The Role
The Implementation Engineer deploys, configures, and troubleshoots SPHEREboard in enterprise environments while ensuring integration with identity systems and client needs.
Summary Generated by Built In
The Opportunity:The Implementation Engineer is responsible for the hands-on technical deployment, configuration, and validation of SPHEREboard within enterprise client environments. Working closely with the Implementation Manager, project stakeholders, and customer IT/security teams, this role ensures the successful integration of SPHEREboard with client infrastructure, identity systems, and data sources.
This position requires strong technical troubleshooting skills, experience interacting directly with clients, attention to detail, and an understanding of enterprise security and identity governance ecosystems.
Key Responsibilities:1. Deployment & Configuration
To find out more about SPHERE and our solutions, please visit www.sphereco.com
SPHERE is an equal-opportunity employer. Applicants will be evaluated without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics.
This position requires strong technical troubleshooting skills, experience interacting directly with clients, attention to detail, and an understanding of enterprise security and identity governance ecosystems.
Key Responsibilities:1. Deployment & Configuration
- Install, configure, and validate SPHEREboard components, including connectors, agents, and data collectors.
- Integrate SPHEREboard with Active Directory, Azure AD, Okta, LDAP, cloud platforms, and data repositories.
- Execute technical implementation tasks according to project timelines and requirements.
- Validate proper data ingestion, normalization, and visualization within SPHEREboard.
- Collaborate with the client and internal teams to collect technical and security requirements.
- Analyze existing infrastructure and identify integration points with SPHEREboard.
- Document all environmental configurations and technical assumptions.
- Diagnose and resolve deployment issues related to network access, authentication, data pipelines, and connector configurations.
- Work with Engineering and Product teams to escalate and resolve complex technical problems.
- Implement solutions with a security-first mindset and in compliance with client policies.
- Create and maintain technical documentation for each deployment, including environment details, integration steps, and validation results.
- Contribute to internal knowledge bases, deployment guides, and reusable scripts.
- Provide feedback to Product and Engineering on platform usability and deployment challenges.
- Work under the direction of the Implementation Manager to execute scoped tasks and report status.
- Participate in internal stand-ups, client check-ins, and retrospectives.
- Support training and knowledge transfer to customer administrators’ post-deployment.
- Deployment quality and accuracy (e.g., data integrity, connector success rate).
- Time-to-completion of assigned implementation phases.
- Client satisfaction with technical execution.
- Frequency and resolution time of escalated technical issues.
- Adherence to internal processes, documentation, and quality standards.
To find out more about SPHERE and our solutions, please visit www.sphereco.com
SPHERE is an equal-opportunity employer. Applicants will be evaluated without regard to race, color, religion, sex, national origin, disability, veteran status, and other legally protected characteristics.
Am I A Good Fit?
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.
Success! Refresh the page to see how your skills align with this role.
The Company
What We Do
SPHERE is the pioneer of Identity Hygiene. We are dedicated to helping customers ensure that identities and access are only permitted where they should be, to achieve an ongoing state of Identity Hygiene. Our SPHEREboard platform provides the automation and intelligence to clean up messy permissions and ownership, as well as provide a proactive security posture consistent with today’s cybersecurity goals and regulatory mandates








