H-1B Visa Identity And Access Management Jobs
Identity and Access Management roles qualify as H-1B specialty occupations because they require a bachelor's degree or higher in computer science, information security, or a directly related field. Employers in financial services, healthcare, and enterprise technology are among the most active H-1B sponsors for IAM engineers and architects.
See All Identity And Access Management JobsOverview
Showing 5 of 23+ Identity And Access Management jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Identity And Access Management jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management roles.
Get Access To All Jobs
Qualifications
- 12+ years of experience in cybersecurity with a sustained, deep focus on Identity and Access Management; must include substantial hands-on experience as both a security practitioner (implementing and operating IAM platforms) and a security consultant (advising enterprise clients, leading assessments, and owning delivery outcomes) — senior-level consulting experience is essential, not optional
- Deep technical mastery across all IAM domains with hands-on implementation and advisory experience, including: IGA — SailPoint IdentityNow/IdentityIQ, Saviynt, Omada, or One Identity (role engineering, access certification, SoD policy, lifecycle management, connector architecture); PAM — CyberArk (Core PAS, EPM, Conjur), BeyondTrust (Password Safe, Privilege Management), or Delinea/Thycotic (vault design, session recording, just-in-time access); Access Management — Okta, Ping Identity (PingFederate, PingOne), Microsoft Entra ID, or ForgeRock (SSO, adaptive MFA, SAML 2.0, OAuth 2.0, OIDC, SCIM); Cloud Identity — AWS IAM/IAM Identity Center, Azure Entra ID, GCP IAM, CIEM tools (Wiz, Ermetic, Sonrai); Directory Services — Active Directory (design, tiered admin model, hardening), Azure AD Connect, LDAP, and virtual directory architectures (Radiant Logic, Microsoft MIM)
- A bachelor's degree in Computer Science, Computer Information Systems, Information Assurance, or commensurate experience is required.
- Advanced certifications demonstrating IAM and security program depth — CISSP, CISM, CISA, CRISC, CCSP, or equivalent strongly preferred; vendor-specific certifications from SailPoint, Okta, CyberArk, BeyondTrust, Microsoft (SC-300, SC-400, AZ-500), or Saviynt are highly valued
- Extensive knowledge of current and upcoming security technologies and operations.
- Proven track record leading complex, multi-stakeholder IAM consulting engagements end-to-end — including scoping, discovery, assessment, roadmap development, executive reporting, and client relationship ownership — with documented high-quality outcomes delivered in demanding enterprise environments
- Expert working knowledge of identity and security governance frameworks: NIST SP 800-53 (AC and IA control families), NIST CSF 2.0, NIST SP 800-207 (Zero Trust Architecture), ISO 27001/27002, ISO 27005, MITRE ATT&CK credential access and lateral movement tactics, SOX ITGC access control requirements, HIPAA Security Rule, PCI DSS access control requirements, and DORA as it relates to identity resilience
- Hands-on technical experience spanning the full IAM implementation stack: IGA platform deployment and configuration, PAM vault build and privileged account onboarding, federation and SSO integration (SAML, OIDC, OAuth), directory services architecture, role mining and role engineering, access certification campaign design, SoD ruleset development, cloud IAM policy governance, and identity threat detection tooling
- Demonstrated ability to lead multiple concurrent client engagements at senior levels — managing delivery teams, client expectations, and competing priorities — while maintaining consistent delivery quality and client trust in dynamic, high-pressure enterprise environments
- Exceptional executive presence and communication skills: proven track record presenting at CISO, board, and C-suite levels; skilled at translating complex IAM risk and architecture concepts into clear business narratives; adept at adapting message depth and framing to audiences ranging from hands-on engineers to executive decision-makers
- Track record of leading and developing delivery teams, establishing engagement governance and quality standards, and contributing to IAM practice growth through reusable methodologies, assessment frameworks, thought leadership content, and market-facing engagements
- Mature consulting delivery competencies: structured discovery and workshop facilitation, gap analysis and maturity scoring, roadmap development and initiative sizing, SOW scoping, ROM estimation, and consistent production of client-ready deliverables — assessments, maturity reports, executive roadmaps, and program plans — that meet senior-level quality standards
Position Overview:
The Security Solutions Senior Manager — IAM is a senior domain authority who owns WWT's Identity and Access Management capability within client engagements and the broader Security Solutions practice. This is a high-impact, client-facing leadership role requiring a rare combination of deep IAM technical mastery and mature consulting delivery experience. The successful candidate has spent their career at the intersection of enterprise IAM architecture and security consulting — equally comfortable designing a zero-trust identity architecture as presenting a strategic program roadmap to a CISO, board, or executive steering committee.
