Identity And Access Management Engineer

Identity and Access Management (IAM) Engineers protect all resources and intellectual property through strict yet consistent access control policies that ensure data and data processing systems remain confidential, trustworthy and available.

Role overview

IAM Engineers implement and continuously optimize Identity and Access Management services in line with evolving technologies and security regulations. They are responsible for designing, implementing, and maintaining IAM technologies to ensure audit and privacy compliance, driving automation wherever possible. IAM Engineers also assist with resolving any security issues related to IAM operations.

IAM Engineers
may also be referred to as:
IAM Advisor
IAM Architect
IAM Cloud Operations Engineer
IAM Engineer
IAM Security Architect
IAM Security Engineer
IAM Systems Manager
Identity Access Management IAM SSO Engineer
Identity Access Management Support Engineer
Identity And Access Management Administrator
Identity Engineer
PAM Cybersecurity Engineer
Privileged Access Management Analyst
Privileged Access Management Architect

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
National Average
* based upon those with two plus years of cybersecurity experience


Designing, implementing, and managing Identity Directory and identity services.
Implementing technologies to centrally integrate identity systems across the organization.
Streamlining and improving customer experiences.
Implementing access controls to applications and maintaining and updating roles in the directory.
Managing access and permissions where necessary and implementing automated solutions.
Collaborating with key engineering stakeholders to help tackle challenges within the IAM space.
Troubleshooting and managing issues related to identities, systems access accounts, authentication, authorization, entitlements, and permissions.
Implementing and maintaining technologies to ensure audit and privacy compliance.

Tools & Environment

Identity and Access Management Engineers use a variety of technologies and tools, including IAM architecture and integrations, coding/scripting tools, two-step verification systems, and IAM protocols such as SSO/SAML, OAuth/OIDC, and SCIM.


[cyber_job_role_count] Identity And Access Management Engineer jobs



Watch our latest videos, talks an recorded events

White Papers

Download our whitepapers and printed resources

Free Courses

Browse our training courses and educational resources
See All


Listen to our podcast features and recorded roundtables

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.
Cybersecurity Training Made Affordable and Accessible


Cybrary’s industry-leading platform provides guided pathways, threat-informed training, and certification preparation to fully equip cybersecurity professionals at every stage in their careers to skill up and confidently mitigate threats.


Get in touch to see your product, training course, service, or DEI support on our provider exchange.
CyberSecurity For Beginners

Security Sorceress

A course designed to bring a learner from knowing nothing about cybersecurity to knowing the foundations of security. Career advice and group coaching. Prepare for the Security + exam. Financing available.
Career Acceleration and Training Community Hub

Cyber Leadership Institute

Join the Cyber Leadership Institute Community Hub and benefit from the shared knowledge and experience of a global community of cyber leaders.
A game-changing personal branding program for technical professionals

Stand Out From the Crowd With a Strong Personal Brand (EPB)

The Elevate Your Personal Brand (EPB) program helps technical professionals develop a strong personal brand quickly. This short, intensive, and self-paced course will help you develop, monetize, and sustain an outstanding personal brand
For executives in charge of cyber-resilience strategies

Cyber Strategy and Transformational Leadership Skills (CSTP)

The Cyber Strategy and Transformation Program (CSTP) is the ultimate course for senior leaders and project managers responsible for leading cyber strategies and transformation programs across their organizations.

Get our latest insights. Subscribe to our newsletter.