Rivian and Volkswagen Group Technologies Verified
Automotive, Electric Vehicles, Manufacturing, Software
Staff Cybersecurity Engineer, Identity Platform Engineering
Atlanta, Georgia, United StatesHybridFull TimeStaffPosted 2 months agoVisa sponsorship available
Compensation estimateAI
See base, equity, bonus, and total comp estimates for this role — free, no credit card.
Sign up to see compensation estimateRivian is seeking a Staff Cybersecurity Engineer - Identity Platform Engineering (IAM/IGA) to drive our identity governance modernization and migration, building the infrastructure and engineering foundations needed to deliver scalable, auditable identity services. This role is deeply hands-on and cross-functional: you’ll partner with HR, IT, Enterprise Security, and the SOC to deliver reliable IAM services centered on Microsoft Entra ID (or equivalent enterprise identity platforms). You’ll build and operate IAM automation in AWS using disciplined engineering practices. This position will be located in Atlanta, GA and report to our Director of IAM.
- IGA Migration & Modernization: Drive modernization and migration of IGA capabilities (requests/approvals, fulfillment, access reviews/certifications, evidence generation) across our IGA environment, including SailPoint and Microsoft Entra ID governance workflows, delivering outcomes that are usable, auditable, and scalable.
- IGA Platform Infrastructure: Build the infrastructure and engineering foundations that make IGA reliable at scale (standard patterns, automation, configuration/versioning approaches, repeatable onboarding, and operational readiness).
- Automation & Platform Engineering: Design and build IAM automation and platform components (APIs, scripts, CLIs, lightweight services/jobs); deploy and operate them in AWS using Git-based delivery, CI/CD pipelines, and IaC, with production-ready basics (monitoring/logging, rollback, runbooks).
- Integration Engineering: Make application onboarding predictable through standard SSO and provisioning approaches (e.g., SAML/OIDC, SCIM), reusable templates/playbooks, and reliability gates; reduce recurring break-fix through operational readiness standards.
- Delivery Practices: Drive an engineering-quality delivery model: design/peer review, automated checks/testing where practical, staged rollouts, rollback plans, and operational readiness for IAM changes.
- Identity Lifecycle Reliability: Improve joiner/mover/leaver processes end-to-end, strengthening lifecycle automation, verified deprovisioning, and access revocation with clear health signals and robust failure handling.
- Modern Authentication/Authorization Patterns: Establish standard authentication and authorization patterns (SSO, MFA, OAuth/OIDC/SAML) with pragmatic exception handling and migration runbooks, including modern policy patterns in Microsoft Entra ID (e.g., Conditional Access).
- Operational Excellence: Treat IAM as a service: improve monitoring and runbooks, participate in incident response and on-call rotation, and drive post-incident improvements that prevent recurrence.
- Cross-Functional Alignment: Orchestrate delivery across HR IT, IT, Enterprise Security, and SOC partners; unblock decisions, communicate tradeoffs clearly, and land standards that are adopted (not just documented).
- Experience: 8+ years of relevant experience in IAM / cybersecurity engineering / identity platform engineering (or equivalent practical experience delivering comparable scope).
- IAM Domain Depth: Significant experience across identity lifecycle, governance concepts, authentication/authorization patterns, and privileged access fundamentals, including hands-on experience with a leading enterprise identity platform (e.g., Microsoft Entra ID, Okta) or equivalent.
- Engineering / DevSecOps Foundation: Strong hands-on ability using Go, Python, or PowerShell and Git-based workflows, with experience building CI/CD pipelines, using IaC (Terraform or CloudFormation), and deploying/operating automation in cloud environments (AWS or equivalent).
- Staff-Level Delivery: Demonstrated ability to drive cross-functional initiatives to completion and land changes that persist through standards, automation, and adoption, with a track record of improving operational outcomes through disciplined delivery and reliability practices.
- Operational Ownership: Experience supporting production identity systems with monitoring, incident response, and continuous improvement; comfort operating in an on-call rotation (IAM incidents).
- Delivery Discipline: Proven ability to deliver controlled change with design review, staged rollout, rollback readiness, and operational readiness criteria.
- Collaboration & Influence: Strong written and verbal communication; ability to align stakeholders and drive adoption through clear standards, design reviews, and enablement.