H-1B Visa Identity And Access Management Iam Jobs
Identity and Access Management (IAM) roles sit squarely in USCIS's specialty occupation category, requiring a bachelor's degree or higher in computer science, information security, or a related field. Enterprises managing cloud infrastructure, compliance mandates, and zero-trust architectures actively file H-1B petitions for IAM engineers, architects, and analysts year-round.
See All Identity And Access Management Iam JobsOverview
Showing 5 of 6+ Identity And Access Management Iam jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All Jobs
Qualifications
- 12+ years of experience in cybersecurity with a sustained, deep focus on Identity and Access Management; must include substantial hands-on experience as both a security practitioner (implementing and operating IAM platforms) and a security consultant (advising enterprise clients, leading assessments, and owning delivery outcomes) — senior-level consulting experience is essential, not optional
- Deep technical mastery across all IAM domains with hands-on implementation and advisory experience, including: IGA — SailPoint IdentityNow/IdentityIQ, Saviynt, Omada, or One Identity (role engineering, access certification, SoD policy, lifecycle management, connector architecture); PAM — CyberArk (Core PAS, EPM, Conjur), BeyondTrust (Password Safe, Privilege Management), or Delinea/Thycotic (vault design, session recording, just-in-time access); Access Management — Okta, Ping Identity (PingFederate, PingOne), Microsoft Entra ID, or ForgeRock (SSO, adaptive MFA, SAML 2.0, OAuth 2.0, OIDC, SCIM); Cloud Identity — AWS IAM/IAM Identity Center, Azure Entra ID, GCP IAM, CIEM tools (Wiz, Ermetic, Sonrai); Directory Services — Active Directory (design, tiered admin model, hardening), Azure AD Connect, LDAP, and virtual directory architectures (Radiant Logic, Microsoft MIM)
- A bachelor's degree in Computer Science, Computer Information Systems, Information Assurance, or commensurate experience is required.
- Advanced certifications demonstrating IAM and security program depth — CISSP, CISM, CISA, CRISC, CCSP, or equivalent strongly preferred; vendor-specific certifications from SailPoint, Okta, CyberArk, BeyondTrust, Microsoft (SC-300, SC-400, AZ-500), or Saviynt are highly valued
- Extensive knowledge of current and upcoming security technologies and operations.
- Proven track record leading complex, multi-stakeholder IAM consulting engagements end-to-end — including scoping, discovery, assessment, roadmap development, executive reporting, and client relationship ownership — with documented high-quality outcomes delivered in demanding enterprise environments
- Expert working knowledge of identity and security governance frameworks: NIST SP 800-53 (AC and IA control families), NIST CSF 2.0, NIST SP 800-207 (Zero Trust Architecture), ISO 27001/27002, ISO 27005, MITRE ATT&CK credential access and lateral movement tactics, SOX ITGC access control requirements, HIPAA Security Rule, PCI DSS access control requirements, and DORA as it relates to identity resilience
- Hands-on technical experience spanning the full IAM implementation stack: IGA platform deployment and configuration, PAM vault build and privileged account onboarding, federation and SSO integration (SAML, OIDC, OAuth), directory services architecture, role mining and role engineering, access certification campaign design, SoD ruleset development, cloud IAM policy governance, and identity threat detection tooling
- Demonstrated ability to lead multiple concurrent client engagements at senior levels — managing delivery teams, client expectations, and competing priorities — while maintaining consistent delivery quality and client trust in dynamic, high-pressure enterprise environments
- Exceptional executive presence and communication skills: proven track record presenting at CISO, board, and C-suite levels; skilled at translating complex IAM risk and architecture concepts into clear business narratives; adept at adapting message depth and framing to audiences ranging from hands-on engineers to executive decision-makers
- Track record of leading and developing delivery teams, establishing engagement governance and quality standards, and contributing to IAM practice growth through reusable methodologies, assessment frameworks, thought leadership content, and market-facing engagements
- Mature consulting delivery competencies: structured discovery and workshop facilitation, gap analysis and maturity scoring, roadmap development and initiative sizing, SOW scoping, ROM estimation, and consistent production of client-ready deliverables — assessments, maturity reports, executive roadmaps, and program plans — that meet senior-level quality standards
Position Overview:
The Security Solutions Senior Manager — IAM is a senior domain authority who owns WWT's Identity and Access Management capability within client engagements and the broader Security Solutions practice. This is a high-impact, client-facing leadership role requiring a rare combination of deep IAM technical mastery and mature consulting delivery experience. The successful candidate has spent their career at the intersection of enterprise IAM architecture and security consulting — equally comfortable designing a zero-trust identity architecture as presenting a strategic program roadmap to a CISO, board, or executive steering committee.
