
Environment: Okta, Okta Universal Directory, Active Directory (AD), Microsoft Identity Manager (MIM), AWS, SSO, MFA, Step-up Authentication, OAuth 2.0, OpenID Connect (OIDC), SAML 2.0, Okta CIAM, Okta Customer Identity Cloud (CIC), AWS Cognito, Social Login, Passwordless Authentication (FIDO2, WebAuthn)Progressive Profiling, Okta Workflows, SailPoint IdentityNow, Lifecycle Manager, SCIM, RESTful APIs, Salesforce, Workday, ServiceNow, X.509 Certificates, JWT, PKI, JSON, XML, NIST SP 800-63, Zero Trust Architecture, Splunk, AWS GuardDuty, UEBA, CyberArk EPV, CyberArk PSM, CyberArk AIM, Break Glass Access, Beanshell, Microsoft Graph API, Python, AWS SDK (Boto3)
• Designed and implemented enterprise-wide Identity & Access Management (IAM) frameworks, combining Okta, SailPoint IdentityIQ, to manage user provisioning, deprovisioning, and identity lifecycle management across on-premises and hybrid directories, with integration support for Google Cloud Identity.
• Engineered Role-Based Access Control (RBAC) models and Role Engineering processes, integrating IAM Roles and IAM Policies to support scalable access governance and minimize privilege creep across Active Directory (AD), Okta Universal Directory, with policy evaluation extensions for Google Cloud IAM.
• Designed and automated Access Request Workflows and Delegated Administration using SailPoint’s Access Review Campaigns to streamline approvals and reduce administrative overhead across both Okta and GCP-based applications
• Implemented SailPoint workflows, RBAC models, and delegated admin roles, streamlining user provisioning and reducing manual approvals.
• Integrated access review and governance policies with SailPoint to support audit reporting and enforce privilege boundaries.
• Built and governed Identity Federation & Identity Broker mechanisms, enabling secure Single Sign-On (SSO) across SaaS platforms like Salesforce, Workday, and ServiceNow, using OAuth 2.0, SAML 2.0, OpenID Connect (OIDC) deployed across both Google Workspace and GCP-hosted applications.
• Implemented IAM Log Monitoring & Alerting pipelines using Splunk for behavior-based anomaly detection, leveraging UEBA (User & Entity Behavior Analytics) from Okta.
• Configured Privileged Access Management (PAM) using CyberArk EPV, PSM, and AIM, implementing Secrets Vaulting, High Privilege Workflows, Approval Chains, and granular access controls for administrative accounts with access to both Okta and GCP environments.
• Scripted automation logic using Python (with Boto3) and PowerShell, allowing programmatic interactions with Okta while orchestrating GCP IAM role modifications through Google Cloud SDKs.
• Established access management solutions using Okta, making sure we had solid SSO, Multi-Factor Authentication (MFA), and adaptive access policies. I also handled identity federation using industry standards like SAML 2.0, OpenID Connect (OIDC), and OAuth 2.0.
• A big part of my role involved automating how users were brought on board and how their access was removed. I used SCIM, and RESTful APIs to streamline these processes across various applications, which really cut down on manual work.
• I configured security features within both Okta and AWS to keep an eye out for and tackle security threats, particularly by looking for unusual user behaviors and sudden spikes in access.
• I was keen on making sure people only had the access they absolutely needed. I designed and enforced detailed access rules, using things like OAuth scopes, JWT claims all integrated with Okta.
• Keeping us compliant was key. I helped set up comprehensive reporting and ensured Okta audit logs were properly kept. I also used AWS CloudWatch for policy attestation, making sure we met important industry standards like ISO 27018 and NIST 800-63.
• My work contributed to consolidating our various identity systems into one solid core. This meant embedding SSO, MFA, and Federation Protocols right into every access point, primarily leveraging Okta and AWS
Environment: Okta, SailPoint IdentityIQ, Active Directory (AD), Okta Universal Directory, Azure AD, Google Cloud Identity, Google Cloud IAM, Salesforce, Workday, ServiceNow, OAuth 2.0, SAML 2.0, OpenID Connect (OIDC), Splunk, CyberArk (EPV, PSM, AIM), Python, PowerShell, Boto3, Google Cloud SDK. Okta, AWS MFA, SSO, SCIM, RESTful APIs, OAuth Scopes, JWT Claims, AWS CloudWatch, Okta Audit Logs, ISO 27018, NIST 800-63