Identity And Access Management Iam Green Card Jobs
Identity and Access Management (IAM) roles qualify for EB-2 and EB-3 green card sponsorship through the PERM labor certification process, which permanently ties your authorization to the employer rather than a temporary visa cycle. Employers filing PERM must demonstrate no qualified U.S. workers are available, making your specialized IAM credentials central to a successful sponsorship case.
See All Identity And Access Management Iam JobsOverview
Showing 5 of 7+ Identity And Access Management Iam jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 7+ Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All Jobs
Qualifications
- 12+ years of experience in cybersecurity with a sustained, deep focus on Identity and Access Management; must include substantial hands-on experience as both a security practitioner (implementing and operating IAM platforms) and a security consultant (advising enterprise clients, leading assessments, and owning delivery outcomes) — senior-level consulting experience is essential, not optional
- Deep technical mastery across all IAM domains with hands-on implementation and advisory experience, including: IGA — SailPoint IdentityNow/IdentityIQ, Saviynt, Omada, or One Identity (role engineering, access certification, SoD policy, lifecycle management, connector architecture); PAM — CyberArk (Core PAS, EPM, Conjur), BeyondTrust (Password Safe, Privilege Management), or Delinea/Thycotic (vault design, session recording, just-in-time access); Access Management — Okta, Ping Identity (PingFederate, PingOne), Microsoft Entra ID, or ForgeRock (SSO, adaptive MFA, SAML 2.0, OAuth 2.0, OIDC, SCIM); Cloud Identity — AWS IAM/IAM Identity Center, Azure Entra ID, GCP IAM, CIEM tools (Wiz, Ermetic, Sonrai); Directory Services — Active Directory (design, tiered admin model, hardening), Azure AD Connect, LDAP, and virtual directory architectures (Radiant Logic, Microsoft MIM)
- A bachelor's degree in Computer Science, Computer Information Systems, Information Assurance, or commensurate experience is required.
- Advanced certifications demonstrating IAM and security program depth — CISSP, CISM, CISA, CRISC, CCSP, or equivalent strongly preferred; vendor-specific certifications from SailPoint, Okta, CyberArk, BeyondTrust, Microsoft (SC-300, SC-400, AZ-500), or Saviynt are highly valued
- Extensive knowledge of current and upcoming security technologies and operations.
- Proven track record leading complex, multi-stakeholder IAM consulting engagements end-to-end — including scoping, discovery, assessment, roadmap development, executive reporting, and client relationship ownership — with documented high-quality outcomes delivered in demanding enterprise environments
- Expert working knowledge of identity and security governance frameworks: NIST SP 800-53 (AC and IA control families), NIST CSF 2.0, NIST SP 800-207 (Zero Trust Architecture), ISO 27001/27002, ISO 27005, MITRE ATT&CK credential access and lateral movement tactics, SOX ITGC access control requirements, HIPAA Security Rule, PCI DSS access control requirements, and DORA as it relates to identity resilience
- Hands-on technical experience spanning the full IAM implementation stack: IGA platform deployment and configuration, PAM vault build and privileged account onboarding, federation and SSO integration (SAML, OIDC, OAuth), directory services architecture, role mining and role engineering, access certification campaign design, SoD ruleset development, cloud IAM policy governance, and identity threat detection tooling
- Demonstrated ability to lead multiple concurrent client engagements at senior levels — managing delivery teams, client expectations, and competing priorities — while maintaining consistent delivery quality and client trust in dynamic, high-pressure enterprise environments
- Exceptional executive presence and communication skills: proven track record presenting at CISO, board, and C-suite levels; skilled at translating complex IAM risk and architecture concepts into clear business narratives; adept at adapting message depth and framing to audiences ranging from hands-on engineers to executive decision-makers
- Track record of leading and developing delivery teams, establishing engagement governance and quality standards, and contributing to IAM practice growth through reusable methodologies, assessment frameworks, thought leadership content, and market-facing engagements
- Mature consulting delivery competencies: structured discovery and workshop facilitation, gap analysis and maturity scoring, roadmap development and initiative sizing, SOW scoping, ROM estimation, and consistent production of client-ready deliverables — assessments, maturity reports, executive roadmaps, and program plans — that meet senior-level quality standards
Position Overview:
The Security Solutions Senior Manager — IAM is a senior domain authority who owns WWT's Identity and Access Management capability within client engagements and the broader Security Solutions practice. This is a high-impact, client-facing leadership role requiring a rare combination of deep IAM technical mastery and mature consulting delivery experience. The successful candidate has spent their career at the intersection of enterprise IAM architecture and security consulting — equally comfortable designing a zero-trust identity architecture as presenting a strategic program roadmap to a CISO, board, or executive steering committee.
