A major global technology services provider is seeking an experienced IAM Engineer for a 12-month freelance engagement, with a strong likelihood of extension. This opportunity is ideal for a hands-on identity engineering professional who excels in building, integrating, and supporting enterprise-scale IAM solutions within modern, high-security environments.
Job Title: IAM Engineer
Location: Belgium – Remote
Start Date: ASAP
Key Responsibilities
* Engineer, configure, and support enterprise Identity & Access Management solutions across the full identity lifecycle.
* Implement integrations between IAM platforms and enterprise applications, cloud services, and directory environments (AD, Azure AD, LDAP).
* Develop and maintain automation, provisioning logic, connectors, workflows, and identity processes.
* Support core IAM operations including onboarding/offboarding, access requests, authentication and authorization flows, and access reviews.
* Troubleshoot complex IAM issues, perform root-cause analysis, and ensure performance, reliability, and security across IAM systems.
* Contribute to upgrades, enhancements, migrations, and continuous improvement of IAM platforms and services.
* Ensure alignment with security controls, compliance requirements, and IAM best practices.
* Work closely with architects, security teams, and business stakeholders to deliver effective identity solutions.
Requirements
* 5+ years of hands-on experience in Identity & Access Management engineering.
* Strong understanding of IAM concepts including RBAC, authentication, authorization, provisioning, and governance.
* Experience with one or more major IAM platforms (e.g., SailPoint, Saviynt, Okta, Ping, ForgeRock, Azure AD).
* Technical skills in REST APIs, scripting (Python/PowerShell), SQL, and identity protocols (SAML, OAuth, OIDC, SCIM).
* Experience integrating IAM solutions within large, complex enterprise environments.
* Strong analytical, troubleshooting, and problem-solving abilities.
* Excellent communication skills and the ability to work with cross-functional technical and non-technical stakeholders.