Description

  • Strong understanding of Single Sign-On (SSO) solutions, particularly Okta, and experience with Google Workspace.
  • Experience with Amazon Web Services (AWS) or other cloud platforms.
  • Proficiency with collaboration tools such as Slack and Microsoft Office Suite.
  • Knowledge of Endpoint Detection and Response (EDR) solutions and Mobile Device Management (MDM) systems.
  • Familiarity with Microsoft Entra, including Azure Active Directory, Conditional Access, and its various components.
  • Excellent troubleshooting skills with the ability to work in fast-paced environments.
  • Strong communication skills and teamwork abilities.

Key Responsibilities:

  • Implement and maintain SSO solutions (Okta, Google Workspace, etc.) for seamless access across multiple platforms.
  • Monitor and optimize Microsoft Office 365 and other SaaS applications for performance and security.
  • Configure and manage EDR and MDM systems to secure endpoints and mobile devices.
  • Manage and optimize Microsoft Entra configurations to ensure secure access controls.
  • Provide technical support, respond to user requests, troubleshoot issues, and escalate when necessary.
  • Stay informed on the latest IT trends and implement best practices.

Day-to-Day Responsibilities:

Okta SSO and SCIM Configuration:

  • Configure and maintain Okta SSO integration with applications like Office 365, AWS, and Google Workspace.
  • Implement SCIM (System for Cross-domain Identity Management) for efficient user provisioning and de-provisioning.
  • Ensure a smooth login experience for employees and partners.

RBAC Rule Maintenance:

  • Define and maintain Role-Based Access Control (RBAC) policies in Okta.
  • Update RBAC rules based on new hires or role changes.
  • Monitor RBAC logs for potential security issues and adjust policies as needed.

Endpoint Protection:

  • Configure and manage Mobile Device Management (MDM) solutions (Entra, Mosyle, etc.) to enforce security compliance.
  • Set up and manage EDR tools (e.g., SentinelOne) for detecting and responding to endpoint security threats.
  • Analyze and monitor EDR logs to identify and mitigate security risks

Education

Any Gradute