Job Search

IGA SME

Fort Belvoir, Virginia

Piper Companies Logo

Job Id:
157834

Job Category:

Job Location:
Fort Belvoir, Virginia

Security Clearance:
Secret

Business Unit:
Piper Companies

Division:
Piper Enterprise Solutions

Position Owner:
Brendan McGowan

Piper Companies is looking for an IGA SME to join a large government integrator based of out Ft Belvoir, VA. This is a hybrid position and requires the candidate to be onsite 4 days a week and posses an active Secret clearance.


 Essential Duties of the IGA SME:

  • Develop custom integrations with various applications, directories, and systems using APIs and connectors provided by SailPoint
  • Ensure the IAM solutions adhere to security best practices and comply with relevant regulatory standards
  • Create comprehensive technical documentation, including design specifications, configurations, and integration details
  • Collaborate with cross-functional teams, including IT, security, and compliance, to ensure alignment with organizational policies and standards


Qualifications of the IGA SME:

  • Bachelor's degree preferred but not required
  • At least 4 years of experience designing and implementing IAM solutions
  • At least 2 years of experience implementing enterprise identity governance & administration (IGA) solutions such as SailPoint IQ, IdentityNow, Saviynt Security Manager, etc
  • Candidate must posses an active Secret clearance and Sec + certification


 Compensation for the IGA SME:

  • $180,000 - $200,000 (based on experience)
  • Comprehensive benefit package; Cigna Medical, Cigna Dental, Vision, 401k w/ ADP, PTO, paid holidays, sick Leave as required by law

This job opens for applications on 1/12/26. Applications for this job will be accepted for at least 30 days from the posting date


#LI-HYBRID

#LI-BM2


Identity Governance, Identity Administration, Identity Lifecycle Management, Access Management, Access Certification, Access Reviews, Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Policy-Based Access Control (PBAC), Privileged Access Management (PAM), Identity and Access Management (IAM), Identity Provisioning, De-provisioning, Entitlement Management, Segregation of Duties (SoD), Compliance Management, Audit Readiness, Regulatory Compliance, SOX Compliance, GDPR Compliance, HIPAA Compliance, NIST Standards, Zero Trust, Least Privilege, Identity Federation, Single Sign-On (SSO), Multi-Factor Authentication (MFA), Adaptive Authentication, Identity Reconciliation, Identity Correlation, Identity Repository, Directory Services, LDAP, Active Directory, Azure AD, Cloud Identity, Hybrid Identity, Identity Orchestration, Workflow Automation, Identity Analytics, Risk-Based Access, Access Policies, Access Requests, Self-Service Access, Identity Certification Campaigns, Role Mining, Role Engineering, Role Modeling, Role Hierarchies, Entitlement Catalog, Access Recertification, Access Attestation, Identity Governance Framework, Identity Governance Policies, Identity Governance Controls, Identity Governance Metrics, Identity Governance Reporting, Identity Governance Dashboards, Identity Governance Automation, Identity Governance Integration, Identity Governance Architecture, Identity Governance Best Practices, Identity Governance Standards, Identity Governance Compliance, Identity Governance Risk Management, Identity Governance Audit Trails, Identity Governance Monitoring, Identity Governance Analytics, Identity Governance Optimization, Identity Governance Maturity Model, Identity Governance Strategy, Identity Governance Roadmap, Identity Governance Implementation, Identity Governance Operations, Identity Governance Tools, SailPoint, Saviynt, Oracle Identity Governance, IBM Security Identity Governance, Microsoft Entra, Okta, Ping Identity, CyberArk, ForgeRock, Identity Governance APIs, Identity Governance Connectors, Identity Governance Data Models, Identity Governance Reporting Tools, Identity Governance KPIs, Identity Governance SLAs, Identity Governance Service Catalog, Identity Governance Change Management, Identity Governance Incident Management, Identity Governance Problem Management, Identity Governance Risk Assessment, Identity Governance Vulnerability Management, Identity Governance Threat Modeling, Identity Governance Compliance Audits, Identity Governance Regulatory Audits, Identity Governance Internal Audits, Identity Governance External Audits, Identity Governance Governance Committees, Identity Governance Governance Boards, Identity Governance Governance Processes, Identity Governance Governance Frameworks

Apply For This Position


Personal Information

Required
Required
Required
Required
Required
Required
Required

Additional Details

Required
Required
Required

Voluntary Self-identification Form

Required
Required
Required

Veteran Status *

Discharge Date:

Resume Upload

Please note only files with .pdf, .docx, or .doc file extensions are accepted.

Currently selected file:

Don't have a resume?