Airitos, LLC Logo

Airitos, LLC

Senior IBM (ISAM/ISVA) Engineer

Reposted 3 Days Ago
Be an Early Applicant
Remote
Hiring Remotely in India
Senior level
Remote
Hiring Remotely in India
Senior level
The Senior IAM Engineer will lead the migration of identity services from PingFederate and Duo Security to IBM Verify, focusing on configuration, integration, and optimization while ensuring secure transitions for SSO, MFA, and access policies.
The summary above was generated by AI

We are seeking a senior-level IBM Security Access Manager (ISAM) / IBM Security Verify Access (ISVA) Engineer with deep expertise in designing, deploying, and operationalizing secure access management platforms from the ground up.

This role requires hands-on experience standing up the full ISAM/ISVA infrastructure, configuring clustering and high availability, implementing disaster recovery, and integrating the platform into complex enterprise environments. This is not a support-only or configuration-only role — the ideal candidate has built resilient ISAM/ISVA environments end-to-end and understands the infrastructure, networking, security, and performance considerations required to run the platform at enterprise scale.

Key ResponsibilitiesArchitecture & Platform Deployment
  • Design and implement enterprise-grade ISAM / ISVA architecture

  • Install and configure:

    • ISVA Virtual Appliances (Access Control, Federation, Advanced Access Control)

    • Web Reverse Proxy (WRP)

    • Policy Server

    • Runtime components

  • Configure clustered deployments for scalability and redundancy

  • Design and implement multi-tier environments (DEV, QA, PROD)

  • Implement secure baseline configurations aligned with enterprise standards

High Availability & Disaster Recovery
  • Design and configure:

    • Appliance clustering

    • Runtime high availability

    • Session failover and replication

    • Load balancing strategies (F5, Netscaler, etc.)

  • Implement multi-data center deployments where required

  • Develop and test disaster recovery procedures

  • Configure database replication (if applicable)

  • Perform failover and resiliency testing

Integration & Security Implementation
  • Integrate ISAM/ISVA with:

    • Active Directory / LDAP

    • SAML 2.0 / OIDC / OAuth providers

    • Enterprise applications (on-prem and cloud)

    • MFA providers

    • API gateways

  • Implement:

    • Reverse proxy junctions

    • Access control policies

    • Federation trust relationships

    • Adaptive authentication and step-up authentication

  • Configure advanced access control policies and contextual risk-based access

Performance & Optimization
  • Tune reverse proxy performance and connection handling

  • Optimize authentication flows and federation transactions

  • Conduct performance testing and capacity planning

  • Troubleshoot latency, session issues, and authentication failures

Automation & DevOps
  • Automate appliance configuration using REST APIs and scripting

  • Develop deployment automation (Shell, Python, Ansible, etc.)

  • Support CI/CD integration for configuration promotion

  • Implement configuration backup and version control processes

Documentation & Knowledge Transfer
  • Produce detailed architecture and topology diagrams

  • Document build procedures and operational runbooks

  • Provide structured handoff to operations/support teams

Required Qualifications
  • 5+ years of hands-on experience with IBM ISAM / ISVA

  • Proven experience deploying ISAM/ISVA from scratch in enterprise environments

  • Strong experience with:

    • ISVA virtual appliances

    • Web Reverse Proxy configuration

    • Federation (SAML, OIDC, OAuth)

    • LDAP and Active Directory integration

    • Load balancers and networking fundamentals

  • Demonstrated experience designing and implementing high availability and disaster recovery solutions

  • Strong understanding of authentication protocols and identity federation

  • Experience with Linux systems and networking (DNS, TLS, certificates)

  • Strong scripting and automation skills

Preferred Qualifications
  • Experience migrating from ISAM to ISVA

  • Experience with containerized ISVA deployments

  • Experience integrating ISVA with API security platforms

  • Knowledge of zero trust architecture principles

  • Experience in financial services, healthcare, or other regulated industries

  • Security certifications (CISSP, CISM) or IAM-specific certifications

Key Competencies
  • Infrastructure-level expertise (not just policy configuration)

  • Strong troubleshooting and root cause analysis skills

  • Ability to design scalable, resilient, and secure access architectures

  • Strong documentation and communication skills

  • Ability to independently own platform build and lifecycle

What Success Looks Like
  • Fully operational ISAM/ISVA environment built and hardened from the ground up

  • High availability architecture successfully implemented and tested

  • Federation and access policies securely integrated across enterprise systems

  • Clean documentation and operational handoff

  • Stable, scalable access management platform ready for production

Top Skills

Duo Security
Ibm Verify
Oauth 2.0
Openid Connect (Oidc)
Pingfederate
Saml 2.0

Similar Jobs

An Hour Ago
Remote or Hybrid
India
Mid level
Mid level
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
The role involves business analysis for credit and debit cards and lending products, focusing on digital journeys and requirements documentation in retail banking.
Top Skills: AgileDigital BankingWallet-Based Payment Solutions
An Hour Ago
Remote or Hybrid
India
Mid level
Mid level
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
The Business Analyst in Asset Management will gather and document business requirements, engage with stakeholders, and support the delivery lifecycle in fund and investment workflows.
Top Skills: Agile
2 Hours Ago
Remote or Hybrid
Junior
Junior
Big Data • Fintech • Information Technology • Business Intelligence • Financial Services • Cybersecurity • Big Data Analytics
The Data Governance Business Analyst will support data governance initiatives, ensuring business processes are captured accurately and translated into solutions by investigating data lineage across systems and collaborating with stakeholders.
Top Skills: Power BITableau

What you need to know about the Pune Tech Scene

Once a far-out concept, AI is now a tangible force reshaping industries and economies worldwide. While its adoption will automate some roles, AI has created more jobs than it has displaced, with an expected 97 million new roles to be created in the coming years. This is especially true in cities like Pune, which is emerging as a hub for companies eager to leverage this technology to develop solutions that simplify and improve lives in sectors such as education, healthcare, finance, e-commerce and more.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account