The ideal candidate brings platform-depth across the full IAM stack — IGA, PAM, Access Management, cloud identity, and directory services — combined with strong command of risk management methodologies and the ability to score, benchmark, and communicate program maturity to both technical and business audiences. They hold advanced certifications and maintain current knowledge of the IAM vendor landscape, emerging threat patterns, and regulatory drivers.
This role demands seasoned consulting delivery capability: leading complex multi-workstream engagements end-to-end, owning executive client relationships at CISO and VP level, facilitating high-stakes workshops, producing board-ready deliverables, and mentoring delivery teams. The Senior Manager is as effective in a discovery workshop as they are presenting at a client steering committee or advancing a pursuit conversation with an account executive.
Essential Functions:
- Lead and own IAM delivery workstreams across cybersecurity engagements for enterprise clients spanning financial services, healthcare, retail, manufacturing, and public sector — with full accountability for delivery quality, timeline, and client satisfaction
- Maintain authoritative, current knowledge of enterprise IAM architecture across all domains: IGA, PAM, Access Management, cloud identity (CIEM), decentralized identity, and zero-trust identity principles — and translate that knowledge into practical, client-relevant guidance
- Evaluate IAM program maturity across IGA (joiner-mover-leaver lifecycle, role engineering, access certification, SoD policy), PAM (vault architecture, session management, just-in-time access, least-privilege enforcement), and Access Management (SSO, adaptive MFA, federation, SCIM provisioning) — and develop targeted roadmaps to close gaps and reduce identity risk
- Lead structured IAM assessments and advisory engagements: design discovery frameworks, conduct stakeholder interviews and technical SME sessions, synthesize findings, score maturity against recognized frameworks, and advise on strategic direction with clear, prioritized recommendations
- Lead pre-sales and solutioning activities: scope and size IAM consulting engagements, develop ROM estimates, author Statements of Work (SOWs), and serve as the IAM domain SME on pursuit teams partnering with account executives and practice leadership to win and structure engagements
- Own and develop client relationships at CISO, VP of Security, and Director levels; serve as a trusted advisor who is proactively engaged throughout the engagement lifecycle — from kickoff through executive readout — and who identifies and advances expansion opportunities within existing accounts
- Architect IAM solutions grounded in industry standards and security best practices — including zero-trust identity design, least-privilege access models, identity threat detection and response (ITDR), and cloud-native IAM patterns — tailored to client environments and business constraints
- Understand and advise on the identity-security interplay across application security (OAuth/OIDC, API security), data classification and access governance, network access control, endpoint and device trust, and emerging threats including identity-based attacks, credential compromise, and lateral movement via privileged access
- Translate complex IAM findings into business-aligned recommendations and executive roadmaps; present to C-suite and board audiences with authority and composure; facilitate steering committees, executive briefings, and program governance sessions
- Design and lead executive and technical workshops across IAM domains: IGA program design, PAM strategy and architecture, access management modernization (SSO, adaptive MFA, federation), cloud identity governance, and zero-trust identity — with outcomes including gap analysis, prioritized initiative backlogs, and program roadmaps
- Produce and quality-assure client-ready deliverables — including IAM assessments, maturity scorecards, gap registers, architecture recommendations, strategic roadmaps, and executive briefings — that consistently meet professional services standards and withstand scrutiny at senior levels; mentor junior staff in deliverable quality and consulting craft
- Drive measurable engagement outcomes aligned to client business objectives: risk reduction, compliance posture improvement, program maturity advancement, and readiness for follow-on investment — documented through clear, evidence-based deliverables
- Develop and deepen strategic relationships with WWT's core IAM technology partners (SailPoint, Saviynt, Okta, CyberArk, BeyondTrust, Ping, Microsoft) to support joint go-to-market, co-selling, and practice capability advancement
- Drive revenue and profit growth for the IAM practice through delivery excellence, account expansion, pursuit support, and contribution to practice development initiatives including reusable methodologies, assessment frameworks, and thought leadership
Certain states and localities require employers to post a reasonable estimate of salary range. A reasonable estimate of the current base pay range for this position is $170,000 to $200,000 annually. Actual salary will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base pay.
