Oglethorpe Power
Tucker, Georgia
The Identity and Access Management (IAM) Engineer is accountable for the design, implementation, and operational integrity of enterprise identity and access management capabilities that protect critical business systems while enabling secure and efficient access for the workforce. This role serves as the technical authority for authentication, authorization, identity lifecycle management, and privileged access across on-premises and cloud environments. The IAM Engineer ensures automated Joiner/Mover/Leaver processes, enforces least-privilege and Zero Trust principles, and integrates IAM services with enterprise applications and infrastructure. Working closely with Cybersecurity, IT Infrastructure, HR, and application owners, the role delivers scalable, compliant identity solutions, supports audit and regulatory requirements (e.g., SOX, NERC CIP, ISO), and provides operational support for identity-related security incidents. The position acts as a subject-matter expert and trusted advisor to IT and Security leadership, reducing identity risk, improving control effectiveness, and enabling secure digital operations. A strong customer service focus, positive attitude, and excellent communication skills are essential. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines, and procedures, including but not limited to RUS, OSHA, SOX, NERC, FERC, and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Identity Architecture & Engineering: Design, implement, and operate enterprise IAM solutions across on-premises and cloud environments, including SSO, MFA, conditional access, RBAC, directory services, and application integrations. Ensure solutions are scalable, secure, and aligned with Zero Trust principles. Identity Lifecycle Management: Own and continuously improve Joiner/Mover/Leaver processes using authoritative identity sources. Implement role- and attribute-based access models and automation to ensure timely provisioning and deprovisioning while reducing manual effort and risk. Privileged Access Management (PAM): Implement and operate PAM solutions for administrative and service accounts, enforcing least privilege, credential vaulting, session monitoring, and secure break-glass access. Support audits, investigations, and forensic reviews related to privileged access. Governance, Risk & Compliance: Support access reviews, audits, and regulatory assessments. Maintain IAM documentation, standards, and procedures. Identify and remediate identity-related risks and control gaps. Security Operations Support: Assist with identity-related incident response activities. Investigate authentication anomalies, improve IAM logging and monitoring, and enhance alerting and detection capabilities. Collaboration & Technical Leadership: Serve as the IAM subject-matter expert. Provide technical guidance to peers, influence application onboarding with identity-first design principles, and advise IT and Security leadership on identity strategy and risk reduction. Required Qualifications: Education: Bachelor's degree in Computer Science, Cybersecurity, Engineering, Information Systems, or a related field from an accredited college or university. Certifications (Preferred but not required): Certified Information Systems Security Professional (CISSP) Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Cybersecurity Architect Expert Okta Certified Professional / Administrator GIAC Identity and Access Management (GIAM) Experience: Identity and Access Management Engineer III Experience: Minimum of 4 years of experience implementing and operating enterprise IAM solutions, including SSO, MFA, identity lifecycle management, and directory services. Responsibility: Independently manages IAM platforms and integrations. Owns Joiner/Mover/Leaver workflows, supports access reviews and audits, and resolves identity-related incidents. Contributes to IAM standards, documentation, and continuous improvement initiatives. Identity and Access Management Engineer IV Experience: Minimum of 6 years of experience designing and managing enterprise IAM and PAM solutions across hybrid and cloud environments. Responsibility: Leads IAM projects and enhancements, including application onboarding and PAM implementations. Designs role- and attribute-based access models, supports complex audits and compliance activities, and provides technical leadership across IT and Cybersecurity teams. Identity and Access Management Engineer V Experience: Minimum of 8 years of experience architecting and managing enterprise-scale IAM and PAM solutions in complex environments. Responsibility: Oversees major IAM