Search

Lead ICAM Engineer- Okta Implementation

ALTA IT Services
locationWashington, DC, USA
PublishedPublished: 6/14/2022
Technology
Full Time

Job Description

Job Description

Lead ICAM Engineer
Per Federal contract requirements U.S. Citizenship is required
100% Onsite in NW Washington, DC 20530 (5 days a week on-site)
Must be able to pass federal background check for DOJ Public Trust Clearance
W2 Employment ONLY
6 month+ Contract Opportunity
Target Start Date 11/3/25

The ICAM Engineer will be responsible for leading the implementation, configuration, and ongoing optimization of Okta for identity management across the organization. In this role, you will work closely with cross-functional teams to design and manage authentication, authorization, and access control systems that protect enterprise applications and resources. You will also lead efforts to ensure compliance with security standards, governance policies, and industry regulations, while continually driving improvements. This work is located onsite in the DC area.

Key Responsibilities:

• Lead the implementation of Okta for Single Sign-On (SSO), Multi-Factor Authentication (MFA), and User Lifecycle Management across on-premises and cloud-based applications.
Develop, update, and maintain GPOs to manage users across Active Directory domains
Collaborate with cybersecurity teams to align ICAM controls with Zero Trust principles
Document architecture, policies, and procedures for identity lifecycle management
• Design and architect Okta solutions to ensure seamless, secure access for internal and external users.
• Configure Okta Adaptive MFA, SSO integrations, Okta API Access Management, and Okta Lifecycle Management.
• Design and implement role-based access control (RBAC), entitlement management, and access governance policies using Okta.
• Integrate Okta with third-party applications, directories, and cloud-based services (e.g., Office 365, Salesforce, G Suite, etc.).
• Ensure robust API integrations to facilitate seamless authentication and user data synchronization across internal and external applications.
• Troubleshoot and resolve integration and access issues, working with cross-functional teams to provide technical solutions.
• Monitor Okta’s performance and usage, providing reports on login trends, user activities, and potential security risks.

Qualifications:
• Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications are a plus.
• 5+ years of experience in Identity and Access Management (ICAM) with at least 3 years of hands-on experience specifically in Okta.
• In-depth knowledge of Okta Identity and Access Management platform, including SSO, MFA, Lifecycle Management, and API Access Management.
• Experience with Okta integrations with cloud and on-premises applications such as Office 365, Salesforce, Google Workspace, etc.
• Strong understanding of role-based access control (RBAC), entitlement management, and user provisioning/de-provisioning workflows.
• Familiarity with IAM-related protocols such as SAML, OAuth, OpenID Connect, and LDAP.
• Knowledge of cloud platforms such as AWS, Azure, or Google Cloud and how they integrate with Okta for IAM.
• Experience with API integrations and Okta’s API Access Management.
• Understanding of security frameworks and regulations such as GDPR, HIPAA, and FISMA.
• Ability to troubleshoot complex Okta-related issues and implement solutions to meet security and compliance requirements.
• Excellent verbal and written communication skills, with the ability to explain complex IAM concepts to both technical and non-technical stakeholders.
• Ability to work effectively with cross-functional teams, including security, infrastructure, and business units.

Desirable Skills:
• Certifications: Okta Certified Administrator, AZ 300, AZ 500.
• Experience with Identity Governance tools and technologies such as SailPoint or Saviynt.
• Exposure to cloud security practices and experience securing cloud-based applications using Okta and Azure.


Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...