Own end‑to‑end CIAM and workforce IAM integrations for enterprise and custom applications, with deep focus on Ping Identity (PingFederate, PingOne), Okta, and DaVinci orchestration workflows, supporting complex authentication and identity journeys.
Design, implement, and maintain customer and workforce authentication flows using SAML, OIDC/OAuth 2.0, and API‑based integrations, including token handling, claims mapping, scopes, and attribute transformation.
Build and operate DaVinci identity workflows to orchestrate authentication, registration, step‑up MFA, risk signals, identity verification, and downstream integrations across Ping, Okta, and third‑party services.
Lead application onboarding and migration efforts into Azure Entra ID for workforce identity, ensuring alignment with enterprise IAM standards, Conditional Access policies, and audit requirements.
Engineer and enforce MFA and adaptive authentication policies across CIAM and workforce platforms, including exception handling, conditional logic, and troubleshooting across global user populations.
Partner with application owners, product teams, and engineers to standardize authentication architectures, eliminate bespoke identity implementations, and align applications to approved CIAM and IAM patterns.
Integrate CIAM platforms with identity lifecycle and governance systems (e.g., SailPoint, HR‑driven sources, event‑based provisioning) to support user lifecycle, access governance, and compliance requirements.
Design and support non‑human identity use cases, including service accounts, API clients, secrets, certificates, and token‑based access for applications and integrations.
Develop and maintain automation, telemetry, and reporting for IAM and CIAM operations using scripting and dashboards to improve visibility, reduce manual effort, and support compliance (SOX, SOC2, GDPR).
Serve as a senior technical escalation point for complex IAM/CIAM incidents, performing root‑cause analysis across identity providers, federation layers, token issuance, and application integrations.
Contribute to IAM and CIAM governance, defining enforceable standards, patterns, and guardrails that translate security policy into operational reality.
Participate in cross‑functional initiatives including application modernization, platform consolidation, CIAM architecture evolution, and identity service reliability improvements.
Produce high‑quality technical documentation, runbooks, and reference architectures, and provide knowledge transfer to strengthen team capability and reduce single‑point dependencies.
Balance project delivery with BAU operational support, ensuring high availability and reliability of IAM and CIAM services while advancing platform maturity.