Job Description

<p style="margin-bottom:16px">Skill: OKTA Identity & Access Management.<br /> Location :: Bengaluru<br /> Experience :: 6 Yrs<br /> Budget :: upto 210k</p> <p>JD:</p> <p><a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Solution Development & Maintenance: Develop, implement, and maintain advanced identity and access management systems, solutions and policies.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Authentication & Federation: Design, implement, and maintain SAML, OIDC, and OAuth2 integrations for secure identity federation and access.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Okta Integration Specialist: Lead efforts to integrate new business applications with Okta (Peloton's IDP) by gathering requirements from stakeholders and implementing Single Sign-On (SSO) and SCIM for automated user provisioning.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Automation & Efficiency: Identify and deploy internal process improvements and automation specifically related to access provisioning and the Joiner, Mover, Leaver (JML) lifecycle management, utilizing tools like Okta Workflows extensively.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- API & Scripting Proficiency: Strong hands-on experience using Okta APIs (REST) for advanced integration, reporting, and management. Proficiency in scripting languages (e.g., Python or PowerShell) to build custom connectors, automate administrative tasks, and integrate with non-standard applications.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Multi-Factor Authentication (MFA): Implementation and tuning of modern MFA and Adaptive/Risk-Based MFA policies to enhance security without compromising user experience.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Privileged Access Management (PAM): Experience integrating and managing PAM solutions (e.g., CyberArk, Delinea, or native cloud PAM services) with the central identity store.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Zero Trust: Experience designing and implementing IAM controls within a broader Zero Trust security framework, focusing on continuous verification.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Tier 4 Escalation: Function as the Tier 4 escalation path for the global IT support team, resolving complex, persistent, or systemic technical identity and access management-related issues.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Security Improvement: Continuously improve IAM solutions and systems to enhance protection against evolving security threats and vulnerabilities; stay up-to-date with current IAM threats and industry solutions.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">- Strategic Contribution: Contribute to the planning and implementation of the overall IAM strategy and program roadmap.</a><br /> <br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Experience scaling and integrating directories (LDAP, Azure AD, etc.)</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Proven ability to architect, deploy, and maintain complex Okta environments, including Okta Identity Engine (OIE), Universal Directory, and custom branding/flows.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Experience with Identity Governance Administration (IGA) processes, including leading and automating User Access Reviews (UAR) and Segregation</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Experience with infrastructure as code software (Terraform, Ansible, Chef, etc.)</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Expertise in designing, developing, and debugging complex identity provisioning and lifecycle management automation using Okta Workflows (the "low-code" component) and integrating them with other APIs/systems.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Love for automating all things and streamlining business functions.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Strong problem solving skills. Attention to detail and a security minded approach to solving problems.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Ability to drive concurrent, complex projects and initiatives while managing operational escalations.</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Strong interpersonal and communication skills (verbal and written)</a><br /> <a href="https://www.wipro.com/cybersecurity/" style="color:#467886; text-decoration:underline">Strong documentation skills (training and process documentation)</a></p> <p> </p>

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application