The ideal candidate brings platform-depth across the full IAM stack — IGA, PAM, Access Management, cloud identity, and directory services — combined with strong command of risk management methodologies and the ability to score, benchmark, and communicate program maturity to both technical and business audiences. They hold advanced certifications and maintain current knowledge of the IAM vendor landscape, emerging threat patterns, and regulatory drivers.
This role demands seasoned consulting delivery capability: leading complex multi-workstream engagements end-to-end, owning executive client relationships at CISO and VP level, facilitating high-stakes workshops, producing board-ready deliverables, and mentoring delivery teams. The Senior Manager is as effective in a discovery workshop as they are presenting at a client steering committee or advancing a pursuit conversation with an account executive.
Essential Functions:
- Lead and own IAM delivery workstreams across cybersecurity engagements for enterprise clients spanning financial services, healthcare, retail, manufacturing, and public sector — with full accountability for delivery quality, timeline, and client satisfaction
- Maintain authoritative, current knowledge of enterprise IAM architecture across all domains: IGA, PAM, Access Management, cloud identity (CIEM), decentralized identity, and zero-trust identity principles — and translate that knowledge into practical, client-relevant guidance
- Evaluate IAM program maturity across IGA (joiner-mover-leaver lifecycle, role engineering, access certification, SoD policy), PAM (vault architecture, session management, just-in-time access, least-privilege enforcement), and Access Management (SSO, adaptive MFA, federation, SCIM provisioning) — and develop targeted roadmaps to close gaps and reduce identity risk
- Lead structured IAM assessments and advisory engagements: design discovery frameworks, conduct stakeholder interviews and technical SME sessions, synthesize findings, score maturity against recognized frameworks, and advise on strategic direction with clear, prioritized recommendations
- Lead pre-sales and solutioning activities: scope and size IAM consulting engagements, develop ROM estimates, author Statements of Work (SOWs), and serve as the IAM domain SME on pursuit teams partnering with account executives and practice leadership to win and structure engagements
- Own and develop client relationships at CISO, VP of Security, and Director levels; serve as a trusted advisor who is proactively engaged throughout the engagement lifecycle — from kickoff through executive readout — and who identifies and advances expansion opportunities within existing accounts
- Architect IAM solutions grounded in industry standards and security best practices — including zero-trust identity design, least-privilege access models, identity threat detection and response (ITDR), and cloud-native IAM patterns — tailored to client environments and business constraints
- Understand and advise on the identity-security interplay across application security (OAuth/OIDC, API security), data classification and access governance, network access control, endpoint and device trust, and emerging threats including identity-based attacks, credential compromise, and lateral movement via privileged access
- Translate complex IAM findings into business-aligned recommendations and executive roadmaps; present to C-suite and board audiences with authority and composure; facilitate steering committees, executive briefings, and program governance sessions
- Design and lead executive and technical workshops across IAM domains: IGA program design, PAM strategy and architecture, access management modernization (SSO, adaptive MFA, federation), cloud identity governance, and zero-trust identity — with outcomes including gap analysis, prioritized initiative backlogs, and program roadmaps
- Produce and quality-assure client-ready deliverables — including IAM assessments, maturity scorecards, gap registers, architecture recommendations, strategic roadmaps, and executive briefings — that consistently meet professional services standards and withstand scrutiny at senior levels; mentor junior staff in deliverable quality and consulting craft
- Drive measurable engagement outcomes aligned to client business objectives: risk reduction, compliance posture improvement, program maturity advancement, and readiness for follow-on investment — documented through clear, evidence-based deliverables
- Develop and deepen strategic relationships with WWT's core IAM technology partners (SailPoint, Saviynt, Okta, CyberArk, BeyondTrust, Ping, Microsoft) to support joint go-to-market, co-selling, and practice capability advancement
- Drive revenue and profit growth for the IAM practice through delivery excellence, account expansion, pursuit support, and contribution to practice development initiatives including reusable methodologies, assessment frameworks, and thought leadership
Certain states and localities require employers to post a reasonable estimate of salary range. A reasonable estimate of the current base pay range for this position is $170,000 to $200,000 annually. Actual salary will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base pay.
