Almost7+Years of expertise in IAM with Okla, Auth0, LDAP, SSO, MFA, Active Directory, RBAC, Power Shell,. Integrated Active Directory with IAM platforms and solutions to centralize identity management, access control, and authentication processes. Cyber Security/SOC Analyst, SOAR expert, Apache Elasticsearch, AWS Detective, Azure Sentinel, Google Cloud Security For a role requiring years of hands-on experience with Okla administration, implementation, and integration along with experience in building and managing IAM programs and identity management principles Integrated Active Directory with IAM platforms and solutions to centralize identity management, access control, and authentication processes. Solid Experience in Strong Authentication Auth Minder - 2 Factor Authentications. Extensive experience with designing and implementing Salient Security Manager including a deep architectural understanding of its technical components Experience designing and developing J2EE/Java applications with focus on REST API and Web services Expertise in relational databases and SQL Excellent written and verbal skills for communicating complex technical issues and concepts Expertise developing troubleshooting processes, methodologies and standards with Salient Security Manager. Cross-Department Collaboration: Work closely with IT, security, legal, and compliance teams to ensure IAM solutions meet business needs and regulatory standards. Training and Awareness: Provide training and guidance to internal teams on IAM policies, standards, and security best practices. Program Design and Implementation: Lead the design, development, and implementation of IAM programs, ensuring they align with organizational goals and security policies. Policy Development: Create and enforce identity and access management policies that comply with industry standards and regulatory requirements. Lifecycle Management: Oversee the complete identity lifecycle management process, ensuring that user accounts and permissions are appropriately managed from creation to termination. Access Review and Audits: Conduct regular access reviews and audits to ensure that IAM practices meet security standards and compliance requirements, addressing any discrepancies or gaps. Governance and Compliance: Ensure IAM solutions comply with industry regulations and frameworks (e.g., HIPAA, SOX, GDPR) and provide ongoing reporting for audits and compliance reviews. SSO Implementation: Lead the implementation and maintenance of Single Sign-On (SSO) solutions using Okla, ensuring a seamless and secure user experience across multiple applications. MFA Deployment and Management: Implement and maintain Multi-Factor Authentication (MFA) to enhance security, ensuring that it is configured appropriately across all systems and applications. User Provisioning and De-provisioning: Manage the automation of user provisioning and de-provisioning processes, ensuring that users have the appropriate access rights based on their roles within the organization. Access Control Management: Define and manage access control policies, including role-based access control (RBAC) and attribute-based access control (ABAC), to ensure the right people have the right access at the right time.