WW-IN-Security-ID354-PKI Engineer-JL10
IDP01 - DGS-Campus Ph1, India
DXC Technology
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.Job Description:
This role will participate heavily in ongoing IAM (Okta) program enhancements, monitor and analyze events to proactively address operational issues and thwart threats to the customer environment. You will be responsible for the following: • Define and document business and technical requirements for Identity and Access Management systems (Okta), including requirements for establishing role, entitlements, and access definitions, defining the provisioning lifecycle processes, user account lifecycle processes, reconciliation, certification, provisioning, and de-provisioning processes. • Participate in IAM (Okta) projects and initiatives. • Work with customer team members, business partners/analysts, and application teams to understand access requirements. • Create reports to identify provisioning inconsistencies or conflicts and operationalize processes to regularly identify and remediate issues. • Automate or streamline existing processes and workflows. • Define, validate, and maintain user access roles. • Analyze user access roles and processes to independently assess compliance with defined standards. • Support user access re-certifications, as defined by customer policies. • Regularly review and maintain documentation to ensure it reflects current processes and procedures and identify opportunities for process improvement. • Participate in IAM/Okta audits and review access control reports to identify potential risks. • Maintain up-to-date knowledge of identity and access management best practices. Required Technical and Professional Expertise • Minimum 3+ years of experience working within an IAM (Okta) capacity, • Bachelor's degree in computer science, information technology, or a related field or equivalent experience • Strong analytical skills • Good organizational skills and attention to detail • Manage and support Okta IAM solutions, including configuration, integration, and troubleshooting. • Handle user provisioning, deprovisioning, and access requests across Okta platforms. • Assist with authentication and authorization troubleshooting, including SSO, MFA, and directory integrations. • Monitor Okta systems for issues, resolve L2 escalations, and ensure adherence to security policies. • Collaborate with internal teams for Okta-related incident response, root cause analysis, and remediation. • Support Okta workflows, policies, and lifecycle management to optimize identity governance. • Maintain and enhance integrations between Okta, Active Directory (AD), Azure AD, and third-party applications. • Work on RBAC (Role-Based Access Control), ABAC (Attribute-Based Access Control), and least privilege enforcement. Preferred Technical Skills • Hands-on experience with Okta, including configuration, troubleshooting, and integration with enterprise applications. • Strong knowledge of IAM principles, authentication protocols (SAML, OAuth), and MFA solutions. • Familiarity with Active Directory (AD), Azure AD, LDAP, and directory services. • Experience handling IAM incident management, troubleshooting, and root cause analysis. • Knowledge of cloud identity management (AWS IAM, Azure IAM) is a plus. • Understanding of RBAC, ABAC, and privileged access management (PAM) solutions. • Strong analytical, problem-solving, and communication skills
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Audits AWS Azure Cloud Compliance Computer Science Governance IAM Incident response LDAP Okta PKI SAML SSO
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.