initiatives and identity architecture decisions. Serves as the senior technical authority for IAM and PAM, advises leadership on identity risk and strategy, and drives enterprise adoption of Zero Trust and least-privilege principles. Specialized Skills: Technical Expertise Hands-on experience with enterprise IAM platforms such as Microsoft Entra ID (Azure AD), Okta, Ping Identity, or ForgeRock Strong knowledge of SSO, MFA, conditional access, RBAC, ABAC, and Zero Trust architectures Experience integrating IAM with Azure, AWS, and/or GCP Working knowledge of Active Directory, Azure AD, LDAP, and identity synchronization Experience with Privileged Access Management solutions and secure service account management Tools & Technologies IAM and PAM platforms Scripting and automation (PowerShell, Python preferred) Logging and monitoring integrations with SIEM platforms ITSM tools such as ServiceNow or Ivanti Security & Compliance Understanding of identity-related regulatory and compliance requirements (e.g., SOX, NERC CIP, ISO 27001) Experience supporting audits, access certifications, and control remediation Soft Skills Strong analytical and problem-solving skills Excellent written and verbal communication skills Customer-focused, collaborative mindset Ability to work independently and influence across teams
The Identity and Access Management (IAM) Engineer is accountable for the design, implementation, and operational integrity of enterprise identity and access management capabilities that protect critical business systems while enabling secure and efficient access for the workforce. This role serves as the technical authority for authentication, authorization, identity lifecycle management, and privileged access across on-premises and cloud environments. The IAM Engineer ensures automated Joiner/Mover/Leaver processes, enforces least-privilege and Zero Trust principles, and integrates IAM services with enterprise applications and infrastructure. Working closely with Cybersecurity, IT Infrastructure, HR, and application owners, the role delivers scalable, compliant identity solutions, supports audit and regulatory requirements (e.g., SOX, NERC CIP, ISO), and provides operational support for identity-related security incidents. The position acts as a subject-matter expert and trusted advisor to IT and Security leadership, reducing identity risk, improving control effectiveness, and enabling secure digital operations. A strong customer service focus, positive attitude, and excellent communication skills are essential. Responsible for compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines, and procedures, including but not limited to RUS, OSHA, SOX, NERC, FERC, and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Identity Architecture & Engineering: Design, implement, and operate enterprise IAM solutions across on-premises and cloud environments, including SSO, MFA, conditional access, RBAC, directory services, and application integrations. Ensure solutions are scalable, secure, and aligned with Zero Trust principles. Identity Lifecycle Management: Own and continuously improve Joiner/Mover/Leaver processes using authoritative identity sources. Implement role- and attribute-based access models and automation to ensure timely provisioning and deprovisioning while reducing manual effort and risk. Privileged Access Management (PAM): Implement and operate PAM solutions for administrative and service accounts, enforcing least privilege, credential vaulting, session monitoring, and secure break-glass access. Support audits, investigations, and forensic reviews related to privileged access. Governance, Risk & Compliance: Support access reviews, audits, and regulatory assessments. Maintain IAM documentation, standards, and procedures. Identify and remediate identity-related risks and control gaps. Security Operations Support: Assist with identity-related incident response activities. Investigate authentication anomalies, improve IAM logging and monitoring, and enhance alerting and detection capabilities. Collaboration & Technical Leadership: Serve as the IAM subject-matter expert. Provide technical guidance to peers, influence application onboarding with identity-first design principles, and advise IT and Security leadership on identity strategy and risk reduction. Required Qualifications: Education: Bachelor's degree in Computer Science, Cybersecurity, Engineering, Information Systems, or a related field from an accredited college or university. Certifications (Preferred but not required): Certified Information Systems Security Professional (CISSP) Microsoft Certified: Identity and Access