Senior Identity Management Engineer

Aurora Innovation Aurora Innovation · Robotics · Mountain View, CA · Security

Senior Identity Management Engineer to support the technical execution of a modern identity ecosystem, implementing new tools like Conductor One and Ping Directory. The role involves owning the full IAM lifecycle, evolving existing infrastructure based on Zero Trust principles, SPIRE, and OPA into a scalable ecosystem. Responsibilities include platform implementation, workforce automation via HRIS integration, building connectors, deploying compliance workflows for SOX/ISO, migrating identities, and defining operational readiness procedures.

What you'd actually do

  1. Complete baseline environment configuration for Ping Directory and Conductor One across Dev and Prod tiers.
  2. Integrate HRIS (Workday) with the IGA platform to automate Joiner-Mover-Leaver (JML) processes.
  3. Build and validate production-ready connectors for the core ecosystem, including Okta, AWS, Google, Slack, and Squad.
  4. Deploy "Justify or Revoke" workflows and automated reporting to support SOX/ISO privileged access reviews.
  5. Execute the migration of Workforce and Service identities to Ping Directory.
  6. Define technical test plans, draft formal procedural documentation for audits, and create system runbooks for the permanent operations team.

Skills

Required

  • 4+ years in Information Security
  • 2+ years implementing IAM solutions
  • Expert-level knowledge of AWS IAM or Azure
  • Core protocols including SAML, OAuth 2.0, OIDC, SCIM, and LDAP
  • Deep understanding of Zero Trust principles and access models such as RBAC, ABAC, and PBAC
  • Ability to develop code in either Python or Go

Nice to have

  • Experience with integration patterns with IdPs such as Okta, Auth0 or Microsoft Entra ID
  • Experience with Conductor One, SailPoint, Saviynt or similar platforms
  • Hands-on experience with Ping Directory or similar LDAP solutions
  • Understanding of AWS cloud infrastructure and security concepts
  • Comfortable with Kubernetes and Infrastructure-as-Code (IaC) such as Terraform and Helm
  • Comfortable with CI/CD platforms such as ArgoCD
  • Experience protecting APIs using OAuth scopes and claims
  • Troubleshoot and resolve complex integration and performance issues across the IAM stack

What the JD emphasized

  • implementing IAM solutions
  • Zero Trust principles
  • SOX/ISO privileged access reviews