The well-being of WWT employees is essential. So, when it comes to our benefits package, WWT has one of the best. We offer the following benefits to all full-time employees:
- Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
- Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
- Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
- Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
We strive to create an environment where all employees are empowered to succeed based on their skills, performance, and dedication. Our goal is to cultivate a culture of belonging that encourages innovation, collaboration, and respect for all team members, ensuring that WWT remains a great place to work for All!
If you have any questions or concerns about this posting, please email taposting@wwt.com.
LI-TB1

Qualifications
- 12+ years of experience in cybersecurity with a sustained, deep focus on Identity and Access Management; must include substantial hands-on experience as both a security practitioner (implementing and operating IAM platforms) and a security consultant (advising enterprise clients, leading assessments, and owning delivery outcomes) — senior-level consulting experience is essential, not optional
- Deep technical mastery across all IAM domains with hands-on implementation and advisory experience, including: IGA — SailPoint IdentityNow/IdentityIQ, Saviynt, Omada, or One Identity (role engineering, access certification, SoD policy, lifecycle management, connector architecture); PAM — CyberArk (Core PAS, EPM, Conjur), BeyondTrust (Password Safe, Privilege Management), or Delinea/Thycotic (vault design, session recording, just-in-time access); Access Management — Okta, Ping Identity (PingFederate, PingOne), Microsoft Entra ID, or ForgeRock (SSO, adaptive MFA, SAML 2.0, OAuth 2.0, OIDC, SCIM); Cloud Identity — AWS IAM/IAM Identity Center, Azure Entra ID, GCP IAM, CIEM tools (Wiz, Ermetic, Sonrai); Directory Services — Active Directory (design, tiered admin model, hardening), Azure AD Connect, LDAP, and virtual directory architectures (Radiant Logic, Microsoft MIM)
- A bachelor's degree in Computer Science, Computer Information Systems, Information Assurance, or commensurate experience is required.
- Advanced certifications demonstrating IAM and security program depth — CISSP, CISM, CISA, CRISC, CCSP, or equivalent strongly preferred; vendor-specific certifications from SailPoint, Okta, CyberArk, BeyondTrust, Microsoft (SC-300, SC-400, AZ-500), or Saviynt are highly valued
- Extensive knowledge of current and upcoming security technologies and operations.
- Proven track record leading complex, multi-stakeholder IAM consulting engagements end-to-end — including scoping, discovery, assessment, roadmap development, executive reporting, and client relationship ownership — with documented high-quality outcomes delivered in demanding enterprise environments
- Expert working knowledge of identity and security governance frameworks: NIST SP 800-53 (AC and IA control families), NIST CSF 2.0, NIST SP 800-207 (Zero Trust Architecture), ISO 27001/27002, ISO 27005, MITRE ATT&CK credential access and lateral movement tactics, SOX ITGC access control requirements, HIPAA Security Rule, PCI DSS access control requirements, and DORA as it relates to identity resilience
- Hands-on technical experience spanning the full IAM implementation stack: IGA platform deployment and configuration, PAM vault build and privileged account onboarding, federation and SSO integration (SAML, OIDC, OAuth), directory services architecture, role mining and role engineering, access certification campaign design, SoD ruleset development, cloud IAM policy governance, and identity threat detection tooling
- Demonstrated ability to lead multiple concurrent client engagements at senior levels — managing delivery teams, client expectations, and competing priorities — while maintaining consistent delivery quality and client trust in dynamic, high-pressure enterprise environments
- Exceptional executive presence and communication skills: proven track record presenting at CISO, board, and C-suite levels; skilled at translating complex IAM risk and architecture concepts into clear business narratives; adept at adapting message depth and framing to audiences ranging from hands-on engineers to executive decision-makers
- Track record of leading and developing delivery teams, establishing engagement governance and quality standards, and contributing to IAM practice growth through reusable methodologies, assessment frameworks, thought leadership content, and market-facing engagements
- Mature consulting delivery competencies: structured discovery and workshop facilitation, gap analysis and maturity scoring, roadmap development and initiative sizing, SOW scoping, ROM estimation, and consistent production of client-ready deliverables — assessments, maturity reports, executive roadmaps, and program plans — that meet senior-level quality standards
Position Overview:
The Security Solutions Senior Manager — IAM is a senior domain authority who owns WWT's Identity and Access Management capability within client engagements and the broader Security Solutions practice. This is a high-impact, client-facing leadership role requiring a rare combination of deep IAM technical mastery and mature consulting delivery experience. The successful candidate has spent their career at the intersection of enterprise IAM architecture and security consulting — equally comfortable designing a zero-trust identity architecture as presenting a strategic program roadmap to a CISO, board, or executive steering committee.
