Azure IAM Engineer
Apply on
We need a Azure IAM Engineer for a 6+ month contract-to-hire role for a Healthcare client in Los Angeles, CA.
This role will be Remote full time for the first several months, but will convert to being a HYBRID remote/onsite role in the future. This means we strongly prefer someone who lives in CA.
Required Skills:
Experience in developing technical strategies, architectures, and roadmaps for enterprise IAM solution
Hands-on experience using Microsoft Identity platform
Identity Management expertise in the following areas:
o Single Sign On
o Identity Federation
UI Development with HTMl, CSS, Javascript
Outstanding organizational, communication and presentation skills. Able to articulate complex, technical concepts to non-technical audience
Experience with Identity and Access Management using Microsoft Azure AD
Experience with Identity and Access Management system architecture including Single Sign-On Federation using SAML, OIDC/OAuth 2.0
Experience implementing SSO integration using Azure AD
Hands-on experience using Azure B2C component and securing app configuration data by using Azure App Configuration
Experience implementing enterprise Identity and Access Management (IAM), Privileged Access
Experience using an Identity and Access Management technology using Azure LDS & Azure B2B/B2C.
Experience with REST API test tools such as Curl, Postman or SoapUI.
Azure AD configuration (Managing identities, app registrations)
B2C Development (Signup, mil,}, password reset flows, technical profiles, MFA, managing policies) - custom policies
B2C UI development (for customizing the look and feel for the UI)
B2C backend development (for server side customization)
Developing solutions for importing users,
Application integrations for supporting B2C IDP
Integrations with API for token enrichment using api connectors and custom policies
Education:
BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology or related field.
If interested, please send resume along with: