Identity And Access Management Iam Jobs in USA with Visa Sponsorship
Identity and Access Management (IAM) engineers are in high demand from employers willing to sponsor H-1B visa and O-1 visas, as the role consistently qualifies as a specialty occupation requiring a bachelor's degree in computer science, information security, or a related field. For detailed occupation requirements, see the O*NET profile.
See All Identity And Access Management Iam JobsOverview
Showing 5 of 7+ Identity And Access Management Iam jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 7+ Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All Jobs
Qualifications
- 12+ years of experience in cybersecurity with a sustained, deep focus on Identity and Access Management; must include substantial hands-on experience as both a security practitioner (implementing and operating IAM platforms) and a security consultant (advising enterprise clients, leading assessments, and owning delivery outcomes) — senior-level consulting experience is essential, not optional
- Deep technical mastery across all IAM domains with hands-on implementation and advisory experience, including: IGA — SailPoint IdentityNow/IdentityIQ, Saviynt, Omada, or One Identity (role engineering, access certification, SoD policy, lifecycle management, connector architecture); PAM — CyberArk (Core PAS, EPM, Conjur), BeyondTrust (Password Safe, Privilege Management), or Delinea/Thycotic (vault design, session recording, just-in-time access); Access Management — Okta, Ping Identity (PingFederate, PingOne), Microsoft Entra ID, or ForgeRock (SSO, adaptive MFA, SAML 2.0, OAuth 2.0, OIDC, SCIM); Cloud Identity — AWS IAM/IAM Identity Center, Azure Entra ID, GCP IAM, CIEM tools (Wiz, Ermetic, Sonrai); Directory Services — Active Directory (design, tiered admin model, hardening), Azure AD Connect, LDAP, and virtual directory architectures (Radiant Logic, Microsoft MIM)
- A bachelor's degree in Computer Science, Computer Information Systems, Information Assurance, or commensurate experience is required.
- Advanced certifications demonstrating IAM and security program depth — CISSP, CISM, CISA, CRISC, CCSP, or equivalent strongly preferred; vendor-specific certifications from SailPoint, Okta, CyberArk, BeyondTrust, Microsoft (SC-300, SC-400, AZ-500), or Saviynt are highly valued
- Extensive knowledge of current and upcoming security technologies and operations.
- Proven track record leading complex, multi-stakeholder IAM consulting engagements end-to-end — including scoping, discovery, assessment, roadmap development, executive reporting, and client relationship ownership — with documented high-quality outcomes delivered in demanding enterprise environments
- Expert working knowledge of identity and security governance frameworks: NIST SP 800-53 (AC and IA control families), NIST CSF 2.0, NIST SP 800-207 (Zero Trust Architecture), ISO 27001/27002, ISO 27005, MITRE ATT&CK credential access and lateral movement tactics, SOX ITGC access control requirements, HIPAA Security Rule, PCI DSS access control requirements, and DORA as it relates to identity resilience
- Hands-on technical experience spanning the full IAM implementation stack: IGA platform deployment and configuration, PAM vault build and privileged account onboarding, federation and SSO integration (SAML, OIDC, OAuth), directory services architecture, role mining and role engineering, access certification campaign design, SoD ruleset development, cloud IAM policy governance, and identity threat detection tooling
- Demonstrated ability to lead multiple concurrent client engagements at senior levels — managing delivery teams, client expectations, and competing priorities — while maintaining consistent delivery quality and client trust in dynamic, high-pressure enterprise environments
- Exceptional executive presence and communication skills: proven track record presenting at CISO, board, and C-suite levels; skilled at translating complex IAM risk and architecture concepts into clear business narratives; adept at adapting message depth and framing to audiences ranging from hands-on engineers to executive decision-makers
- Track record of leading and developing delivery teams, establishing engagement governance and quality standards, and contributing to IAM practice growth through reusable methodologies, assessment frameworks, thought leadership content, and market-facing engagements
- Mature consulting delivery competencies: structured discovery and workshop facilitation, gap analysis and maturity scoring, roadmap development and initiative sizing, SOW scoping, ROM estimation, and consistent production of client-ready deliverables — assessments, maturity reports, executive roadmaps, and program plans — that meet senior-level quality standards
Position Overview:
The Security Solutions Senior Manager — IAM is a senior domain authority who owns WWT's Identity and Access Management capability within client engagements and the broader Security Solutions practice. This is a high-impact, client-facing leadership role requiring a rare combination of deep IAM technical mastery and mature consulting delivery experience. The successful candidate has spent their career at the intersection of enterprise IAM architecture and security consulting — equally comfortable designing a zero-trust identity architecture as presenting a strategic program roadmap to a CISO, board, or executive steering committee.
