We are looking for an Okta / Entra ID Senior Consultant local to the National Capital Region, who can engage our client to discover, evaluate, and determine system and business interdependencies that contribute to Identity, Credential, and Access Management (ICAM) and Zero Trust Architecture (ZTA) mission adoption. The ideal candidate will have a strong understanding of ICAM and ZTA business and system applications with the ability to assess their effectiveness and value to the organization in addition to technical expertise with products like Okta and Entra ID. In this role, the candidate will play a key role in identifying, documenting and implementing business and system requirements contributing to business and system adoption. Candidates will perform both business analyst and engineering activities. Requirements include the ability to obtain and maintain a SECRET Federal or DoD security clearance, a Bachelor's degree, three or more years of relevant IT/Cyber Security experience, direct experience with Okta and/or Entra ID identity management tools for implementing functionality, provisioning, and interface requirements. The candidate will perform a variety of ICAM engineering support assignments for project development, configuration, data analysis, and contractual reporting requirements. Collaboration with stakeholders and facilitation of discussions and workshops to gather requirements, input, and feedback is expected. Knowledge and success supporting federal client engagements relating to the creation of business processes and implementing identity management solutions is required. The candidate should demonstrate extensive abilities with creative thinking, problem-solving skills, individual initiative, reporting project status, and utilizing MS Office (Word, Excel, Access, PowerPoint). Experience with ongoing activities in support of critical Federal mandates such as Continuous Diagnostics and Monitoring (CDM), Executive Orders related to cybersecurity, and guidance from OMB and NIST is needed. Knowledge of emerging trends and technologies in Identity Management is also important. Nice to have qualifications include an active and maintained SECRET Federal or DoD security clearance, advanced familiarity with ICAM concepts such as Identity Governance, PKI, Single Sign On, Federation, Enterprise Directory Architecture, Provisioning, Role-Based Access Control, Access Request and Certification, and advanced experience with API Gateways, identity federation protocols (SAML), LDAP, and programming languages (e.g., C, Java, SQL, Python, etc.).
By applying, you consent to your information being transmitted by Jooble to the Employer, as data controller, through the Employer’s data processor SonicJobs.
See Guidehouse Privacy Policy at and SonicJobs Privacy Policy at and Terms of Use at
...Impact at Lowe's As a Customer Service Associate, you combine top-... ...and help them solve their home improvement challenges. How... ...time listening to customers, answering questions, and organizing merchandise... ...of the following departments, based on hiring needs and skillsets:...
...candidacy or please call . Thrive Skilled Pediatric Care, one of the leading providers of skilled pediatric home care, isseeking a Nursefor asweetboyin RUSK, TX. XY Day shift 6a-6p & Wed-Fri + E/O Sat nights 6p-6a available in Troup!!! Thrive SPC offers: ...
Job Summary: Sysco has immediate job openings for dependable local CDL A Delivery Truck Driver to safely and efficiently operate a tractor-trailer and manually unload/deliver various products (meats, produce, frozen foods, groceries, dry goods, supplies, etc.) to customer...
...Job Summary: The Executive Pastry Chef leads the commissary bakery operation, overseeing all aspects of pastry and baked goods production for wholesale, retail, and/or hospitality outlets. This role ensures the highest standards of quality, consistency, and efficiency...
...Role : Hashicorp Vault Engineer Location: Remote Hashicorp L3 Activities: # Architecture design and review # Performance tuning and optimization # Incident management and critical escalation # Code and configuration audit # Security compliance...