Identity Access Management Jobs in USA with Visa Sponsorship
Identity Access Management roles attract strong H-1B and O-1 sponsorship because the work requires specialized cybersecurity and IT credentials that qualify as a specialty occupation. Most employers file year-round under cap-exempt or change-of-status routes, making IAM one of the more sponsorship-friendly tracks in tech. For detailed occupation requirements, see the O*NET profile.
See All Identity Access Management JobsOverview
Showing 5 of 151+ Identity Access Management jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 151+ Identity Access Management jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity Access Management roles.
Get Access To All Jobs
We are seeking a highly driven and business‑aligned Identity BISO / Business Identity Officer (BIO) to serve as a key leader for Jefferies’ Segregation of Duties (SoD) Initiative and broader identity governance program. This role partners closely with business units, application teams, technology owners, and control functions to ensure SoD risks are identified, assessed, remediated, and prevented as part of our Identity & Access Management strategy.
This position exists at the intersection of identity security, risk management, and business enablement. The Identity BISO/BIO ensures our identity controls—including SoD, role governance, access governance, and certification processes—are effectively adopted across the enterprise. The role strengthens governance, drives cross‑functional alignment, and advances the identity security roadmap in collaboration with the IAM leadership team.
Key Responsibilities
1. SoD Program Leadership
- Lead the day‑to‑day execution of the enterprise Segregation of Duties (SoD) initiative, including risk assessment, policy enforcement, and remediation tracking.
- Partner with business owners, IT application teams, and control partners to define, validate, and refine SoD rulesets and conflict matrices.
- Facilitate prioritization of SoD issues and deliver regular reporting to senior stakeholders, including dashboards and KPI tracking.
2. Business Partnership & Stakeholder Engagement
- Act as the primary liaison between Global Information Security and assigned business units, understanding their processes, applications, and risk landscape.
- Conduct workshops, working sessions, and recurring governance meetings with business and IT teams (e.g., SOD Weekly Management Connect) to drive alignment and resolve issues.
- Communicate program updates, risks, and requirements to senior leaders in a clear and actionable manner.
3. Identity Governance & Control Execution
- Collaborate with application owners to ensure appropriate role design, access certifications, and control implementation that reduce SoD violations.
- Support annual and ongoing certification cycles, partnering with business and technology teams (e.g., 2026 Certification Process sessions) to ensure compliant execution.
- Work with audit, compliance, and risk teams to support assessments and drive closure of identified issues.
4. Program Governance & Continuous Improvement
- Maintain and enhance SoD standards, procedures, and governance artifacts.
- Recommend and drive improvements to tooling, automation, reporting, and integration with IAM systems (e.g., IGA platform, entitlement data quality, and application onboarding).
- Monitor control performance and identify opportunities to tighten controls or reduce manual effort.
5. Cross‑Functional Collaboration
- Coordinate with IAM engineering, security architecture, compliance, internal audit, application teams, and external partners.
- Facilitate discussion around SoD implications during new application onboarding, system upgrades, and process changes.
- Serve as an internal subject matter expert on SoD and access risk.
Required Qualifications
- 5–10 years of experience in Information Security, Risk Management, IT Governance, Identity & Access Management, or related fields.
- Direct experience with Segregation of Duties frameworks, access control models, and entitlement governance.
- Strong understanding of business processes in financial services (e.g., trade lifecycle, finance, operations, regulatory reporting).
- Proven track record of managing cross‑functional programs and driving outcomes with business and technology teams.
- Exceptional communication, facilitation, and relationship‑building skills.
- Ability to interpret complex technical and business issues and translate them into actionable plans.
Preferred Qualifications
- Experience with IGA platforms (SailPoint, Saviynt, or similar).
- Knowledge of role‑based access control (RBAC) design principles.
- Familiarity with regulatory frameworks (SOX, FFIEC, NIST, ISO27001).
- Prior consulting or BISO-type experience supporting business units.
- Strong analytical skills and comfort working with data.
Primary Location Full Time Salary Range of $145,000 - $200,000.

We are seeking a highly driven and business‑aligned Identity BISO / Business Identity Officer (BIO) to serve as a key leader for Jefferies’ Segregation of Duties (SoD) Initiative and broader identity governance program. This role partners closely with business units, application teams, technology owners, and control functions to ensure SoD risks are identified, assessed, remediated, and prevented as part of our Identity & Access Management strategy.
This position exists at the intersection of identity security, risk management, and business enablement. The Identity BISO/BIO ensures our identity controls—including SoD, role governance, access governance, and certification processes—are effectively adopted across the enterprise. The role strengthens governance, drives cross‑functional alignment, and advances the identity security roadmap in collaboration with the IAM leadership team.
Key Responsibilities
1. SoD Program Leadership
- Lead the day‑to‑day execution of the enterprise Segregation of Duties (SoD) initiative, including risk assessment, policy enforcement, and remediation tracking.
- Partner with business owners, IT application teams, and control partners to define, validate, and refine SoD rulesets and conflict matrices.
- Facilitate prioritization of SoD issues and deliver regular reporting to senior stakeholders, including dashboards and KPI tracking.
2. Business Partnership & Stakeholder Engagement
- Act as the primary liaison between Global Information Security and assigned business units, understanding their processes, applications, and risk landscape.
- Conduct workshops, working sessions, and recurring governance meetings with business and IT teams (e.g., SOD Weekly Management Connect) to drive alignment and resolve issues.
- Communicate program updates, risks, and requirements to senior leaders in a clear and actionable manner.
3. Identity Governance & Control Execution
- Collaborate with application owners to ensure appropriate role design, access certifications, and control implementation that reduce SoD violations.
