IAM Engineer - Okta (ID:3510)
Stafide
Eindhoven, Netherlands
7 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
SeniorJob location
Eindhoven, Netherlands
Tech stack
API
Cloud Computing
Computer Security
Identity and Access Management
Python
Node.js
OAuth
OpenID
Powershell
Role-Based Access Control
Security Assertion Markup Language (SAML)
Security Information and Event Management
User Provisioning Software
Scripting (Bash/Python/Go/Ruby)
Enterprise Software Applications
Okta
Information Technology
Job description
- Implement authentication and authorization policies aligned with security and business requirements.
- Develop and maintain SSO integrations using SAML, OIDC, OAuth 2.0, and SCIM provisioning for cloud and on-prem applications.
- Build and manage Okta workflows, access rules, custom expressions, and authorization policies.
- Automate user provisioning, deprovisioning, and access changes across enterprise systems.
- Monitor authentication activity, logs, and alerts using Okta dashboards and SIEM tools.
- Investigate suspicious login behavior, MFA failures, and identity-related security incidents.
- Support incident response activities related to identity-based threats.
- Collaborate with technical teams to ensure seamless integration between Okta and enterprise applications.
- Apply Zero Trust identity principles, enforcing least privilege, MFA, and conditional access controls., * Hands-on involvement in application onboarding, automation, and identity governance initiatives.
Requirements
Bachelor's degree in Computer Science, * 8-10 years of overall experience in Identity & Access Management, Cyber Security, or Identity Engineering.
- Strong hands-on experience with Okta Identity Cloud in enterprise environments.
- Proven expertise in SSO, MFA, Universal Directory, and Identity Lifecycle Management.
- Experience onboarding applications and implementing SCIM-based provisioning and de-provisioning.
- Solid understanding of Zero Trust security models and access governance principles.
- Experience working with SIEM tools for identity monitoring and incident investigation.
- Bachelor's degree in Computer Science, Information Security, Engineering, or a related field.
You Should Possess the Ability To
- Translate complex access and security requirements into scalable Okta IAM configurations.
- Develop and maintain automation using Okta Workflows, APIs, or scripting (Python, PowerShell, or Node.js).
- Configure RBAC, group policies, entitlement management, and access governance controls.
- Troubleshoot authentication, authorization, and provisioning issues across applications.
- Work independently while collaborating effectively in cross-functional technical environments., * A professional and collaborative environment suited for specialists with 8-10 years of IAM and Okta experience.