Senior Identity Management Engineer

Aurora Innovation Aurora Innovation · Robotics · Mountain View, CA · Security

This role focuses on implementing and managing identity and access management (IAM) solutions, including Ping Directory and Conductor One, integrating HRIS systems, building connectors, and hardening compliance workflows. The engineer will own the full IAM lifecycle, evolving the infrastructure based on Zero Trust principles, SPIRE, and Open Policy Agent.

What you'd actually do

  1. Platform Implementation: Complete baseline environment configuration for Ping Directory and Conductor One across Dev and Prod tiers.
  2. Workforce Automation: Integrate HRIS (Workday) with the IGA platform to automate Joiner-Mover-Leaver (JML) processes.
  3. Technical Connectivity: Build and validate production-ready connectors for the core ecosystem, including Okta, AWS, Google, Slack, and Squad.
  4. Compliance Hardening: Deploy "Justify or Revoke" workflows and automated reporting to support SOX/ISO privileged access reviews.
  5. Identity Isolation: Execute the migration of Workforce and Service identities to Ping Directory.
  6. Operational Readiness: Define technical test plans, draft formal procedural documentation for audits, and create system runbooks for the permanent operations team.

Skills

Required

  • 4+ years in Information Security
  • 2+ years implementing IAM solutions
  • Expert-level knowledge of at least one major Cloud Identity Provider (AWS IAM, Azure)
  • core protocols including SAML, OAuth 2.0, OIDC, SCIM, and LDAP
  • Deep understanding of Zero Trust principles and access models such as RBAC, ABAC, and PBAC
  • Ability to develop code in either Python or Go

Nice to have

  • Experience with integration patterns with IdPs such as Okta, Auth0 or Microsoft Entra ID
  • Experience with Conductor One, SailPoint, Saviynt or similar platforms
  • Hands-on experience with Ping Directory or similar LDAP solutions
  • Understanding of AWS cloud infrastructure and security concepts
  • Comfortable with Kubernetes and Infrastructure-as-Code (IaC) such as Terraform and Helm and CI/CD platforms such as ArgoCD
  • Experience protecting APIs using OAuth scopes and claims
  • Troubleshoot and resolve complex integration and performance issues across the IAM stack

What the JD emphasized

  • implementing IAM solutions
  • Zero Trust principles
  • build, deployment, and configuration of the core IAM platform