The well-being of WWT employees is essential. So, when it comes to our benefits package, WWT has one of the best. We offer the following benefits to all full-time employees:
- Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
- Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
- Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
- Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
We strive to create an environment where all employees are empowered to succeed based on their skills, performance, and dedication. Our goal is to cultivate a culture of belonging that encourages innovation, collaboration, and respect for all team members, ensuring that WWT remains a great place to work for All!
If you have any questions or concerns about this posting, please email taposting@wwt.com.
LI-TB1
See all Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All JobsTips for Finding H-1B Visa Sponsorship in Identity And Access Management Iam
Align your credentials to SOC codes
IAM roles map to multiple SOC codes depending on seniority. Pull the O*NET profile for your target title to confirm the exact degree requirements USCIS expects, then make sure your resume and credentials match that framing before applying.
Target employers with compliance-driven IAM teams
Financial institutions, healthcare systems, and federal contractors face HIPAA, SOX, and FedRAMP mandates that require dedicated IAM headcount. These employers file H-1B petitions more consistently because IAM isn't discretionary for them.
Search verified H-1B sponsors on Migrate Mate
Filter by IAM-related job titles to see which employers have active DOL Labor Condition Application filings for your role type. This confirms real sponsorship history before you invest time in the application process.
Verify prevailing wage before negotiating your offer
Your employer's LCA must certify a wage at or above the DOL prevailing wage for your role and location. Run the OFLC Wage Search for your SOC code and metro area so you enter salary discussions knowing the legal floor.
Document tool-specific certifications for the H-1B petition
Certifications in platforms like Okta, CyberArk, SailPoint, or Microsoft Entra ID strengthen the specialty occupation argument in your I-129 petition. Gather these credentials before your employer's attorney drafts the support letter.
Clarify cap-exempt status if changing employers mid-year
If you're transferring to a university, nonprofit research organization, or government-affiliated entity, your new employer may be cap-exempt. This means they can file your H-1B transfer at any point in the year without waiting for the April lottery window.
Identity And Access Management Iam jobs are hiring across the US. Find yours.
Find Identity And Access Management Iam JobsIdentity And Access Management Iam H-1B Visa: Frequently Asked Questions
Does an IAM role qualify as a specialty occupation for H-1B purposes?
Yes. IAM positions require theoretical and practical application of highly specialized knowledge in information security, identity governance, or directory services, and a bachelor's degree or higher in a directly related field. USCIS consistently classifies these roles as specialty occupations. Your employer's petition should include a detailed position description tying IAM duties to the degree requirement to reduce the risk of a Request for Evidence.
Which types of employers sponsor H-1B visas most consistently for IAM roles?
Employers with heavy regulatory exposure file the most H-1B petitions for IAM talent. That includes large banks, healthcare networks, defense contractors, cloud service providers, and managed security service providers. These organizations need IAM engineers to maintain continuous compliance, so headcount isn't easily cut. You can search employers with verified H-1B LCA filing history for IAM titles directly on Migrate Mate.
Can I work in IAM on OPT while waiting for my H-1B to be approved?
Yes, provided your OPT employment authorization is still valid and your role qualifies under your degree field. If you're on STEM OPT and your employer is E-Verify enrolled, you get a 24-month extension, giving you up to three years of post-graduation work authorization to bridge multiple H-1B lottery cycles. Confirm your employer's E-Verify enrollment status before accepting the offer.
What happens to my H-1B status if my IAM role changes significantly after approval?
A material change in job duties, location, or employer may require an amended H-1B petition. If your role shifts from hands-on IAM engineering to a primarily managerial function, or if you're redeployed to a new worksite outside the metro area covered by the original LCA, your employer must file an amendment with USCIS before the change takes effect. Unreported material changes create compliance risk for both you and your employer.
How does H-1B portability work if I want to move to a different IAM employer?
Under AC21, you can transfer your H-1B to a new employer and begin working immediately once the new I-129 petition is filed, provided your current H-1B has been approved for at least 180 days. The new role must be in the same or a similar occupational classification. IAM transfers generally satisfy this requirement as long as the core identity and access duties remain consistent across both positions.
See which Identity And Access Management Iam employers are hiring and sponsoring visas right now.
Search Identity And Access Management Iam Jobs