The ideal candidate brings platform-depth across the full IAM stack — IGA, PAM, Access Management, cloud identity, and directory services — combined with strong command of risk management methodologies and the ability to score, benchmark, and communicate program maturity to both technical and business audiences. They hold advanced certifications and maintain current knowledge of the IAM vendor landscape, emerging threat patterns, and regulatory drivers.
This role demands seasoned consulting delivery capability: leading complex multi-workstream engagements end-to-end, owning executive client relationships at CISO and VP level, facilitating high-stakes workshops, producing board-ready deliverables, and mentoring delivery teams. The Senior Manager is as effective in a discovery workshop as they are presenting at a client steering committee or advancing a pursuit conversation with an account executive.
Essential Functions:
- Lead and own IAM delivery workstreams across cybersecurity engagements for enterprise clients spanning financial services, healthcare, retail, manufacturing, and public sector — with full accountability for delivery quality, timeline, and client satisfaction
- Maintain authoritative, current knowledge of enterprise IAM architecture across all domains: IGA, PAM, Access Management, cloud identity (CIEM), decentralized identity, and zero-trust identity principles — and translate that knowledge into practical, client-relevant guidance
- Evaluate IAM program maturity across IGA (joiner-mover-leaver lifecycle, role engineering, access certification, SoD policy), PAM (vault architecture, session management, just-in-time access, least-privilege enforcement), and Access Management (SSO, adaptive MFA, federation, SCIM provisioning) — and develop targeted roadmaps to close gaps and reduce identity risk
- Lead structured IAM assessments and advisory engagements: design discovery frameworks, conduct stakeholder interviews and technical SME sessions, synthesize findings, score maturity against recognized frameworks, and advise on strategic direction with clear, prioritized recommendations
- Lead pre-sales and solutioning activities: scope and size IAM consulting engagements, develop ROM estimates, author Statements of Work (SOWs), and serve as the IAM domain SME on pursuit teams partnering with account executives and practice leadership to win and structure engagements
- Own and develop client relationships at CISO, VP of Security, and Director levels; serve as a trusted advisor who is proactively engaged throughout the engagement lifecycle — from kickoff through executive readout — and who identifies and advances expansion opportunities within existing accounts
- Architect IAM solutions grounded in industry standards and security best practices — including zero-trust identity design, least-privilege access models, identity threat detection and response (ITDR), and cloud-native IAM patterns — tailored to client environments and business constraints
- Understand and advise on the identity-security interplay across application security (OAuth/OIDC, API security), data classification and access governance, network access control, endpoint and device trust, and emerging threats including identity-based attacks, credential compromise, and lateral movement via privileged access
- Translate complex IAM findings into business-aligned recommendations and executive roadmaps; present to C-suite and board audiences with authority and composure; facilitate steering committees, executive briefings, and program governance sessions
- Design and lead executive and technical workshops across IAM domains: IGA program design, PAM strategy and architecture, access management modernization (SSO, adaptive MFA, federation), cloud identity governance, and zero-trust identity — with outcomes including gap analysis, prioritized initiative backlogs, and program roadmaps
- Produce and quality-assure client-ready deliverables — including IAM assessments, maturity scorecards, gap registers, architecture recommendations, strategic roadmaps, and executive briefings — that consistently meet professional services standards and withstand scrutiny at senior levels; mentor junior staff in deliverable quality and consulting craft
- Drive measurable engagement outcomes aligned to client business objectives: risk reduction, compliance posture improvement, program maturity advancement, and readiness for follow-on investment — documented through clear, evidence-based deliverables
- Develop and deepen strategic relationships with WWT's core IAM technology partners (SailPoint, Saviynt, Okta, CyberArk, BeyondTrust, Ping, Microsoft) to support joint go-to-market, co-selling, and practice capability advancement
- Drive revenue and profit growth for the IAM practice through delivery excellence, account expansion, pursuit support, and contribution to practice development initiatives including reusable methodologies, assessment frameworks, and thought leadership
Certain states and localities require employers to post a reasonable estimate of salary range. A reasonable estimate of the current base pay range for this position is $170,000 to $200,000 annually. Actual salary will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base pay.
