This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
MathWorks is seeking a Principal IAM/AD Engineer to join their Security Operations IAM team, responsible for managing and automating identity operations across on-premise Active Directory and Microsoft Entra ID within a hybrid work model.
Job Responsibility:
Operate and maintain on‑premises Active Directory: domain controller health, patching, promotion/demotion, replication, sites/subnets, time services, SYSVOL/GPO health, and capacity monitoring
Implement and manage Entra ID capabilities: Conditional Access, Identity Protection risk policies, PIM, and app registrations/service principals
Monitor, troubleshoot, and optimize directory synchronization and identity lifecycle flows
Partner with our SOC to drive a successful ITDR program
Help build and tune detections to identify threats such as DCSync, Golden/Silver Ticket, Kerberoasting, pass‑the‑hash/ticket, risky sign‑ins, and impossible travel
Harden AD and Entra ID: apply baselines, admin tiering, PAW usage, secure delegation, privileged workflow controls, regular access reviews, and identity threat hunting
Automate identity operations and ITDR tasks with PowerShell and APIs (Graph/Entra): alert enrichment, response runbooks, access certifications, reporting, and drift remediation
Lead complex troubleshooting and incident response for identity (Kerberos/NTLM, replication, DCSync/Golden/Silver Ticket detections, Conditional Access failures)
drive root cause and preventive actions
Produce runbooks, standards, and change records
mentor team members and collaborate with stakeholders to align IAM operations with business needs
Requirements:
A bachelor's degree and 10 years of professional work experience (or equivalent experience) is required
7+ years in enterprise Active Directory operations and hardening including DC lifecycle management, sites/services, replication, BCDR, and observability
Hands-on experience with Microsoft Entra ID: Conditional Access, MFA, Identity Protection, PIM, app registration and service principal governance
Experience operating Azure AD Connect or Cloud Sync in hybrid identity environments
Identity Governance and Administration experience for provisioning, role/entitlement models, and access certifications
Proficiency with PowerShell, Python and Microsoft Graph/Entra APIs for automation
Experience with privileged access models and administrative tiering
Ability to support after-hours maintenance and incident response as needed
SSO/Federation: SAML/OIDC/OAuth
SCIM provisioning to SaaS apps
AD security: trusts, LDAP/LDAPS, constrained delegation, GPO hardening
PKI and certificates: AD CS, CRL/OCSP, auto enrollment, renewal automation for workloads and service principals/certs
Backup/Recovery: authoritative restore, forest recovery planning and drills
IaC/automation: DSC, GPO as Code, Git workflows
CI/CD familiarity for scripts/policies
Compliance familiarity: CMMC, NIST CSF/800‑53/171, ISO 27001