The ideal candidate brings platform-depth across the full IAM stack — IGA, PAM, Access Management, cloud identity, and directory services — combined with strong command of risk management methodologies and the ability to score, benchmark, and communicate program maturity to both technical and business audiences. They hold advanced certifications and maintain current knowledge of the IAM vendor landscape, emerging threat patterns, and regulatory drivers.
This role demands seasoned consulting delivery capability: leading complex multi-workstream engagements end-to-end, owning executive client relationships at CISO and VP level, facilitating high-stakes workshops, producing board-ready deliverables, and mentoring delivery teams. The Senior Manager is as effective in a discovery workshop as they are presenting at a client steering committee or advancing a pursuit conversation with an account executive.
Essential Functions:
- Lead and own IAM delivery workstreams across cybersecurity engagements for enterprise clients spanning financial services, healthcare, retail, manufacturing, and public sector — with full accountability for delivery quality, timeline, and client satisfaction
- Maintain authoritative, current knowledge of enterprise IAM architecture across all domains: IGA, PAM, Access Management, cloud identity (CIEM), decentralized identity, and zero-trust identity principles — and translate that knowledge into practical, client-relevant guidance
- Evaluate IAM program maturity across IGA (joiner-mover-leaver lifecycle, role engineering, access certification, SoD policy), PAM (vault architecture, session management, just-in-time access, least-privilege enforcement), and Access Management (SSO, adaptive MFA, federation, SCIM provisioning) — and develop targeted roadmaps to close gaps and reduce identity risk
- Lead structured IAM assessments and advisory engagements: design discovery frameworks, conduct stakeholder interviews and technical SME sessions, synthesize findings, score maturity against recognized frameworks, and advise on strategic direction with clear, prioritized recommendations
- Lead pre-sales and solutioning activities: scope and size IAM consulting engagements, develop ROM estimates, author Statements of Work (SOWs), and serve as the IAM domain SME on pursuit teams partnering with account executives and practice leadership to win and structure engagements
- Own and develop client relationships at CISO, VP of Security, and Director levels; serve as a trusted advisor who is proactively engaged throughout the engagement lifecycle — from kickoff through executive readout — and who identifies and advances expansion opportunities within existing accounts
- Architect IAM solutions grounded in industry standards and security best practices — including zero-trust identity design, least-privilege access models, identity threat detection and response (ITDR), and cloud-native IAM patterns — tailored to client environments and business constraints
- Understand and advise on the identity-security interplay across application security (OAuth/OIDC, API security), data classification and access governance, network access control, endpoint and device trust, and emerging threats including identity-based attacks, credential compromise, and lateral movement via privileged access
- Translate complex IAM findings into business-aligned recommendations and executive roadmaps; present to C-suite and board audiences with authority and composure; facilitate steering committees, executive briefings, and program governance sessions
- Design and lead executive and technical workshops across IAM domains: IGA program design, PAM strategy and architecture, access management modernization (SSO, adaptive MFA, federation), cloud identity governance, and zero-trust identity — with outcomes including gap analysis, prioritized initiative backlogs, and program roadmaps
- Produce and quality-assure client-ready deliverables — including IAM assessments, maturity scorecards, gap registers, architecture recommendations, strategic roadmaps, and executive briefings — that consistently meet professional services standards and withstand scrutiny at senior levels; mentor junior staff in deliverable quality and consulting craft
- Drive measurable engagement outcomes aligned to client business objectives: risk reduction, compliance posture improvement, program maturity advancement, and readiness for follow-on investment — documented through clear, evidence-based deliverables
- Develop and deepen strategic relationships with WWT's core IAM technology partners (SailPoint, Saviynt, Okta, CyberArk, BeyondTrust, Ping, Microsoft) to support joint go-to-market, co-selling, and practice capability advancement
- Drive revenue and profit growth for the IAM practice through delivery excellence, account expansion, pursuit support, and contribution to practice development initiatives including reusable methodologies, assessment frameworks, and thought leadership
Certain states and localities require employers to post a reasonable estimate of salary range. A reasonable estimate of the current base pay range for this position is $170,000 to $200,000 annually. Actual salary will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in the base pay.
