Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Zubair Syed

Dallas,Texas

Summary

An experienced IT professional with over 6 years in Identity & Access Management, specializing in OKTA for the past 5+ years. Skilled in designing and implementing end-to-end security solutions, including Single Sign-On (SSO) and Multi-Factor Authentication (MFA) using SAML 2.0, OAuth 2.0, and WS-Fed protocols. Key contributions include: Leading the seamless integration and management of Azure Active Directory and OKTA, ensuring robust and unified identity and access management. Expertise in implementing custom workflows using OKTA Workflows, streamlining user onboarding and access management processes. Developed OKTA On-Premises Provisioning Agent (OPP) for efficient integration between OKTA and on-premises applications. Experienced in integrating Terraform scripts into CI/CD pipelines for automated provisioning and security alignment. Implemented and configured MFA and SSO for both cloud and on-premises applications, driving secure authentication and access management across the enterprise. Implemented and managed Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) policies to enhance access security, ensuring users had appropriate permissions based on their roles and attributes. Skilled in mapping attributes and maintaining data consistency between OKTA and Azure Active Directory, ensuring data accuracy. Configured custom sign widgets using PowerShell and JavaScript to enhance user experience. Extensive experience in managing large-scale OKTA deployments, including user provisioning, security policies, and API integration. Worked with Agile methods in IAM projects streamline workflows, improve deployment efficiency, and adapt to evolving security requirements.

Overview

7
7
years of professional experience
1
1
Certification

Work History

Okta Developer

Chevron
09.2022 - Current
  • Enabling SSO for the applications and providing knowledge to the vendors how to use and supporting the application developing teams
  • Involved in the architecture, development, configuration, testing and deployment
  • Integrated various custom applications and OIN apps ino OKTA, utilizing protocols such as SAML2.0, OAuth 2.0, and OIDC for secure authentication and authorization
  • Regularly monitored AD/LDAP imports, troubleshooting, and resolving synchronization failures to ensure continuous and accurate user data
  • Successfully integrated OIDC applications using Authorization Code Grant and Client Credentials flow, optimizing authentication for both Single Page Applications (SPAs) and native applications
  • Led the implementation of O Identity Governance, streamlining user provisioning and ensuring compliance with organizational security policies
  • Developed and implemented OKTA Sign Widgets, improving user authentication workflows, and creating a seamless login experience
  • Collaborated with cross-functional teams in Agile sprints to deliver IAM solutions, ensuring timely integration of authentication, provisioning, and access control features
  • Implemented custom branding solutions to align OKTA authentication flows with organizational design standards
  • Defined and enforced group password policies for both AD-mastered and OKTA-mastered groups, ensuring consistency and security
  • Optimized RESTful services to enhance API quality and security, ensuring smooth integration with frontend components
  • Managed user provisioning through OKTA Portal, including CSV imports and AD sync, ensuring accurate and up-to-date user profiles across systems
  • Integrated Terraform scripts into CI/CD pipelines, automating OKTA configuration and deployment, significantly reducing manual effort
  • Utilized incremental and full imports from Azure Active Directory for user synchronization, extending user attributes as per business requirements
  • Collaborated with DevOps and security teams to integrate automated security scans into CI/CD pipelines, ensuring ongoing compliance and security
  • Integrated OKTA Universal Directory with on-premises systems using On-Premises Provisioning (OPP), enabling user synchronization, and reducing administrative overhead
  • Configured IP zones within OKTA to enforce location-based access restrictions, enhancing security for sensitive applications
  • Created and managed OKTA API tokens using Postman for secure API access, enabling automated interactions with OKTA services
  • Troubleshot and resolved issues with OKTA services, ensuring minimal downtime and high user satisfaction
  • Enabled SCIM provisioning for supported applications, streamlining the user lifecycle management process
  • Reset MFA settings and configured custom MFA policies based on organizational security requirements
  • Configured RBAC frameworks and automated provisioning processes within identity management systems, streamlining role assignments and reducing administrative efforts
  • Designed and implemented ABAC policies to enable dynamic access control based on user attributes, ensuring enhanced compliance with security standards
  • Monitored and analyzed OKTA System Logs to audit user activity, identify security incidents, and ensure adherence to access control policies, contributing to the overall security and operational efficiency
  • Actively managed support tickets via ServiceNow, resolving incidents in a timely manner based on priority, significantly improving user experience
  • Adapted quickly to new technologies and programming languages, enhancing overall team productivity.
  • Debugged complex software issues, leading to a more stable product release.
  • Continuously updated skills through training courses, workshops, and self-study—staying current on industry trends and emerging technologies.
  • Collaborated with cross-functional teams to ensure seamless integration of new features.

