Architecting Identity and Access Management at Apple scale requires creativity to build world-class security fitting to our customers expectations. Familiarity with AWS IAM, GCP IAM, and other third party systems is only the beginning, understanding how to scale and transform systems in a safe and secure way requires experience and a deep understanding of how applications are built, deployed, and operated. You will work closely with stakeholders, engineers, product, program, and executives to charter a unification strategy that includes all compute, storage, network, data warehouse, business operations, business applications, and beyond. YOU WILL: Lead the design and implementation of scalable IAM infrastructure components ranging from hardware root identity, cryptographic chain of trusts, and fine grain access controlArchitect and integrate authentication and authorization frameworks (ACL, RBAC, ABAC, Zero Trust).Write, present, and communicate to senior executives the principles and benefits of IAMContribute code to demonstrate POCs