Identity And Access Management Engineer

Identity and Access Management (IAM) Engineers protect all resources and intellectual property through strict yet consistent access control policies that ensure data and data processing systems remain confidential, trustworthy and available.

Role overview

IAM Engineers implement and continuously optimize Identity and Access Management services in line with evolving technologies and security regulations. They are responsible for designing, implementing, and maintaining IAM technologies to ensure audit and privacy compliance, driving automation wherever possible. IAM Engineers also assist with resolving any security issues related to IAM operations.

IAM Engineers
may also be referred to as:
IAM Advisor
IAM Architect
IAM Cloud Operations Engineer
IAM Engineer
IAM Security Architect
IAM Security Engineer
IAM Systems Manager
Identity Access Management IAM SSO Engineer
Identity Access Management Support Engineer
Identity And Access Management Administrator
Identity Engineer
PAM Cybersecurity Engineer
Privileged Access Management Analyst
Privileged Access Management Architect

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
National Average


Designing, implementing, and managing Identity Directory and identity services.
Implementing technologies to centrally integrate identity systems across the organization.
Streamlining and improving customer experiences.
Implementing access controls to applications and maintaining and updating roles in the directory.
Managing access and permissions where necessary and implementing automated solutions.
Collaborating with key engineering stakeholders to help tackle challenges within the IAM space.
Troubleshooting and managing issues related to identities, systems access accounts, authentication, authorization, entitlements, and permissions.
Implementing and maintaining technologies to ensure audit and privacy compliance.

Tools & Environment

Identity and Access Management Engineers use a variety of technologies and tools, including IAM architecture and integrations, coding/scripting tools, two-step verification systems, and IAM protocols such as SSO/SAML, OAuth/OIDC, and SCIM.


[cyber_job_role_count] Identity And Access Management Engineer jobs



Watch our latest videos, talks an recorded events

White Papers

Download our whitepapers and printed resources

Free Courses

Browse our training courses and educational resources
See All


Listen to our podcast features and recorded roundtables

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.


Get in touch to see your product, training course, service, or DEI support on our provider exchange.

Cyber Security Cloud & SaaS Solutions Outfitter

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions

Cybersecurity, Risk Management, Continuity of Operations, and Data Protection & Governance

You need expertise to help you manage risk and protect your data from cyber attacks. Whether it’s strategy, cloud security, compliance, or anything in between, Vertex11 is your ultimate resource for getting the job done.
ESCALATE | Point3 Security

Identify Highly Skilled Individuals with ESCALATE Talent Screening

Traditional hiring has a couple of flaws. Human biases prevent good hires. Over-reliance on certifications and years of experience & HR Software and AI often removes top performers. With ESCALATE Talent Screening, your candidates physically demonstrate necessary skills, informing your hiring process far beyond certs or years of experience.
Rapid Ascent, Inc

Ascend with a Career in Cybersecurity

Hands-on, on-the-job training using state-of-the-art AI, gamified live-fire threats with real-world projects, and coaching from industry experts.

A Cybersecurity SaaS Ecosystem

CYRISMA combines Data Discovery/Data Loss Prevention, Vulnerability Scanning, Configuration Hardening, Score Card Evaluation, Various Reporting and Mitigation planning and Mitigation Execution in a single web-based platform generating Monthly Recurring Revenue for the MSSP.

Get our latest insights. Subscribe to our newsletter.