2+ SailPoint Jobs in Pune | SailPoint Job openings in Pune
Apply to 2+ SailPoint Jobs in Pune on CutShort.io. Explore the latest SailPoint Job opportunities across top companies like Google, Amazon & Adobe.
We are seeking a skilled SailPoint IdentityIQ Developer to join our Identity and Access Management (IAM) team. The ideal candidate will be responsible for designing, developing, implementing, and supporting SailPoint IIQ solutions to manage user identities, entitlements, and access privileges across the enterprise.
Key Responsibilities:
- Design and implement SailPoint IIQ solutions including lifecycle events, certifications, policies, and workflows.
- Develop custom connectors and integrate SailPoint with various systems (e.g., Active Directory, databases, cloud platforms).
- Configure and customize SailPoint IIQ components such as rules, roles, policies, and tasks.
- Perform application onboarding and connector development.
- Troubleshoot and resolve issues related to identity provisioning and access governance.
- Collaborate with cross-functional teams including security, compliance, and application owners.
- Maintain documentation for configurations, processes, and procedures.
- Participate in code reviews, testing, and deployment activities.
- Ensure compliance with security policies and regulatory requirements.
Required Skills & Qualifications:
- 3+ years of hands-on experience with SailPoint IdentityIQ.
- Strong understanding of IAM concepts: provisioning, de-provisioning, RBAC, SOD, access reviews.
- Proficiency in Java, BeanShell, XML, and web services (REST/SOAP).
- Experience with directory services (LDAP, Active Directory) and databases (SQL).
- Familiarity with cloud platforms (AWS, Azure, GCP) is a plus.
- Strong problem-solving and analytical skills.
- Excellent communication and documentation skills.
|
IAM architecture, solution designing, documenting, implementation |
|
Identity Lifecycle Management and Privilege Access Management |
|
Sailpoint, Okta, CyberArk, Microsoft, Thycotic |
|
IT security policy, procedure, design, Information systems security assessment and audits |

