Job Description
Title: SailPoint IIQ Developer
Location: Milwaukee WI – onsite only
Duration: Full Time
Job Summary
We are looking for a highly skilled SailPoint IdentityIQ (IIQ) Developer / DevOps Engineer to design, develop, deploy, and support enterprise-scale Identity and Access Management (IAM) solutions. The role requires strong expertise in SailPoint IIQ development, Java/Spring Boot, automation, and DevOps practices, with the ability to work independently on complex IAM initiatives and collaborate across multiple teams.
Key Responsibilities
- Design, develop, customize, and deploy SailPoint IdentityIQ solutions aligned with business and security requirements
- Customize IdentityIQ workflows, forms, rules, and connectors to meet enterprise IAM needs
- Configure and manage Access Policies, Roles, Certifications, and Entitlements within SailPoint IIQ
- Develop custom scripts and rules to extend SailPoint IdentityIQ functionality
- Integrate SailPoint IdentityIQ with enterprise systems such as Active Directory, LDAP, and HR systems
- Troubleshoot, analyse, and resolve issues related to SailPoint IIQ implementations and integrations
- Work with minimal supervision on large, complex IAM user stories and enhancements
- Apply engineering best practices across analysis, design, development, deployment, and support phases
- Contribute to secure and scalable IAM solution design aligned with organizational security standards
- Ensure solutions adhere to audit, compliance, and governance requirements.
- Contribute to automation initiatives and continuous improvement within the IAM domain
- Support and enhance CI/CD pipelines and DevOps practices for SailPoint and related services
- Participate in the development and deployment of Java Spring Boot and Microservices-based applications
- Promote innovation, efficiency, and reusability in IAM development processes
- Collaborate with cross-functional teams to gather requirements and design effective IAM solutions
- Provide technical guidance and support to project teams and business stakeholders
- Clearly explain technical concepts and solutions to both technical and non-technical audiences
- Support Agile ceremonies and delivery commitments
Required Skills and Qualifications
- 3–5 years of professional experience in software engineering or IAM implementations
- Proven experience as a SailPoint IdentityIQ Engineer
- Strong understanding of IAM concepts, protocols, and standards
- Strong proficiency in Java programming, including:
- Spring Boot
- Microservices architecture
- Hands-on experience with:
- SailPoint IIQ development (workflows, rules, connectors)
- Web technologies relevant to SailPoint IIQ
- Operating systems used in enterprise IAM environments
- Experience working in Agile / DevOps environments
- Familiarity with modern DevOps tools and CI/CD practices
- Ability to analyse, design, deploy, and support software and infrastructure enhancements
͏
Do
1. Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes, operations,
information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
g. Provide support during technical deployment, configuration, integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
j. Provide solution of RFPâÂÂs received from clients and ensure overall design assurance
͏
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the clientâÂÂs need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs
͏
2. Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
| No | Performance Parameter | Measure |
| 1 | Customer centricity | Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. |
| 2 | Support sales team to create wins | % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led |
Experience: 8-10 Years .
The expected compensation for this role ranges from $80,000 to $158,000 .
Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options.
Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.