The well-being of WWT employees is essential. So, when it comes to our benefits package, WWT has one of the best. We offer the following benefits to all full-time employees:
- Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
- Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
- Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
- Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
We strive to create an environment where all employees are empowered to succeed based on their skills, performance, and dedication. Our goal is to cultivate a culture of belonging that encourages innovation, collaboration, and respect for all team members, ensuring that WWT remains a great place to work for All!
If you have any questions or concerns about this posting, please email taposting@wwt.com.
LI-TB1
See all 7+ Identity And Access Management Iam jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Identity And Access Management Iam roles.
Get Access To All JobsTips for Finding Identity And Access Management Iam Jobs
Lead with your IAM tool stack
Employers sponsoring visas for IAM roles want to see hands-on experience with Okta, SailPoint, CyberArk, or Azure AD upfront. Listing these in your resume summary signals technical depth before the recruiter reads further.
Target employers with existing IAM teams
Companies with dedicated IAM programs, not just generalist IT security teams, are far more likely to sponsor. They understand the specialty occupation standard and have immigration counsel already familiar with these petitions.
Frame your degree relative to the role
USCIS requires your degree to relate directly to IAM work. Computer science, information systems, and cybersecurity degrees align cleanly. If your degree is adjacent, document how your coursework covers identity protocols and access control systems.
Certifications strengthen your petition
Certifications like CISSP, CIAM, or vendor-specific credentials from Okta or Microsoft reinforce that IAM is a specialized discipline. They support the specialty occupation argument and differentiate you from generalist security candidates.
Highlight compliance and regulatory experience
IAM engineers who can demonstrate experience with SOX, HIPAA, or FedRAMP compliance requirements are significantly more attractive to sponsors. Regulated industries like finance and healthcare sponsor heavily and value that intersection of security and compliance knowledge.
Identity And Access Management Iam jobs are hiring across the US. Find yours.
Find Identity And Access Management Iam JobsFrequently Asked Questions
Does an IAM engineer role qualify as a specialty occupation for H-1B purposes?
Yes. IAM engineering consistently meets the H-1B specialty occupation standard because the work requires at minimum a bachelor's degree in computer science, information systems, cybersecurity, or a directly related field. USCIS has approved thousands of H-1B petitions for identity and access management roles, particularly when the job description specifies degree requirements and details technical responsibilities like directory services, federation protocols, and privileged access management.
What degree do I need for an employer to sponsor my IAM visa?
Most sponsoring employers require a bachelor's degree in computer science, information technology, information systems, or cybersecurity. Some employers accept degrees in related engineering fields if your coursework covers relevant areas like network security or systems administration. USCIS looks at whether the specific degree field matches the job duties, so a degree in business or an unrelated field will face more scrutiny even if you have strong work experience.
Which industries sponsor IAM engineers most frequently?
Financial services, healthcare, government contracting, and large technology companies are the heaviest sponsors of IAM roles. These industries face strict regulatory requirements around identity governance and access control, which creates sustained demand for sponsored talent. Consulting firms that staff IAM projects for enterprise clients also sponsor regularly. Migrate Mate lists verified sponsoring employers in these sectors so you can focus your applications where sponsorship is already confirmed.
Can I get sponsored on an O-1 visa for an IAM role instead of H-1B?
The O-1A is possible but harder to support for most IAM professionals. It requires demonstrating extraordinary ability through evidence like published research, speaking at major industry conferences, awards, or leading IAM implementations of exceptional scope. Senior IAM architects or those who have contributed to open standards bodies like IETF or OASIS have a stronger case. For most mid-level IAM engineers, the H-1B or TN (for Canadians and Mexicans) is a more realistic path.
How should I evaluate whether a job posting is genuinely open to visa sponsorship?
Look for explicit language like 'will sponsor work authorization' or 'H-1B transfer accepted' rather than assuming from the absence of a disclaimer. Many postings are silent on sponsorship, which means it depends on the employer's policy. On Migrate Mate, every listed role is vetted for sponsorship willingness, so you avoid wasting applications on employers who won't consider visa candidates. Direct outreach to the recruiter before applying can also confirm sponsorship intent quickly.
What is the prevailing wage requirement for sponsored Identity And Access Management Iam jobs?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which Identity And Access Management Iam employers are hiring and sponsoring visas right now.
Search Identity And Access Management Iam Jobs