The ideal candidate brings platform-depth across the full IAM stack — IGA, PAM, Access Management, cloud identity, and directory services — combined with strong command of risk management methodologies and the ability to score, benchmark, and communicate program maturity to both technical and business audiences. They hold advanced certifications and maintain current knowledge of the IAM vendor landscape, emerging threat patterns, and regulatory drivers.
This role demands seasoned consulting delivery capability: leading complex multi-workstream engagements end-to-end, owning executive client relationships at CISO and VP level, facilitating high-stakes workshops, producing board-ready deliverables, and mentoring delivery teams. The Senior Manager is as effective in a discovery workshop as they are presenting at a client steering committee or advancing a pursuit conversation with an account executive.
Essential Functions:
- Lead and own IAM delivery workstreams across cybersecurity engagements for enterprise clients spanning financial services, healthcare, retail, manufacturing, and public sector — with full accountability for delivery quality, timeline, and client satisfaction
- Maintain authoritative, current knowledge of enterprise IAM architecture across all domains: IGA, PAM, Access Management, cloud identity (CIEM), decentralized identity, and zero-trust identity principles — and translate that knowledge into practical, client-relevant guidance
- Evaluate IAM program maturity across IGA (joiner-mover-leaver lifecycle, role engineering, access certification, SoD policy), PAM (vault architecture, session management, just-in-time access, least-privilege enforcement), and Access Management (SSO, adaptive MFA, federation, SCIM provisioning) — and develop targeted roadmaps to close gaps and reduce identity risk
- Lead structured IAM assessments and advisory engagements: design discovery frameworks, conduct stakeholder interviews and technical SME sessions, synthesize findings, score maturity against recognized frameworks, and advise on strategic direction with clear, prioritized recommendations
- Lead pre-sales and solutioning activities: scope and size IAM consulting engagements, develop ROM estimates, author Statements of Work (SOWs), and serve as the IAM domain SME on pursuit teams partnering with account executives and practice leadership to win and structure engagements
- Own and develop client relationships at CISO, VP of Security, and Director levels; serve as a trusted advisor who is proactively engaged throughout the engagement lifecycle — from kickoff through executive readout — and who identifies and advances expansion opportunities within existing accounts
- Architect IAM solutions grounded in industry standards and security best practices — including zero-trust identity design, least-privilege access models, identity threat detection and response (ITDR), and cloud-native IAM patterns — tailored to client environments and business constraints
- Understand and advise on the identity-security interplay across application security (OAuth/OIDC, API security), data classification and access governance, network access control, endpoint and device trust, and emerging threats including identity-based attacks, credential compromise, and lateral movement via privileged access
- Translate complex IAM findings into business-aligned recommendations and executive roadmaps; present to C-suite and board audiences with authority and composure; facilitate steering committees, executive briefings, and program governance sessions
- Design and lead executive and technical workshops across IAM domains: IGA program design, PAM strategy and architecture, access management modernization (SSO, adaptive MFA, federation), cloud identity governance, and zero-trust identity — with outcomes including gap analysis, prioritized initiative backlogs, and program roadmaps
- Produce and quality-assure client-ready deliverables — including IAM assessments, maturity scorecards, gap registers, architecture recommendations, strategic roadmaps, and executive briefings — that consistently meet professional services standards and withstand scrutiny at senior levels; mentor junior staff in deliverable quality and consulting craft
- Drive measurable engagement outcomes aligned to client business objectives: risk reduction, compliance posture improvement, program maturity advancement, and readiness for follow-on investment — documented through clear, evidence-based deliverables
- Develop and deepen strategic relationships with WWT's core IAM technology partners (SailPoint, Saviynt, Okta, CyberArk, BeyondTrust, Ping, Microsoft) to support joint go-to-market, co-selling, and practice capability advancement
- Drive revenue and profit growth for the IAM practice through delivery excellence, account expansion, pursuit support, and contribution to practice development initiatives including reusable methodologies, assessment frameworks, and thought leadership
Certain states and localities require employers to post a reasonable estimate of salary range. A reasonable estimate of the current base pay range for this position is $170,000 to $200,000 annually. Actual salary will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base pay.