Administrator Associate Microsoft Certified: Cybersecurity Architect Expert Okta Certified Professional / Administrator GIAC Identity and Access Management (GIAM) Experience: Identity and Access Management Engineer III Experience: Minimum of 4 years of experience implementing and operating enterprise IAM solutions, including SSO, MFA, identity lifecycle management, and directory services. Responsibility: Independently manages IAM platforms and integrations. Owns Joiner/Mover/Leaver workflows, supports access reviews and audits, and resolves identity-related incidents. Contributes to IAM standards, documentation, and continuous improvement initiatives. Identity and Access Management Engineer IV Experience: Minimum of 6 years of experience designing and managing enterprise IAM and PAM solutions across hybrid and cloud environments. Responsibility: Leads IAM projects and enhancements, including application onboarding and PAM implementations. Designs role- and attribute-based access models, supports complex audits and compliance activities, and provides technical leadership across IT and Cybersecurity teams. Identity and Access Management Engineer V Experience: Minimum of 8 years of experience architecting and managing enterprise-scale IAM and PAM solutions in complex environments. Responsibility: Oversees major IAM initiatives and identity architecture decisions. Serves as the senior technical authority for IAM and PAM, advises leadership on identity risk and strategy, and drives enterprise adoption of Zero Trust and least-privilege principles. Specialized Skills: Technical Expertise Hands-on experience with enterprise IAM platforms such as Microsoft Entra ID (Azure AD), Okta, Ping Identity, or ForgeRock Strong knowledge of SSO, MFA, conditional access, RBAC, ABAC, and Zero Trust architectures Experience integrating IAM with Azure, AWS, and/or GCP Working knowledge of Active Directory, Azure AD, LDAP, and identity synchronization Experience with Privileged Access Management solutions and secure service account management Tools & Technologies IAM and PAM platforms Scripting and automation (PowerShell, Python preferred) Logging and monitoring integrations with SIEM platforms ITSM tools such as ServiceNow or Ivanti Security & Compliance Understanding of identity-related regulatory and compliance requirements (e.g., SOX, NERC CIP, ISO 27001) Experience supporting audits, access certifications, and control remediation Soft Skills Strong analytical and problem-solving skills Excellent written and verbal communication skills Customer-focused, collaborative mindset Ability to work independently and influence across teams
PMCS SERVICES
Austin, Texas
We are seeking a full-time contractor or employee for a Senior Java Spring Developer role.Required Skills: Spring framework - Experience in Java Programming, Java Virtual Machine (JVM) Basics: Understanding how Java code executes, Spring Core, Build Tools: Maven or Gradle, Spring MVC, Spring Boot, Spring MVC (For Web Applications), Spring Data JPA (For Database Access), JPA (Java Persistence API), Spring Security (For Authentication and Authorization), Spring AOP (Aspect-Oriented Programming), Spring Cloud (For Microservices), Spring Integration (For Enterprise Integration Patterns), RESTful API Design Principles, Docker and Containerization. Java - Proficiency in Java SE, including OOP principles, data structures, collections, and exception handling, is fundamental. Understanding Java 8+ features like Lambdas and Streams, along with JVM basics, will significantly enhance your Spring development capabilities. JBoss EAP - JBoss EAP expertise requires understanding its architecture, configuration, and deployment processes for Java EE applications, along with skills in managing resources, security, and clustering. Familiarity with its administration console, CLI, and troubleshooting techniques is essential for effectively maintaining and optimizing JBoss EAP environments. HTML 5 - HTML5 skills encompass a strong understanding of semantic elements, form enhancements, and multimedia integration for structuring modern web content. Proficiency includes leveraging APIs like Canvas and Geolocation, alongside responsive design principles, to create interactive and accessible user experiences. Web Services REST and SOAP - Proficiency in Web Services requires a solid understanding of both REST and SOAP architectures, including message formats, protocols, and security considerations. For REST, this means grasping concepts like resource-based URLs, HTTP methods, and JSON/XML payloads; for SOAP, it involves understanding WSDL, XML Schema, and SOAP protocols