The ideal candidate is a seasoned IAM professional with extensive, hands-on experience designing and implementing Ping Identity solutions in large, complex enterprise environments. They are deeply proficient with PingFederate, PingAccess, PingID, and Directory services, and can architect secure, sca