The well-being of WWT employees is essential. So, when it comes to our benefits package, WWT has one of the best. We offer the following benefits to all full-time employees:
- Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
- Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
- Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
- Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
We strive to create an environment where all employees are empowered to succeed based on their skills, performance, and dedication. Our goal is to cultivate a culture of belonging that encourages innovation, collaboration, and respect for all team members, ensuring that WWT remains a great place to work for All!
If you have any questions or concerns about this posting, please email taposting@wwt.com.
LI-TB1
See all 7+ Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All JobsTips for Finding Green Card Sponsorship in Identity And Access Management Iam
Document your IAM credentials before applying
Gather your certifications (CISSP, CIAM, Microsoft Identity) and degree transcripts now. PERM requires the employer to define minimum qualifications before posting the job, and your credentials must match those requirements exactly at the time of filing.
Target employers with active PERM filing history
Search DOL PERM disclosure data for companies that have sponsored IAM-specific job titles like Identity Engineer or Access Management Analyst. Employers with prior PERM experience in your specialty move faster and make fewer errors in the labor certification stage.
Use Migrate Mate to filter green card sponsoring employers
Search Migrate Mate to find companies that have sponsored EB-2 or EB-3 roles in IAM specifically. This filters out employers who sponsor only H-1B and surfaces those already familiar with the PERM process for technical security roles.
Clarify EB-2 versus EB-3 eligibility with your offer
If your IAM role requires a master's degree or involves policy-level architecture, push the employer toward EB-2 classification. EB-2 has priority date advantages for many nationalities and skips the additional recruitment requirements that EB-3 sometimes triggers under PERM.
Negotiate PERM filing timing before accepting an offer
Ask whether the employer will file PERM immediately after your H-1B is approved or after a waiting period. Delays of six or more months are common and can affect your priority date, which determines when your I-140 approval converts to an immigrant visa.
Verify the job description matches your actual IAM duties
USCIS and DOL scrutinize whether your I-140 job duties align with the PERM-certified position. IAM roles often drift in scope after hiring, so confirm your official title and responsibilities match the O*NET occupation profile used in your labor certification.
Identity And Access Management Iam jobs are hiring across the US. Find yours.
Find Identity And Access Management Iam JobsIdentity And Access Management Iam Green Card Sponsorship: Frequently Asked Questions
Does an IAM role qualify as a specialty occupation for green card purposes?
Yes. IAM positions typically require at least a bachelor's degree in computer science, information security, or a related field, which satisfies the specialty occupation threshold for EB-2 and EB-3 classification. Roles involving identity governance architecture or privileged access management design often qualify for EB-2 if the employer requires an advanced degree or equivalent specialized experience.
How does PERM green card sponsorship differ from H-1B for IAM professionals?
H-1B is a temporary status requiring renewal every three years with no path to permanence on its own. PERM initiates a permanent residency process with no annual cap at the petition stage, and your EB-3 priority date is not subject to lottery selection. The tradeoff is timeline: PERM labor certification alone takes six to eighteen months before the I-140 petition is even filed.
Where can I find employers who sponsor green cards for IAM roles?
Migrate Mate lets you search specifically for companies with EB-2 and EB-3 sponsorship history in technical security and identity management roles. This is more reliable than general job boards because it surfaces employers who have already navigated PERM for positions like yours, reducing the risk of starting a sponsorship process with an employer who will abandon it midway.
What happens to my green card case if I change employers mid-process?
If your I-140 has been approved for more than 180 days and your new role is in the same or similar IAM occupational category, you can port your priority date to a new employer's petition under AC21 portability rules. You'll need a new PERM filing from the new employer, but you retain your original priority date, which matters significantly if you're from a backlogged country.
Can my employer file PERM for an IAM role that involves remote work?
Yes, but the PERM-certified worksite must match where you actually perform the work. If your IAM role is fully remote, the employer must conduct the required PERM recruitment in the area where you reside, not just at company headquarters. DOL has tightened scrutiny on remote-worksite PERM filings, so employers should confirm the correct prevailing wage using the OFLC Wage Search tool for your actual location.
See which Identity And Access Management Iam employers are hiring and sponsoring visas right now.
Search Identity And Access Management Iam Jobs