Management

Tools & Infrastructure: RBAC/ABAC Design, LDAP/Active Directory, MFA Implementation, SCIM Provisioning

Methodologies & Practices: Zero Trust Architecture, PowerShell/Python

Projects

Security Controls Modernization Project - Improved security posture across systems by tightening controls around Okta/Azure AD. Documented risks, partnered with engineering teams on remediation, and created repeatable evidence for audits and reviews.

Incident Response and Risk Reduction Program - Built playbooks, reporting workflows, and monitoring improvements connected to SAML/OIDC/OAuth 2.0, SailPoint IdentityNow, Privileged Access Management. Reduced response ambiguity and gave leadership clearer visibility into active risks and mitigation progress.

Certifications

Okta Certified Professional

SailPoint IdentityNow Certified Engineer

Certified Identity Management Professional (CIMP)

Professional Summary

IAM engineer with 5 years of experience designing and implementing identity governance, single sign-on, and privileged access management solutions for enterprises with 10,000+ users. Skilled in Okta, Azure AD, and SailPoint with deep expertise in RBAC design, lifecycle automation, and zero trust architecture.

Key Skills

Okta/Azure ADSAML/OIDC/OAuth 2.0SailPoint IdentityNowPrivileged Access ManagementRBAC/ABAC DesignLDAP/Active DirectoryMFA ImplementationSCIM ProvisioningZero Trust ArchitecturePowerShell/Python

What to Include on a Identity & Access Management Engineer Resume

  • A concise summary that states your identity & access management engineer experience level, strongest domain, and the business problems you solve.
  • A skills section that mirrors the job description language for Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow, Privileged Access Management.
  • Experience bullets that connect identity management, access management, IAM engineering to measurable outcomes such as cost savings, faster delivery, better quality, or improved customer results.
  • Tools, platforms, certifications, and methods that are current for cybersecurity roles.
  • Recent projects that show ownership, cross-functional work, and a clear result instead of generic responsibilities.

Sample Experience Bullets

  • Designed and deployed Okta SSO for 12,000 users across 85 SaaS applications using SAML and OIDC, reducing password-related helpdesk tickets by 60% and cutting average login time from 45 seconds to under 10 seconds
  • Implemented SailPoint IdentityNow for identity governance covering 15,000 identities and 200 applications, automating joiner-mover-leaver workflows that previously required 8 hours of manual provisioning per week
  • Built a role-based access control model with 120 business roles mapped to 400+ application entitlements, reducing excessive access findings in quarterly access reviews from 2,500 to under 200
  • Deployed CyberArk Privileged Access Management for 800 privileged accounts across 3,000 servers, implementing session recording, password rotation every 24 hours, and just-in-time access that reduced standing admin privileges by 90%
  • Integrated MFA using Okta Verify and FIDO2 security keys for all 12,000 employees, achieving 99.5% enrollment within 6 weeks and blocking 100% of credential stuffing attacks that were averaging 500 attempts per day
  • Automated user provisioning and deprovisioning across 40 applications using SCIM and custom API integrations, reducing the average onboarding time from 3 days to 2 hours and ensuring terminated users lost access within 15 minutes
  • Conducted quarterly access certification campaigns covering 200 applications and 15,000 users through SailPoint, processing 50,000+ entitlement reviews per cycle with a 95% manager completion rate within the 2-week window
  • Designed the zero trust network access architecture using Azure AD Conditional Access policies with 35 rules covering device compliance, location, risk level, and application sensitivity, replacing the legacy VPN for 80% of remote access use cases
  • Migrated 8,000 user accounts from on-premises Active Directory to Azure AD using Azure AD Connect with seamless SSO, completing the migration over 3 weekends with zero user-reported access disruptions
  • Created a self-service access request portal integrated with ServiceNow and Okta that handled 2,000+ requests per month, reducing the average access provisioning time from 2 days to 30 minutes and freeing IT staff from 20 hours of weekly manual work
  • Implemented Okta Identity Threat Protection that analyzed login behavior patterns for 12,000 users, detecting and automatically remediating 40+ compromised accounts per quarter that would have bypassed static MFA policies

ATS Keywords for Identity & Access Management Engineer Resumes

Use these terms naturally where they match your experience and the job description.

Role keywords

identity & access management engineerIAM engineering

Technical keywords

Okta/Azure ADSAML/OIDC/OAuth 2.0SailPoint IdentityNowRBAC/ABAC DesignLDAP/Active DirectoryMFA ImplementationSCIM ProvisioningZero Trust Architecture

Process keywords

identity governance

Impact keywords

identity governancerole-based access controlzero trustuser provisioningMFA

Recommended Certifications

  • Okta Certified Professional
  • SailPoint IdentityNow Certified Engineer
  • Certified Identity Management Professional (CIMP)

What Does a Identity & Access Management Engineer Do?

  • Design, develop, and maintain software solutions using Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow and related technologies
  • Collaborate with cross-functional teams including product managers, designers, and QA engineers to deliver features on schedule
  • Write clean, well-tested code following industry best practices for identity management and access management
  • Participate in code reviews, technical discussions, and architecture decisions to improve system quality and team knowledge
  • Troubleshoot production issues, optimize performance, and ensure system reliability across all environments

Resume Tips for Identity & Access Management Engineers

Do

  • Quantify impact with specific numbers - team size, users served, performance gains
  • List Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow prominently if they match the job description
  • Show progression - more responsibility and scope in recent roles

Avoid

  • Vague phrases like "responsible for" or "helped with" without specifics
  • Listing every technology you have ever touched - focus on what is relevant
  • Including outdated skills that are no longer industry standard

Frequently Asked Questions

How long should a Identity & Access Management Engineer resume be?

One page is ideal for most Identity & Access Management Engineer roles with under 10 years of experience. If you have 10+ years, major leadership scope, publications, or highly technical project history, two pages can work as long as every section is relevant.

What skills should I highlight on my Identity & Access Management Engineer resume?

Prioritize skills that appear in the job description and match your real experience. For Identity & Access Management Engineer roles, Okta/Azure AD, SAML/OIDC/OAuth 2.0, SailPoint IdentityNow, Privileged Access Management are strong starting points, but the final list should reflect the specific posting.

How do I tailor my resume for each Identity & Access Management Engineer application?

Compare the job description with your summary, skills, and most recent bullets. Add exact-match terms like identity management, access management, IAM engineering, single sign-on, privileged access where they are truthful, then reorder bullets so the most relevant achievements appear first.

What should I avoid on a Identity & Access Management Engineer resume?

Avoid generic responsibilities, long paragraphs, outdated tools, and soft claims without evidence. Replace phrases like "responsible for" with action verbs and measurable outcomes.

Should I include projects on a Identity & Access Management Engineer resume?

Include projects when they prove relevant skills or fill gaps in work experience. Strong projects show the problem, your role, the tools used, and the result. Skip personal projects that do not relate to the job.

Build your Identity & Access Management Engineer resume

Paste a job description and get a tailored, ATS-optimized resume in 20 seconds.

Generate Resume Free

No credit card required

Explore More Resume Examples