for message exchange. Ant, Maven, and Gradle - Proficiency in Ant, Maven, and Gradle involves understanding build lifecycles, dependency management, and task automation for Java projects. Choosing one and mastering its configuration, plugins, and dependency resolution mechanisms are crucial for efficient software development. Okta - Okta skills involve understanding its identity and access management (IAM) capabilities, including single sign-on (SSO), multi-factor authentication (MFA), and user provisioning. Proficiency also includes configuring applications, managing user directories, and implementing security policies within the Okta platform. Google re CAPTCHA Enterprise - Google reCAPTCHA Enterprise skills involve understanding its advanced bot detection capabilities and integrating it into web applications to protect against fraudulent activities. Proficiency includes configuring risk analysis settings, interpreting scores, and implementing adaptive challenge strategies for optimal security and user experience. LN Threat Metrix - ThreatMetrix (now LexisNexis Risk Solutions) skills involve understanding its digital identity intelligence platform for fraud prevention and risk assessment. Proficiency includes configuring fraud rules, analyzing transaction data, and interpreting risk scores to identify and mitigate fraudulent activity across online channels. MS SQL Server - MS SQL Server skills encompass expertise in database design, querying with T-SQL, and administration tasks like backup/recovery and performance tuning. Proficiency includes understanding indexes, stored procedures, security management, and potentially advanced features like Always On Availability Groups. Unit testing tools and frameworks (Junit, Selenium, etc - Expertise in unit testing tools like JUnit and Selenium involves writing effective test cases, utilizing mocking frameworks, and understanding test-driven development (TDD) principles. Proficiency includes automating tests, interpreting results, and integrating testing into the CI/CD pipeline for robust software quality assurance. Preferred Skills: DB2 - DB2 skills encompass expertise in database design, querying using SQL. Thyme Leaf - Thymeleaf skills involve proficiency in creating dynamic web pages using its natural templating engine, integrating data from the backend into HTML templates. GIT - Git skills encompass proficiency in version control, including branching, merging, committing changes, and resolving conflicts, to effectively manage code repositories. CVS - CVS skills involve understanding its version control system for managing code changes and collaborating on software projects, including committing updates, branching, merging, and resolving conflicts within the CVS environment. While older, proficiency includes knowing its command-line interface and understanding its core functionalities for managing source code. Texas Workforce Commission experience
We are seeking a full-time contractor or employee for a Senior Java Spring Developer role.Required Skills: Spring framework - Experience in Java Programming, Java Virtual Machine (JVM) Basics: Understanding how Java code executes, Spring Core, Build Tools: Maven or Gradle, Spring MVC, Spring Boot, Spring MVC (For Web Applications), Spring Data JPA (For Database Access), JPA (Java Persistence API), Spring Security (For Authentication and Authorization), Spring AOP (Aspect-Oriented Programming), Spring Cloud (For Microservices), Spring Integration (For Enterprise Integration Patterns), RESTful API Design Principles, Docker and Containerization. Java - Proficiency in Java SE, including OOP principles, data structures, collections, and exception handling, is fundamental. Understanding Java 8+ features like Lambdas and Streams, along with JVM basics, will significantly enhance your Spring development capabilities. JBoss EAP - JBoss EAP expertise requires understanding its architecture, configuration, and deployment processes for Java EE applications, along with skills in managing resources, security, and clustering. Familiarity with its administration console, CLI, and troubleshooting techniques is essential for effectively maintaining and optimizing JBoss EAP environments. HTML 5 - HTML5 skills encompass a strong understanding of semantic elements, form enhancements, and multimedia integration for structuring modern web content. Proficiency includes leveraging APIs like Canvas and Geolocation, alongside responsive design principles, to create interactive and accessible user experiences. Web Services REST and SOAP - Proficiency in Web Services requires a solid understanding of both REST and