As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We're also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We're always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you.
Want more jobs like this?
Get Data and Analytics jobs that are Remote delivered to your inbox every week.
About the Role:
We are seeking an exceptional Principal IAM Architect to own and drive our comprehensive Enterprise Identity Governance Framework. This senior leadership position will be responsible for architecting, executing, enhancing, and presenting our identity transformation strategy with minimal oversight. As a cross-functional team leader, you will direct IAM operations, governance, and SRE monitoring teams to ensure cohesive execution across the identity landscape. The ideal candidate will demonstrate exceptional technical depth in identity and access management combined with strategic vision and the ability to influence across the organization.
As one of the world's leading cybersecurity technology companies, we set the bar extraordinarily high. This role demands nothing short of excellence-only the topmost of the top performers need apply.
What You'll Do:
- Lead the Enterprise Identity Transformation: Take complete ownership of our Identity Governance Framework - from strategy to execution, ensuring successful implementation with minimal supervision
- Lead Cross-Functional IAM Teams: Provide direct leadership across IAM operations, IAM governance, and IAM SRE monitoring functions, ensuring alignment and coordinated execution
- Architect End-to-End IAM Solutions: Design and implement comprehensive identity solutions spanning Okta, SailPoint, Delinea PAM, Veza for NHI, and LogScale monitoring
- Drive Technological Decision Making: Make authoritative technical decisions on IAM architecture, product selection, and implementation approaches based on industry best practices
- Develop Custom IAM Software Solutions: Create bespoke IAM tools, connectors, and automation systems to address unique enterprise requirements
- Leverage AI for IAM Innovation: Apply AI technologies to enhance identity governance, anomaly detection, and access intelligence capabilities
- Establish Operational Excellence: Implement IAM best practices, design operational runbooks, and create incident response procedures for identity services
- Lead Identity Monitoring Strategy: Design and implement comprehensive monitoring frameworks for identity services, focusing on availability, performance, and security
- Develop IAM SRE Practices: Establish SLAs, SLOs, and error budgets for identity services, and implement observability practices
- Evangelize and Present: Develop executive presentations, lead stakeholder communications, and cultivate executive sponsorship for identity initiatives
- Enhance Existing Frameworks: Critically evaluate and improve our current IAM architecture, identifying optimization opportunities and implementing enhancements autonomously
- Manage Cross-Functional Execution: Coordinate cross-functional implementation teams, align priorities, and remove roadblocks without requiring senior leadership intervention
- Develop Technical Standards: Create and enforce technical standards for authentication, authorization, identity governance, and privilege management
- Deliver Measurable Outcomes: Drive measurable improvements in security posture, operational efficiency, and compliance through identity transformation
- 15+ years of enterprise IAM experience with significant time spent in both
- Mid-sized companies approaching or navigating through inflection points in their growth
- Large enterprise environments with complex, global identity requirements
- Proven experience scaling IAM infrastructure during periods of hyper-growth
- Unrelenting passion for identity and access management with demonstrated thought leadership and continuous learning in the IAM space
- Insatiable curiosity about identity technologies and a proven history of self-directed research, experimentation, and innovation beyond assigned responsibilities
- Exceptional drive and work ethic matching the intensity and pace of a world-class cybersecurity leader
- Proven team leadership experience across multiple IAM disciplines (operations, governance, monitoring)
- Strong background in IAM operations management, including incident response, change management, and service reliability
- Experience with SRE practices applied to identity services, including monitoring, observability, and reliability engineering
- Strong software development expertise with ability to design, develop, and maintain enterprise-grade IAM software solutions
- Proven experience effectively leveraging AI technologies for identity management, including ML-based access anomaly detection, intelligent role mining, and generative AI for governance
- Demonstrated ability to build custom IAM tooling for automation, integration, and enhanced capabilities
- Proven experience successfully leading enterprise-wide identity transformation initiatives with minimal supervision
- Deep expertise across the IAM technology stack: Okta, SailPoint, Delinea, Active Directory, and cloud IAM (AWS, Azure, GCP)
- Extensive experience with identity governance, privileged access management, and non-human identity management
- Strong understanding of RBAC/ABAC models and implementation patterns
- Demonstrated ability to translate business requirements into technical architecture
- Experience developing identity frameworks that balance security, usability, and scalability
- Advanced knowledge of identity protocols (SAML, OAuth/OIDC, SCIM) and federation models
- Exceptional communication skills with ability to influence C-level executives
- Experience leading technical teams and mentoring IAM professionals
- Proficiency with infrastructure as code and automation (Terraform, Python, etc.)
- Experience implementing Zero Trust architecture
- Expertise with identity in containerized/Kubernetes environments
- Background in IAM for multi-cloud environments
- Experience with security compliance frameworks (SOX, PCI-DSS, HIPAA, etc.)
- Implementation experience with decentralized identity or blockchain-based identity solutions
- Expertise in developing AI/ML models for security applications
- Experience with large language models for security automation and policy creation
- Experience with observability platforms (e.g., Prometheus, Grafana, ELK)
- Experience with chaos engineering principles applied to identity systems
- CISSP, CISM, or other relevant security certifications
#LI-JC3
Benefits of Working at CrowdStrike:
- Remote-friendly and flexible work culture
- Market leader in compensation and equity awards
- Comprehensive physical and mental wellness programs
- Competitive vacation and holidays for recharge
- Paid parental and adoption leaves
- Professional development opportunities for all employees regardless of level or role
- Employee Resource Groups, geographic neighbourhood groups and volunteer opportunities to build connections
- Vibrant office culture with world class amenities
- Great Place to Work Certified™ across the globe
CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements.
If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance.
Find out more about your rights as an applicant.