Okta Administrator

DSIG
08.2018 - 07.2021
  • Provided SSO support to application and engineering teams
  • Involved in development, configuration, testing and deployment
  • Managed day-to-day activities including creation and management of OKTA policies, and configuration of OKTA applications, such as SAML and SWA
  • Monitored AD/LDAP imports, addressing failures and implementing corrective actions to ensure data integrity
  • Created inbound federations between external and internal OKTA tenants to facilitate secure access for various use cases
  • Set up OKTA API tokens using Postman, enabling secure API interactions
  • Resolved user issues with OKTA through effective troubleshooting and support
  • Enabled SCIM provisioning and implemented MFA policies in line with user and security requirements
  • Configured user data stores and password credential validators
  • Developed standardized processes for implementing new SAML applications in collaboration with business teams
  • Implemented IDP and SP initiated SSO flows to enhance user access
  • Addressed ISAM-related challenges, including optimizing data retrieval, and maintaining data accuracy
  • Supported and maintained applications during performance and regression testing in production and development environments
  • Organized workflow and delegated tasks effectively to ensure timely project completion without compromising quality.

Security Engineer

DSIG
06.2017 - 07.2018

Performed Annual OS and Managed PKI Software Patch Upgrades on all Red Hat Linux PKI and LDAP servers for 100% availability and productivity

  • Installed, configured NetIQ E-directory, NetIQ Access manager and Access Gateway
  • Installed, Configured and Maintained Microsoft SQL Server 6.5/7.0/2000
  • Installed and configured Windows 2000/XP Pro and Linux Red Hat 8/9
  • Imported and updated users from directory using ICE commands for reporting purpose
  • Extended schema in E-directory as per requirement
  • Created user accounts, service account using NetIQ I-manager interface
  • Migrated applications from LDAP authentication to reverse proxy-based authentication
  • Worked directly with end users for troubleshooting login issues
  • Trained on different authentication protocols like SAML 2.0, OAuth 2.0 and OpenID connect
  • Configured and documented process for SAML 2.0 protocol using NetIQ Access manager
  • Updated password policies as per requirement using NetIQ I-manager interface
  • Implemented IDP initiated and SP initiated single sign on using NetIQ Access manager
  • Configuring User Authentication stores and Policy Authorization stores on LDAP
  • Created user directories, rules to provide authentication and authorizing access to enterprise resources
  • Synchronizing issues for User Directories
  • Created scripts for maintenance of user accounts and group existence in LDAP

Education

Master of Science - Information systems

Wilmington University
Wilmington, DE
01.2023

Bachelor of Technology - Mechanical Engineering

JNTUH
Hyd,India
01.2017

Skills

  • Identity & Access Management (IAM)
  • SSO
  • MFA
  • User Provisioning
  • Identity Governance
  • Federation
  • IDP & SP Flows
  • Okta Expertise
  • Integration & Configuration
  • API Management
  • Sign-In Widgets
  • Workflows
  • On-Premises Provisioning (OPP)
  • Universal Directory
  • SCIM Provisioning
  • Protocols & Standards
  • SAML 20
  • OAuth 20
  • OpenID Connect (OIDC)
  • WS-Federation
  • Terraform
  • Azure Active Directory (AAD)
  • AD/LDAP
  • ServiceNow
  • Postman
  • Scripting Languages
  • PowerShell
  • JavaScript
  • Development & Deployment
  • CI/CD Pipelines
  • Automated Provisioning
  • Application Migration

Certification

  • Okta Certified Administrator
  • Okta Certified Developer

Timeline

Okta Developer

Chevron
09.2022 - Current

Okta Administrator

DSIG
08.2018 - 07.2021

Security Engineer

DSIG
06.2017 - 07.2018
  • Okta Certified Administrator
  • Okta Certified Developer

Master of Science - Information systems

Wilmington University

Bachelor of Technology - Mechanical Engineering

JNTUH
Zubair Syed