SOAP architectures, including message formats, protocols, and security considerations. For REST, this means grasping concepts like resource-based URLs, HTTP methods, and JSON/XML payloads; for SOAP, it involves understanding WSDL, XML Schema, and SOAP protocols for message exchange. Ant, Maven, and Gradle - Proficiency in Ant, Maven, and Gradle involves understanding build lifecycles, dependency management, and task automation for Java projects. Choosing one and mastering its configuration, plugins, and dependency resolution mechanisms are crucial for efficient software development. Okta - Okta skills involve understanding its identity and access management (IAM) capabilities, including single sign-on (SSO), multi-factor authentication (MFA), and user provisioning. Proficiency also includes configuring applications, managing user directories, and implementing security policies within the Okta platform. Google re CAPTCHA Enterprise - Google reCAPTCHA Enterprise skills involve understanding its advanced bot detection capabilities and integrating it into web applications to protect against fraudulent activities. Proficiency includes configuring risk analysis settings, interpreting scores, and implementing adaptive challenge strategies for optimal security and user experience. LN Threat Metrix - ThreatMetrix (now LexisNexis Risk Solutions) skills involve understanding its digital identity intelligence platform for fraud prevention and risk assessment. Proficiency includes configuring fraud rules, analyzing transaction data, and interpreting risk scores to identify and mitigate fraudulent activity across online channels. MS SQL Server - MS SQL Server skills encompass expertise in database design, querying with T-SQL, and administration tasks like backup/recovery and performance tuning. Proficiency includes understanding indexes, stored procedures, security management, and potentially advanced features like Always On Availability Groups. Unit testing tools and frameworks (Junit, Selenium, etc - Expertise in unit testing tools like JUnit and Selenium involves writing effective test cases, utilizing mocking frameworks, and understanding test-driven development (TDD) principles. Proficiency includes automating tests, interpreting results, and integrating testing into the CI/CD pipeline for robust software quality assurance. Preferred Skills: DB2 - DB2 skills encompass expertise in database design, querying using SQL. Thyme Leaf - Thymeleaf skills involve proficiency in creating dynamic web pages using its natural templating engine, integrating data from the backend into HTML templates. GIT - Git skills encompass proficiency in version control, including branching, merging, committing changes, and resolving conflicts, to effectively manage code repositories. CVS - CVS skills involve understanding its version control system for managing code changes and collaborating on software projects, including committing updates, branching, merging, and resolving conflicts within the CVS environment. While older, proficiency includes knowing its command-line interface and understanding its core functionalities for managing source code. Texas Workforce Commission experience
Robotics technology LLC
Santa Clara, California
Job Description: We are seeking a dynamic Sr Systems Engineer with a strong background in Identity and Access Management (IAM) technologies, including Okta, Auth0, and Microsoft EntraID. The ideal candidate will actively engage in the planning, architecture, and execution of IAM systems, serving as a pivotal liaison between the organization and key vendors. This role demands a proactive approach to problem resolution, the ability to lead projects, and a commitment to mentoring technical staff. Collaboration with project managers and technical teams to deliver customer-centric solutions, including the presentation of design and deployment strategies, is essential. This role requires a proactive stance on system provisioning, maintenance, security, and compliance, ensuring alignment with company goals and regulatory standards. Key to the role is the development of policies and procedures that support system integrity, security, and availability, with a focus on identity verification and access control. Strong analytical skills, excellent communication abilities, and professional experience are crucial for success in this position. Systems Planning and Implementation: Actively participate in the planning and implementation of IAM systems, infrastructure, and related hardware and software in response to customer requests and organizational requirements. Programming/Scripting: Perform