drjobs IAM Okta SSO Engineer ___ Cincinnati, OH (100% Onsite) ___ Contract

IAM Okta SSO Engineer ___ Cincinnati, OH (100% Onsite) ___ Contract

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Cincinnati, OH - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: IAM Okta SSO Engineer
Location: Cincinnati OH (100% Onsite)
Long Term Contract W2 / C2C

Work Hours:

  • India Shift Support: 12:30 PM to 9:30 PM IST (Mandatory ODC hours)
  • Onsite Overlap Hours: 6:30 PM to 3:30 AM IST (as required by the client)

Job Overview:

We are looking for a highly experienced IAM Okta SSO Engineer to join our Identity & Access Management team. This role combines technical expertise with functional ownership supporting complex Okta integrations automation and governance initiatives across a fast-paced enterprise environment. The candidate will collaborate with architects engineers and stakeholders throughout the system development lifecycle.

Key Responsibilities:

  • Act as an IAM Analyst and Technical SME during solution design assessment and application onboarding phases
  • Lead integration efforts across various business applications using Okta IAM platform
  • Design and implement SSO MFA and federated authentication solutions leveraging protocols like SAML OAuth2 OpenID Connect (OIDC) and JWT
  • Work closely with the BUILD team to implement and support Okta-based access management workflows
  • Configure API access management user provisioning directory synchronization and lifecycle policies
  • Develop and manage custom provisioning flows using SCIM JIT and Okta Workflows
  • Design RBAC solutions and enforce role/attribute-based access controls
  • Implement integrations with Active Directory LDAP and other enterprise systems
  • Create and maintain documentation for architecture configuration and governance processes
  • Support continuous integration/delivery (CI/CD) for IAM components
  • Ensure compliance with enterprise security standards and best practices

Required Skills & Experience:

  • 10 years of overall IT experience with at least 3 years in IAM/Okta implementations
  • Deep understanding of identity and access management principles including authentication authorization federation and lifecycle management
  • Proven experience with Okta Identity Cloud including SSO Universal Directory Lifecycle Management and API Access Management
  • Strong expertise in SAML 2.0 OAuth 2.0 OIDC and JWT
  • Familiarity with Okta IDM - object mapping custom connectors provisioning workflows
  • Hands-on experience with CI/CD tools and automation
  • Proficiency in scripting or programming (Java/JavaScript preferred)
  • Strong understanding of enterprise directories (AD LDAP) and integration methods
  • Experience implementing SCIM-based or custom user provisioning flows
  • Knowledge of SDLC methodologies documentation testing and release practices
  • Strong communication and stakeholder engagement skills

Preferred Certifications (Highly Desirable):

  • Okta Certified Administrator
  • Okta Certified Professional
  • Okta Certified Consultant

Soft Skills:

  • Self-driven with the ability to work independently in a dynamic fast-paced environment
  • Strong problem-solving and analytical thinking
  • Effective communication and interpersonal skills to interface with global teams and clients

Employment Type

Full-time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.