The Senior IAM Engineer will play a critical role in delivering secure and reliable identity services across Mattelβs enterprise. This position is responsible for implementing, supporting, and enhancing IAM and PAM solutions, including identity lifecycle automation, access controls, privileged account management, and integration with enterprise applications. 
As a senior engineer, this role will act as an escalation point for complex IAM and PAM issues, lead troubleshooting and remediation efforts, and contribute to operational stability and compliance initiatives such as User Access Reviews (UARs) and audit reporting. The Sr. IAM Engineer will collaborate with IAM Architects, PAM Engineers, ITDR Analysts, and security teams to ensure secure, seamless, and compliant identity services while driving automation to reduce manual processes. 
 
Objectives of this Role 
β’ Implement and support enterprise IAM and PAM platforms, ensuring high availability, security, and compliance. 
β’ Deliver identity lifecycle automation (Joiner-Mover-Leaver) and support integrations across Workday, Okta, AD/Entra ID, and other cloud or on-prem applications. 
β’ Administer and maintain Privileged Access Management solutions (e.g. CyberArk, Okta OPA, BeyondTrust, Delinea, Cerby). 
β’ Provide escalation support for complex IAM/PAM issues, integrations, and API troubleshooting. 
β’ Lead threat detection and incident response activities in collaboration with ITDR Analysts, using tools such as CrowdStrike ITP, Semperis DSP (or similar), with proven risk remediation capabilities. 
β’ Support compliance initiatives including User Access Reviews (UARs), audit reporting, and evidence gathering for SOX, PCI, and other frameworks. 
β’ Participate in disaster recovery planning, incident management, and risk remediation efforts. 
β’ Develop and maintain runbooks, workflows, and documentation for operational consistency and knowledge sharing. 
β’ Experience developing operational dashboards, metrics, and reporting using Security Information and Event Management (SIEM) and other tools (e.g. Grafana, Sumo Logic, CrowdStrike ITP etc.) to track IAM/PAM/ITDR effectiveness and risk. 
β’ Collaborate with cross-functional teams to deliver IAM services aligned with business and security objectives. 
β’ Additional duties may be assigned as necessary to meet the ongoing needs of the organization. 
β’ Work hours may vary, and the position may require availability during off-business hours as dictated by project needs, system changes, or security events. 
 
Skills and Qualifications 
Required: 
β’ 5+ years of hands-on experience in Identity and Access Management or cybersecurity operations. 
β’ Strong expertise with Okta Identity Cloud (SSO, MFA, Workflows, IGA, OPA, ODA) including lifecycle management and integrations. 
β’ Practical expertise with Privileged Access Management (CyberArk, Okta OPA, BeyondTrust, Delinea, Cerby) and secrets management. 
β’ Administration-level experience with Active Directory/LDAP, Entra ID (Azure AD), and cloud IAM solutions (e.g. AWS Cognito, Azure AD, GCP IAM). 
β’ Proven experience with authentication and federation standards (SAML, OAuth, OIDC, SCIM). 
β’ Experience in threat detection and incident response using tools such as CrowdStrike ITP, Semperis DSP and others, with proven risk remediation capabilities. 
β’ Familiarity with UAR (User Access Reviews), compliance reporting, and audit evidence collection to support regulatory frameworks (SOX, NIST CSF, PCI, etc.). 
β’ Strong background in scripting and automation with PowerShell, VBScript, Python, and REST APIs. 
β’ Hands-on expertise with monitoring and analytics platforms (e.g. Grafana, Sumo Logic, CrowdStrike ITP etc) for IAM/PAM service health and metrics. 
β’ Strong troubleshooting skills across Windows/Linux platforms, SSL certs, and cloud components. 
β’ Advanced Microsoft Excel, including pivot tables, formulas, and data analysis. 
β’ Participate in after-hours rotations or on-call duties to support critical incident response as needed. 
β’ Excellent communication, collaboration, and problem-solving skills. 
β’ Minimum Okta Certified Administrator. 
Preferred: 
β’ Bachelorβs degree in technology or applicable experience. 
β’ Okta Certified Administrator, Okta Consultant, or equivalent IAM certification. 
β’ CISSP, CISMP certification, or other security certifications. 
β’ Certification in CyberArk or comparable PAM technologies, with demonstrated ability to design, implement, and maintain secure privileged access environments. 
β’ Experience with endpoint privilege management (Windows/macOS) and server privilege management (Windows/Linux). 
β’ Experience with automation tools (Ansible, Terraform, CI/CD pipelines in AWS/Azure). 
β’ Experience contributing to disaster recovery and business continuity planning. 
β’ Knowledge of modern identity security principles including Zero Trust, passwordless authentication, and Just-in-Time access.