About the job
We appreciate your interest in joining IT Concepts, operating as Kentro, where our commitment to innovation paves the way for new opportunities and collaborative success. Our vibrant community of professionals is dedicated to advancing our clients' missions, enhancing individual growth, and positively influencing our communities.
At Kentro, we prioritize your personal and professional development. Together, we can foster significant change, ignite innovation, and reach remarkable achievements.
Kentro is seeking a talented Identity Governance and Administration (IGA) Engineer to join our Zero Trust execution team at U.S. Special Operations Command (USSOCOM). In a Zero Trust framework, identity is the cornerstone of security, and this position plays a critical role in establishing and managing the authoritative source that regulates access to the Command's most vital information.
In your role as the IGA Engineer, you will spearhead the deployment and configuration of SailPoint across NIPR, SIPR, and Top-Secret networks. You will advance beyond basic account provisioning to implement an advanced Attribute-Based Access Control (ABAC) model. Your responsibilities will include defining and overseeing the lifecycle of 'Trust Attributes' (such as security clearance, training status, and role classification) that are utilized by downstream enforcement tools including Microsoft Purview and Kiteworks. Your contributions will guarantee that any changes to a user’s status are reflected immediately in their access to sensitive information, even in air-gapped environments.
Key Responsibilities
- SailPoint Architecture & Configuration: Lead the design, deployment, and ongoing management of SailPoint IdentityNow (or IIQ) to automate the complete identity lifecycle (Joiner, Mover, Leaver) across hybrid and on-premises settings.
- ABAC Attribute Management: Establish and manage the schema for 'Trust Attributes' (e.g., Clearance, COI, Project Codes) within SailPoint, ensuring alignment with the NIST 8112 metadata standard for use in policy decision points.
- Air-Gapped Identity Operations: Oversee the offline instance of SailPoint on the Top-Secret network, developing workflows to import 'Attribute Manifests' and ensuring synchronization of identity data with the low-side source of truth.
- Access Certification: Configure and implement automated access certification campaigns for critical data repositories and privileged roles, ensuring compliance with DoD audit standards.
- Role Modeling: Collaborate with mission stakeholders to define Technical Roles and Business Roles within SailPoint, transitioning from broad, static Active Directory groups to detailed, policy-driven access roles.