The well-being of WWT employees is essential. So, when it comes to our benefits package, WWT has one of the best. We offer the following benefits to all full-time employees:
- Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
- Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
- Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
- Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
We strive to create an environment where all employees are empowered to succeed based on their skills, performance, and dedication. Our goal is to cultivate a culture of belonging that encourages innovation, collaboration, and respect for all team members, ensuring that WWT remains a great place to work for All!
If you have any questions or concerns about this posting, please email taposting@wwt.com.
LI-TB1
See all Identity And Access Management jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management roles.
Get Access To All JobsTips for Finding H-1B Visa Sponsorship in Identity And Access Management
Align your degree to IAM job requirements
USCIS scrutinizes whether your degree field directly relates to the role. A degree in computer science, cybersecurity, or information systems supports an IAM petition more cleanly than a general IT or business degree, which may trigger a Request for Evidence.
Use OFLC Wage Search to set salary expectations
Look up the prevailing wage for your IAM job title and work location before negotiating an offer. Your employer's LCA must certify a wage at or above the DOL prevailing wage level, so knowing that floor prevents last-minute petition complications.
Target employers with dedicated IAM teams
Financial institutions, cloud providers, and large healthcare systems regularly file H-1B petitions for IAM-specific roles like identity engineer or access management analyst. Use Migrate Mate to filter for employers with verified H-1B LCA filing history in this occupation.
Check if the role qualifies for cap-exempt filing
IAM roles at universities, nonprofit research organizations, or certain government contractors may be cap-exempt, letting your employer file outside the annual H-1B lottery. Confirm the employer's cap-exempt status with USCIS before the registration window opens.
Request premium processing if your start date is firm
IAM project timelines are often tied to security rollouts or compliance deadlines. If your offer has a specific start date, ask your employer to file with USCIS premium processing to get a decision within 15 business days rather than waiting months.
Document your hands-on IAM tool experience clearly
Experience with platforms like SailPoint, Okta, CyberArk, or Azure AD strengthens the specialty occupation argument in your petition. Your employer's support letter should connect your specific technical skills to the degree-level requirements of the role.
Identity And Access Management jobs are hiring across the US. Find yours.
Find Identity And Access Management JobsIdentity And Access Management H-1B Visa: Frequently Asked Questions
Does an Identity and Access Management role qualify as an H-1B specialty occupation?
Yes. IAM roles typically require a bachelor's degree or higher in computer science, cybersecurity, information systems, or a closely related field, which meets the USCIS specialty occupation standard. Roles like identity engineer, IAM architect, or access management analyst have consistent approval records because the degree-to-role connection is well-established in the field.
Which industries sponsor H-1B visas most often for IAM professionals?
Financial services, healthcare systems, cloud technology companies, and defense contractors are among the heaviest H-1B sponsors for IAM roles. These industries handle sensitive data and face strict compliance requirements under frameworks like SOX, HIPAA, and FedRAMP, which drive consistent demand for credentialed IAM specialists. You can browse employers with active LCA filings on Migrate Mate.
What happens to my H-1B status if my IAM role changes significantly after I'm approved?
A material change in job duties, location, or employer triggers an amended H-1B petition requirement. If your role shifts from hands-on IAM engineering to a general IT management function, USCIS may no longer view it as the same specialty occupation. Your employer should file an amended petition before the change takes effect.
How do I find the correct SOC code for my IAM job title when my employer files the LCA?
IAM roles most commonly fall under SOC code 15-1212 (Information Security Analysts) or 15-1244 (Network and Computer Systems Administrators), depending on the actual duties. Check the O*NET occupation profile for your specific job title to confirm the best-fit classification before your employer submits the LCA to DOL.
Can I switch IAM employers while on H-1B without losing my status?
Yes, under H-1B portability rules you can start working for a new employer as soon as they file a new H-1B petition on your behalf, provided your previous petition was approved and you've maintained valid status. The new employer must file before your current authorized period ends, and the new role must still qualify as a specialty occupation in IAM.
See which Identity And Access Management employers are hiring and sponsoring visas right now.
Search Identity And Access Management Jobs