The Customer Identity Access Management Engineer will enhance security, streamline CIAM solutions, and ensure systems are efficient and reliable while minimizing risks and resolving issues.
We are looking for a talented Customer Identity Access Management Engineer- Senior to join our team specializing in Systems/Information Technology for our Corporate organization in Atlanta, GA.
In this role, you will make an impact in the following ways:
- Reduce exploit risk by running scheduled vulnerability scans, prioritizing findings by severity/asset criticality, and driving remediation plans that close high‑risk gaps fast.
- Eliminate root causes by analyzing trends across findings, configs, and metrics to identify systemic issues (e.g., misconfigurations, patch hygiene), then implementing hardening standards.
- Ensure system interoperability and uptime by troubleshooting hardware/software interfaces across integrated platforms, resolving conflicts without compromising security controls.
- Embed security by design by conducting systems engineering and research that integrate CIS/NIST‑aligned controls into architecture, enabling business goals without friction.
- Optimize secure performance by aligning and validating cybersecurity configurations (e.g., baselines, policies) so systems meet documented requirements for availability, latency, and throughput.
- Validate defenses proactively by planning and executing authorized penetration testing and tooling on enterprise assets, translating findings into actionable remediation with owners.
- Design resilient platforms by architecting hardware, OS, and application configurations that meet cybersecurity requirements (least privilege, segmentation, encryption, logging).
- Drive continuous improvement by creating repeatable workflows, dashboards, and KPIs (MTTR for vulns, patch SLAs, coverage rates) that increase visibility, accountability, and sustained risk reduction.
To be successful in this role you will need the following:
- Balances stakeholders - Anticipating and balancing the needs of multiple stakeholders.
- Instills trust - Gaining the confidence and trust of others through honesty, integrity, and authenticity.
- Manages complexity - Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems.
- Optimizes work processes - Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement.
- Tech savvy - Anticipating and adopting innovations in business-building digital and technology applications.
- Cybersecurity System Integration - Creates, writes, tests and deploys scripts, code, configurations and controls utilizing the appropriate standards, best practices and tools to provide system integration and data fusion that enable better cybersecurity visibility, assessment and automation.
- Data Administration - Administers data storage and applications through proper training and coordinated efforts with internal and external partners to maintain system health and uptime.
- Network Services - Installs, configures, tests, operates, maintains and manages network security equipment and software through proper training and collaboration with internal and external partners to enable the secure sharing and transmission of data in support of cybersecurity and business information systems.
- Systems Administration - Installs, configures, troubleshoots and maintains server configurations through proper training and coordinated efforts with internal and external partners to ensure the confidentiality, integrity and availability of data and systems.
- Systems Security Requirements Planning - Consults with customers through attending cross-functional meetings to gather and evaluate security requirements and translates these security requirements for incorporation into a technical solution(s); provides guidance to partners on how to best apply security requirements as part of the Cummins governance processes through consultation to reduce business risk.
- Technology Research and Development - Conducts technology assessment and integration processes through proof of concept projects to evaluate its utility.
- Troubleshooting - Diagnoses and resolves the customer-identified issue by utilizing appropriate department standards to satisfy customer expectations.
- Values differences - Recognizing the value that different perspectives and cultures bring to an organization.
Education, Licenses, Certifications:
- College, university, or equivalent degree in Computer Science, Information Technology, Business, or related subject, or relevant equivalent experience required.
- This position may require licensing for compliance with export controls or sanctions regulations.
Experience:
- 3-5 years of cybersecurity work experience is required.
- Experience with Cloud technology and concepts preferred.
Core Requirements
- Experience in implementing complex and scalable Customer Identity and Access Management (CIAM) solutions
- Strong understanding of CIAM solution design, standards, and guidelines
- Experience with Integrating CIAM solutions with various enterprise applications, ensuring seamless access and user experience
- Hands-on experience with CIAM tools such as MS Entra External ID, Okta, Salesforce IAM, Ping Identity etc.
- Investigating and resolving critical issues within CIAM systems, including debugging and triaging logs across integrated systems
Must Have
- Proven experience in implementing large-scale CIAM platforms, including a strong understanding of IAM protocols (OAuth 2.0, OpenID Connect, SAML)
- A strong understanding of security principles, including encryption, token security, and session management.
- Excellent communication skills to include internal/external interaction, and documentation
- Proven ability to self-manage and complete project deliverables
Nice To Have
- Proficiency in data manipulation and analysis using SQL. Experience with Angular framework/Java.
- Stay up to date with new technologies and trends in identity management
Top Skills
Angular
Java
Ms Entra External Id
Oauth 2.0
Okta
Openid Connect
Ping Identity
Salesforce Iam
SAML
SQL
Similar Jobs
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Patent Attorney will manage patent portfolios, assist with patent prosecution, conduct invention mining, and utilize AI-driven workflows to enhance team efficiency.
Top Skills:
AILegal TechnologyPatent ProsecutionSpreadsheets
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Sr. Client Platform Engineer will manage cross-platform endpoints, lead vulnerability management, ensure security compliance, provide user support, automate workflows, and optimize endpoint performance.
Top Skills:
Antivirus SoftwareBashDisk EncryptionEdrIdentity And Access ManagementJamf ProLinuxmacOSMicrosoft SccmPowershellPythonWindows
Artificial Intelligence • Fintech • Insurance • Marketing Tech • Software • Analytics
The Business Information Security Officer (BISO) partners with technology and business leaders to align cybersecurity strategies, influence security service delivery, and improve security culture across the organization.
Top Skills:
Identity And Access ManagementInformation Security
What you need to know about the Charlotte Tech Scene
Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.
Key Facts About Charlotte Tech
- Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
- Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
- Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
- Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
- Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus


