Posted today
Public Trust
Unspecified
IT - Security
Role: Okta Support Specialist
Location: Washington, DC (only needs to go onsite 2 times per month but they need someone within commuting distance)
Duration: Contract (3-4 months with possibility of going full time)
Clearance: USC, Must be able to obtain a Public Trust
Top Skills
Okta support
Bachelors’ Degree in IT or something technical
Okta configurations experience
If there main responsibility in the past few roles is not using Okta, they will not work for this role
We are seeking a highly skilled, collaborative technical analyst with strong-hands on experience in Okta to support identity and access management (IAM) operations. This role will handle escalation of support issues, working closely with Tier 1 Service desks and partners with Okta engineers and security teams to ensure secure and reliable access for users. Some key responsibilities include, but are not limited to:
Provide Tier 2 Support for Okta-related issues, including SSO, MFA, identity lifecycle, and access provisioning.
Troubleshoot and resolve escalated IAM incidents and service requests.
Manage Okta configurations (applications, policies, groups, users).
Support integrations with SaaS and on-prem applications.
Analyze logs, identify root causes, and implement preventive fixes.
Collaborate with Tier 1, IT, Security, and Engineering teams.
What You Will Need:
Bachelor's degree in IT, Information Systems, or Computer Science or related field.
Minimum of FIVE (5) years engineering and deploying IT systems.
Experience using Okta as an enterprise identity provider solution.
Knowledge of Okta including features, integrations, and architecture.
Understanding of authentication protocols, such as SAML 2.0, OAuth2, OIDC.
Experience configuring user authentication policies and application connections in Okta.
Experience configuring and managing Multi-Factor Authentication (MFA) factors for Okta users, including Okta Verify, FIDO tokens, One-Time Passcodes, and Yubikey tokens.
Experience troubleshooting Okta user authentication and application issues.
Broad knowledge of cybersecurity threats and mitigating IT solutions.
Broad knowledge of IAM platforms and the full identity lifecycle.
Experience developing cybersecurity policies.
Experience with online research techniques.
Excellent communication and documentation abilities.
US Citizenship.
Must be able to OBTAIN and MAINTAIN a Federal or DoD "PUBLIC TRUST"; candidates must obtain approved adjudication of their PUBLIC TRUST prior to onboarding with Candidates with an ACTIVE PUBLIC TRUST or SUITABILITY are preferred
What Would Be Nice To Have:
Okta Certified Professional, Administrator, Consultant, Developer, and/or Architect certifications.
Strong scripting and automation skills (e.g., PowerShell, Python, Okta APIs).
Experience following established software development standards and procedures and contribute towards their improvement.
Familiarity with SDLC process, including designing and developing applications.
Broad knowledge of information system technologies with willingness to learn new technologies.
Experience with cloud provider services (AWS or Azure) and understanding of DevSecOps tools and processes.
Strong understanding of IAM principles and how to implement them in an enterprise solution.
Active security clearance Secret and above.
Thanks and Regards
Murali Sharma
202.828.3494
Murali@Nastechglobal.com
Location: Washington, DC (only needs to go onsite 2 times per month but they need someone within commuting distance)
Duration: Contract (3-4 months with possibility of going full time)
Clearance: USC, Must be able to obtain a Public Trust
Top Skills
Okta support
Bachelors’ Degree in IT or something technical
Okta configurations experience
If there main responsibility in the past few roles is not using Okta, they will not work for this role
We are seeking a highly skilled, collaborative technical analyst with strong-hands on experience in Okta to support identity and access management (IAM) operations. This role will handle escalation of support issues, working closely with Tier 1 Service desks and partners with Okta engineers and security teams to ensure secure and reliable access for users. Some key responsibilities include, but are not limited to:
Provide Tier 2 Support for Okta-related issues, including SSO, MFA, identity lifecycle, and access provisioning.
Troubleshoot and resolve escalated IAM incidents and service requests.
Manage Okta configurations (applications, policies, groups, users).
Support integrations with SaaS and on-prem applications.
Analyze logs, identify root causes, and implement preventive fixes.
Collaborate with Tier 1, IT, Security, and Engineering teams.
What You Will Need:
Bachelor's degree in IT, Information Systems, or Computer Science or related field.
Minimum of FIVE (5) years engineering and deploying IT systems.
Experience using Okta as an enterprise identity provider solution.
Knowledge of Okta including features, integrations, and architecture.
Understanding of authentication protocols, such as SAML 2.0, OAuth2, OIDC.
Experience configuring user authentication policies and application connections in Okta.
Experience configuring and managing Multi-Factor Authentication (MFA) factors for Okta users, including Okta Verify, FIDO tokens, One-Time Passcodes, and Yubikey tokens.
Experience troubleshooting Okta user authentication and application issues.
Broad knowledge of cybersecurity threats and mitigating IT solutions.
Broad knowledge of IAM platforms and the full identity lifecycle.
Experience developing cybersecurity policies.
Experience with online research techniques.
Excellent communication and documentation abilities.
US Citizenship.
Must be able to OBTAIN and MAINTAIN a Federal or DoD "PUBLIC TRUST"; candidates must obtain approved adjudication of their PUBLIC TRUST prior to onboarding with Candidates with an ACTIVE PUBLIC TRUST or SUITABILITY are preferred
What Would Be Nice To Have:
Okta Certified Professional, Administrator, Consultant, Developer, and/or Architect certifications.
Strong scripting and automation skills (e.g., PowerShell, Python, Okta APIs).
Experience following established software development standards and procedures and contribute towards their improvement.
Familiarity with SDLC process, including designing and developing applications.
Broad knowledge of information system technologies with willingness to learn new technologies.
Experience with cloud provider services (AWS or Azure) and understanding of DevSecOps tools and processes.
Strong understanding of IAM principles and how to implement them in an enterprise solution.
Active security clearance Secret and above.
Thanks and Regards
Murali Sharma
202.828.3494
Murali@Nastechglobal.com
group id: 91142412