🔔 FCM Loaded

SailPoint DT&P Developer And Engineer (Bangalore, Chennai, Hyderabad, pune, Kolkata)

Incluziv

2 - 5 years

Bengaluru

Posted: 17/12/2025

Getting a referral is 5x more effective than applying directly

Job Description

Collaborating with cross-functional teams to understand and document business and functional requirements related to IAM and SailPoint IIQ/ ISC.

Designing and architecting SailPoint IIQ/ ISC solutions tailored to specific organizational needs, ensuring scalability, security, and compliance.

Developing connectors and integrations between SailPoint and various enterprise applications, directories, and cloud platforms.

Creating and customizing workflows, rules, and lifecycle event triggers to automate identity governance processes, including provisioning, deprovisioning, and access certifications.

Defining and implementing policies to enforce access controls, role-based access, and other security measures within the SailPoint environment.

Providing technical guidance and mentorship to development teams, ensuring best practices are followed in SailPoint IIQ development and implementation.

Diagnosing and resolving complex issues related to SailPoint IIQ, including performance, integration, and access-related problems.

Ensuring that SailPoint solutions align with security best practices and relevant compliance requirements (e.g., SOX, HIPAA, GDPR).

Creating and maintaining comprehensive technical documentation, including design specifications, configuration guides, and operational procedures.

The Team:

Digital Trust & PrivacyCyber Identity practice helps organizations in designing, developing, and implementing industry-leading Identity and Access Management (IAM) solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The Cyber Identity team delivers services to clients through following key areas of IAM:

IAM Strategy and Road Map

Enterprise Application Onboarding

User Lifecycle Management

Compliance Management

Password Management

Automated Provisioning

Roles Based Access Control (RBAC)

ITSM tools Integration

Advanced Authentication Methods

Privileged Access Management

The Cyber Identity team aims to provides thought leadership to organizations to help them create a seamless user experience for business users while protecting enterprise assets and applications and enabling efficient and optimized use of technology in the IAM domain.

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.