
Non-Human Identities (NHI) Engineer
Yoursoftalternative, New Bremen, OH, United States
Primary Skills:
Orca Security, Cloud Security (AWS, Azure / Entra ID), Non-Human Identities, IAM, Secrets Detection, DevOps (GitHub, GitLab, Azure DevOps), Scripting (Python / PowerShell / Bash), SailPoint (integration), Telemetry & Log Analysis
Skill Level:
Master
Role Overview
Non-Human Identities Engineer responsible for implementing and operationalizing the organization’s strategy for managing machine identities (service accounts, tokens, bots, etc.) within a complex cloud environment.
The role focuses on deploying and configuring Orca Security, identifying and enriching non-human identities, and preparing structured data for integration with SailPoint governance processes. This is a highly hands‑on engineering role with strong interaction between Cloud Security, DevOps, and Identity & Access Management teams.
Key Responsibilities
Deploy, configure, and fine‑tune
Orca Security
for multi-domain environments (AWS, Azure / Entra ID, Active Directory)
Identify and correlate non-human identities, including:
Managed identities
OAuth clients
API keys
Bots
Develop enrichment logic to associate identities with:
Verified owners
Business applications
Implement
secrets scanning
across CI/CD pipelines and repositories (GitHub, GitLab, Azure DevOps)
Analyze runtime telemetry and logs to distinguish:
Risky or orphaned identities
Prepare and structure identity data for integration into
SailPoint
(governance layer)
Collaborate closely with Identity & Access Management teams to support lifecycle processes (onboarding, recertification, offboarding)
Automate data collection, correlation, and enrichment using scripting tools
Provide actionable insights from large-scale cloud security data
Required Skills & Experience
Expert-level hands‑on experience with
Orca Security
or similar platforms (e.g., Wiz)
Strong knowledge of
cloud identity and access models :
AWS (roles, permissions)
Azure / Entra ID (service principals, managed identities, app registrations)
Solid understanding of
non-human identities
and associated security risks (blast radius, misuse, orphan accounts)
Experience with
secrets detection
and secure DevOps practices
Hands‑on experience with
DevOps tools
(GitHub, GitLab, Azure DevOps)
Strong experience in
telemetry and log analysis
for security use cases
Proficiency in at least one scripting language:
Python, PowerShell, or Bash
Ability to structure and prepare data for IAM governance platforms
Strong analytical and problem‑solving skills
Excellent communication skills across technical and non-technical teams
Independent and proactive working style
Nice to Have
Exposure to
SailPoint
or similar IAM governance tools
Understanding of
identity lifecycle processes
(joiner/mover/leaver, recertifications)
Experience with automation and large-scale data correlation
Background in enterprise cloud security environments
#J-18808-Ljbffr
Orca Security, Cloud Security (AWS, Azure / Entra ID), Non-Human Identities, IAM, Secrets Detection, DevOps (GitHub, GitLab, Azure DevOps), Scripting (Python / PowerShell / Bash), SailPoint (integration), Telemetry & Log Analysis
Skill Level:
Master
Role Overview
Non-Human Identities Engineer responsible for implementing and operationalizing the organization’s strategy for managing machine identities (service accounts, tokens, bots, etc.) within a complex cloud environment.
The role focuses on deploying and configuring Orca Security, identifying and enriching non-human identities, and preparing structured data for integration with SailPoint governance processes. This is a highly hands‑on engineering role with strong interaction between Cloud Security, DevOps, and Identity & Access Management teams.
Key Responsibilities
Deploy, configure, and fine‑tune
Orca Security
for multi-domain environments (AWS, Azure / Entra ID, Active Directory)
Identify and correlate non-human identities, including:
Managed identities
OAuth clients
API keys
Bots
Develop enrichment logic to associate identities with:
Verified owners
Business applications
Implement
secrets scanning
across CI/CD pipelines and repositories (GitHub, GitLab, Azure DevOps)
Analyze runtime telemetry and logs to distinguish:
Risky or orphaned identities
Prepare and structure identity data for integration into
SailPoint
(governance layer)
Collaborate closely with Identity & Access Management teams to support lifecycle processes (onboarding, recertification, offboarding)
Automate data collection, correlation, and enrichment using scripting tools
Provide actionable insights from large-scale cloud security data
Required Skills & Experience
Expert-level hands‑on experience with
Orca Security
or similar platforms (e.g., Wiz)
Strong knowledge of
cloud identity and access models :
AWS (roles, permissions)
Azure / Entra ID (service principals, managed identities, app registrations)
Solid understanding of
non-human identities
and associated security risks (blast radius, misuse, orphan accounts)
Experience with
secrets detection
and secure DevOps practices
Hands‑on experience with
DevOps tools
(GitHub, GitLab, Azure DevOps)
Strong experience in
telemetry and log analysis
for security use cases
Proficiency in at least one scripting language:
Python, PowerShell, or Bash
Ability to structure and prepare data for IAM governance platforms
Strong analytical and problem‑solving skills
Excellent communication skills across technical and non-technical teams
Independent and proactive working style
Nice to Have
Exposure to
SailPoint
or similar IAM governance tools
Understanding of
identity lifecycle processes
(joiner/mover/leaver, recertifications)
Experience with automation and large-scale data correlation
Background in enterprise cloud security environments
#J-18808-Ljbffr