- Support annual and ongoing certification cycles, partnering with business and technology teams (e.g., 2026 Certification Process sessions) to ensure compliant execution.
- Work with audit, compliance, and risk teams to support assessments and drive closure of identified issues.
4. Program Governance & Continuous Improvement
- Maintain and enhance SoD standards, procedures, and governance artifacts.
- Recommend and drive improvements to tooling, automation, reporting, and integration with IAM systems (e.g., IGA platform, entitlement data quality, and application onboarding).
- Monitor control performance and identify opportunities to tighten controls or reduce manual effort.
5. Cross‑Functional Collaboration
- Coordinate with IAM engineering, security architecture, compliance, internal audit, application teams, and external partners.
- Facilitate discussion around SoD implications during new application onboarding, system upgrades, and process changes.
- Serve as an internal subject matter expert on SoD and access risk.
Required Qualifications
- 5–10 years of experience in Information Security, Risk Management, IT Governance, Identity & Access Management, or related fields.
- Direct experience with Segregation of Duties frameworks, access control models, and entitlement governance.
- Strong understanding of business processes in financial services (e.g., trade lifecycle, finance, operations, regulatory reporting).
- Proven track record of managing cross‑functional programs and driving outcomes with business and technology teams.
- Exceptional communication, facilitation, and relationship‑building skills.
- Ability to interpret complex technical and business issues and translate them into actionable plans.
Preferred Qualifications
- Experience with IGA platforms (SailPoint, Saviynt, or similar).
- Knowledge of role‑based access control (RBAC) design principles.
- Familiarity with regulatory frameworks (SOX, FFIEC, NIST, ISO27001).
- Prior consulting or BISO-type experience supporting business units.
- Strong analytical skills and comfort working with data.
Primary Location Full Time Salary Range of $145,000 - $200,000.
How to Get Visa Sponsorship in Identity Access Management
Frame your degree as a direct match
USCIS requires a degree in a specific field tied to the role. Computer science, information systems, and cybersecurity degrees map cleanly to IAM. If your degree is adjacent, document how your coursework directly applies to identity governance and access control.
Target employers with an established IAM practice
Large financial institutions, healthcare networks, and enterprise tech companies run dedicated IAM teams and sponsor regularly. These organizations have existing immigration counsel and streamlined processes, which dramatically reduces the time from offer to petition filing.
Highlight certifications alongside your degree
Certifications like SailPoint, CyberArk, Okta, or CISSP strengthen your specialty occupation case. USCIS looks at the totality of qualifications, and recognized industry credentials signal the specialized nature of the work beyond what a degree title alone conveys.
Understand the cap-exempt H-1B pathway
Universities, nonprofits, and government research organizations can file H-1B petitions outside the annual lottery. If you're early in your career or missed the cap, IAM roles at these institutions offer a direct route to H-1B status without waiting for the next registration cycle.
Get your LCA details right before the interview
Your employer files a Labor Condition Application with the Department of Labor certifying prevailing wage compliance before your petition proceeds. Confirm the LCA lists the correct work location, as IAM engineers often work across multiple sites or remotely, which can complicate compliance.
Use OPT STEM extension time strategically
If you're on F-1 OPT, cybersecurity and information systems degrees typically qualify for the 24-month STEM extension, giving you up to three years of work authorization. Use that window to register for the H-1B lottery twice and build your specialty occupation evidence file.
Identity Access Management jobs are hiring across the US. Find yours.
Find Identity Access Management JobsSee all 151+ Identity Access Management jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity Access Management roles.
Get Access To All JobsFrequently Asked Questions
Do Identity Access Management jobs qualify as a specialty occupation for H-1B?
Yes. IAM roles consistently qualify as a specialty occupation because they require at minimum a bachelor's degree in computer science, information systems, cybersecurity, or a directly related field. USCIS has approved thousands of IAM-related petitions, and the role's technical complexity, governing user provisioning, privileged access, and identity governance platforms, supports the specialty occupation argument clearly.
Which visa types are most common for IAM professionals?
The H-1B is the most common pathway for IAM engineers hired from abroad. Australians can pursue the E-3, which has no annual lottery and processes faster. Canadians and Mexicans may qualify under TN status. Senior IAM architects with documented leadership and publications sometimes qualify for the O-1A, which bypasses the H-1B cap entirely.
Does my degree field matter, or is experience enough?
Degree field matters for H-1B purposes. USCIS requires a direct relationship between your degree and the specific IAM role. Computer science, information security, and information systems are the strongest fits. If your degree is in a different field, you'll need to show through transcripts and an expert evaluation that your coursework is equivalent to a qualifying degree in a relevant discipline.
How do I find IAM employers who actively sponsor visas?
Browse Migrate Mate's job board, which filters specifically for visa-sponsoring employers in tech and cybersecurity. IAM sponsorship is most common at large enterprises in finance, healthcare, and cloud infrastructure. DOL Labor Condition Application disclosure data also shows which companies filed IAM-related petitions recently, giving you a concrete list of historically active sponsors to target in your search.
Can IAM contractors or consultants get sponsored, or only direct hires?
Sponsorship for IAM contractors is more complicated. Under H-1B rules, the petitioning employer must maintain an employer-employee relationship, which consulting arrangements can blur. Staffing firms do sponsor H-1Bs for consulting placements, but USCIS scrutinizes third-party placement petitions more closely. Direct hire roles at the end client are the cleanest sponsorship path and face significantly fewer requests for evidence.
What is the prevailing wage requirement for sponsored Identity Access Management jobs?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which Identity Access Management employers are hiring and sponsoring visas right now.
Search Identity Access Management Jobs