system-level programming/scripting to facilitate the management of supported applications and technologies, including Okta Expression Language (EL) and PowerShell. System Management: Conduct configuration, integration, maintenance, performance management, security management, failure analysis and recovery, and user support. IAM Technology Deployment: Lead IAM technology deployment projects, such as Okta, Auth0, and Microsoft Entra ID, ensuring deployments fulfill user needs and comply with security standards. API Management: Build, analyze, operate, and scale API management solutions to protect customer and workforce data, services, and applications. Security Standards: Emphasize security standards and user needs fulfillment in the deployment of IAM solutions, including MFA, RBAC, fine-grained authorization, passwordless authentication, and B2B/B2C scenarios. Emerging Technologies: Research emerging IAM technologies, including new products, services, protocols, and standards to inform procurement and development strategies. Governance, Risk, and Compliance (GRC): Develop and implement GRC strategies to ensure IAM solutions comply with regulatory requirements and industry standards. Conduct risk assessments and audits to identify and mitigate potential security risks. Vendor Liaison: Serve as a liaison to vendors (e.g., Okta, Auth0, Microsoft) to facilitate problem resolution. Project Leadership: Lead projects, working directly with Project Management, Account Management, and Customer teams. Mentorship: Mentor and cross-train technical staff, peers, and subordinate team members in IAM technologies and best practices. Development Standards: Provide guidance on development standards and quality expectations. Collaboration: Collaborate with technical staff, including project managers, to deliver customer-centric solutions, including presenting design and deployment strategies. Policy Development: Develop and oversee the implementation of policies and procedures to ensure system provisioning and maintenance is consistent with company goals, industry best practices, and regulatory requirements. Account Management: Manage end-user accounts, permissions, and access rights in accordance with best practices regarding privacy, security, and regulatory compliance. ITIL Standards: Participate and adhere to defined ITIL standards for incident, request, and change management. Documentation: Document problems and resolutions for future reference, as well as platform configurations and standards. Communication: Maintain excellent communication skills, particularly across functional technical areas. On Call Rotation (PIC) is required Qualifications IAM design, administration, and support for a minimum of 10 years. Experience with Okta, Auth0, and Microsoft Entra ID for a minimum of 8 years. Ability to design IAM solutions aligned with Zero Trust, identity governance, and adaptive authentication. Strong understanding of SSO, SAML, OAuth/OIDC, adaptive authentication, MFA, RBAC, and fine-grained authorization. Experience in API management and protecting customer and workforce data, services, and applications. Proficiency in JavaScript (Node.js preferred): Strong understanding of web security fundamentals to mentor application teams, extend IAM workflows, and automate tasks. Strong knowledge of security frameworks: Familiar with OWASP, NIST, and other industry-standard security principles. IAM Solution Design: Ability to design IAM solutions aligned with Zero Trust and Identity governance Proficiency in scripting with Okta Expression Language (EL) and PowerShell. Knowledge of GRC strategies and experience in conducting risk assessments and audits. Familiarity with CI/CD pipelines and tools such as Ansible, GitHub, Terraform, and Jenkins. Experience working in a hybrid multi-cloud environment with Azure and AWS. Must be able to work irregular hours as needed and participate in the on-call rotation to meet business needs Ability to sit at a desk and work on a computer for extended periods of time May occasionally lift and/or move up to 10 pounds Vision abilities required by this job include close vision and ability to adjust focus Bachelors Degree in Computer Science, Information Technology, Information Systems, or a related discipline. Equivalent experience and/or alternative qualifications will be considered. Relevant certifications such as Okta Certified Professional, CISSP, and Microsoft Certified: Identity and Access Administrator Associate (SC-300) highly preferred We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate on the basis of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law.
