IAM Engineer (Okta) at Golabs
Quesada, Provincia de Alajuela, Costa Rica -
Full Time


Start Date

Immediate

Expiry Date

21 Aug, 25

Salary

0.0

Posted On

21 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Python, Communication Skills, Agile, Powershell, Version Control, Bash, Ldap, Jira

Industry

Information Technology/IT

Description

ABOUT THE JOB IAM ENGINEER (OKTA)

We are seeking a results-driven IAM Engineer to support a critical Okta buildout project, focused on enabling enterprise applications for Single Sign-On (SSO). The ideal candidate has experience with Okta, understands modern identity protocols, and is skilled in working across teams to deliver secure and seamless authentication experiences.

PROJECT SCOPE

  • Support the integration of 100 enterprise applications with Okta for SSO.
  • Ensure each application is configured correctly and securely for SSO and user provisioning.
  • Collaborate closely with application owners and IT teams to gather integration requirements.
  • Update and document all applications in Productiv, the organizations asset management tool.

REQUIRED QUALIFICATIONS

  • 3+ years of experience in IAM, with strong hands-on work using Okta Identity Cloud.
  • Proven experience with SSO, MFA, SCIM, and lifecycle management.
  • Solid understanding of identity protocols: SAML 2.0, OIDC, OAuth2, LDAP, and SCIM.
  • Ability to script or automate tasks using Python, Bash, or PowerShell.
  • Experience troubleshooting complex authentication and authorization flows.
  • Familiarity with Productiv or similar asset management platforms.
  • Strong documentation and communication skills.

PREFERRED QUALIFICATIONS

  • Certifications such as Okta Certified Consultant, Administrator, or Professional.
  • Exposure to ITSM tools (JIRA, Confluence), version control (Git), and CI/CD practices.
  • Experience working in Agile or ITIL-based environments
Responsibilities
  • Assess application compatibility with Okta and identify appropriate integration methods (SAML, OIDC, etc.).
  • Configure Okta for both SSO and automated user provisioning via lifecycle management tools like SCIM.
  • Troubleshoot and test integrations to ensure reliability, security, and compliance with internal policies.
  • Conduct knowledge transfer sessions to enable internal IT and application teams to manage ongoing support.
  • Maintain accurate records by updating integration details for all 100 applications in Productiv.
  • Partner with cross-functional teams to ensure secure, scalable, and efficient identity practices.
Loading...