Job Description: We are seeking a dynamic Sr Systems Engineer with a strong background in Identity and Access Management (IAM) technologies, including Okta, Auth0, and Microsoft EntraID. The ideal candidate will actively engage in the planning, architecture, and execution of IAM systems, serving as a pivotal liaison between the organization and key vendors. This role demands a proactive approach to problem resolution, the ability to lead projects, and a commitment to mentoring technical staff. Collaboration with project managers and technical teams to deliver customer-centric solutions, including the presentation of design and deployment strategies, is essential. This role requires a proactive stance on system provisioning, maintenance, security, and compliance, ensuring alignment with company goals and regulatory standards. Key to the role is the development of policies and procedures that support system integrity, security, and availability, with a focus on identity verification and access control. Strong analytical skills, excellent communication abilities, and professional experience are crucial for success in this position. Systems Planning and Implementation: Actively participate in the planning and implementation of IAM systems, infrastructure, and related hardware and software in response to customer requests and organizational requirements. Programming/Scripting: Perform system-level programming/scripting to facilitate the management of supported applications and technologies, including Okta Expression Language (EL) and PowerShell. System Management: Conduct configuration, integration, maintenance, performance management, security management, failure analysis and recovery, and user support. IAM Technology Deployment: Lead IAM technology deployment projects, such as Okta, Auth0, and Microsoft Entra ID, ensuring deployments fulfill user needs and comply with security standards. API Management: Build, analyze, operate, and scale API management solutions to protect customer and workforce data, services, and applications. Security Standards: Emphasize security standards and user needs fulfillment in the deployment of IAM solutions, including MFA, RBAC, fine-grained authorization, passwordless authentication, and B2B/B2C scenarios. Emerging Technologies: Research emerging IAM technologies, including new products, services, protocols, and standards to inform procurement and development strategies. Governance, Risk, and Compliance (GRC): Develop and implement GRC strategies to ensure IAM solutions comply with regulatory requirements and industry standards. Conduct risk assessments and audits to identify and mitigate potential security risks. Vendor Liaison: Serve as a liaison to vendors (e.g., Okta, Auth0, Microsoft) to facilitate problem resolution. Project Leadership: Lead projects, working directly with Project Management, Account Management, and Customer teams. Mentorship: Mentor and cross-train technical staff, peers, and subordinate team members in IAM technologies and best practices. Development Standards: Provide guidance on development standards and quality expectations. Collaboration: Collaborate with technical staff, including project managers, to deliver customer-centric solutions, including presenting design and deployment strategies. Policy Development: Develop and oversee the implementation of policies and procedures to ensure system provisioning and maintenance is consistent with company goals, industry best practices, and regulatory requirements. Account Management: Manage end-user accounts, permissions, and access rights in accordance with best practices regarding privacy, security, and regulatory compliance. ITIL Standards: Participate and adhere to defined ITIL standards for incident, request, and change management. Documentation: Document problems and resolutions for future reference, as well as platform configurations and standards. Communication: Maintain excellent communication skills, particularly across functional technical areas. On Call Rotation (PIC) is required Qualifications IAM design, administration, and support for a minimum of 10 years. Experience with Okta, Auth0, and Microsoft Entra ID for a minimum of 8 years. Ability to design IAM solutions aligned with Zero Trust, identity governance, and adaptive authentication. Strong understanding of SSO, SAML, OAuth/OIDC, adaptive authentication, MFA, RBAC, and fine-grained authorization. Experience in API management and protecting customer and workforce data, services, and applications. Proficiency in JavaScript (Node.js preferred): Strong understanding of web security fundamentals to mentor application teams, extend IAM workflows, and automate tasks. Strong knowledge of security frameworks: Familiar with OWASP, NIST, and other industry-standard security principles. IAM Solution Design: Ability to design IAM solutions aligned with Zero Trust and Identity governance Proficiency in scripting with Okta Expression Language (EL) and PowerShell. Knowledge of GRC strategies and experience in conducting risk assessments and audits. Familiarity with CI/CD pipelines and tools such as Ansible, GitHub, Terraform, and Jenkins. Experience working in a hybrid multi-cloud environment with Azure and AWS. Must be able to work irregular hours as needed and participate in the on-call rotation to meet business needs Ability to sit at a desk and work on a computer for extended periods of time May occasionally lift and/or move up to 10 pounds Vision abilities required by this job include close vision and ability to adjust focus Bachelors Degree in Computer Science, Information Technology, Information Systems, or a related discipline. Equivalent experience and/or alternative qualifications will be considered. Relevant certifications such as Okta Certified Professional, CISSP, and Microsoft Certified: Identity and Access Administrator Associate (SC-300) highly preferred We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate on the basis of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law.