[Remote] AI Identity Architect

Other Jobs To Apply

Note: The job is a remote job and is open to candidates in USA. Okta is a company focused on securing identities across AI and human interactions. They are seeking an AI Identity Architect to lead the enterprise identity strategy for autonomous AI agents, ensuring secure integration and risk management in identity systems.


Responsibilities

  • Drive the Roadmap: Act as a primary stakeholder for Okta’s product teams. Translate your real-world experience securing agents into prioritized feature requests and product requirements
  • Target State: Define a multi-year roadmap for Non-Human Identities (NHIs) and AI Agents aligned with Zero Trust (NIST 800-207) and Okta’s Secure Identity Commitment
  • Posture First: Use ISPM (Identity Security Posture Management) to discover unmanaged AI agents and eliminate "Identity Debt" across the enterprise
  • Agent-to-App Connectivity: Architect secure Cross-App Access patterns where agents act as intermediaries between enterprise systems
  • Delegated Authority: Refine how user identity is "brokered" to an agent (e.g. OAuth2 Token Exchange), ensuring the agent never has more power than the human user who triggered it
  • Session Scoping: Implement context-bound, short-lived tokens to prevent lateral movement by a compromised agent
  • Okta Identity Engine & Auth0: Define how AI agents prove their identity within AuthN/AuthZ core concepts, implementing rigorous protocols for secure access delegation like OAuth2/OIDC, mTLS, and SPIFFE/SPIRE for workload attestation
  • Okta Privilege Access: Implement JIT/JEA access and ephemeral, vaulted secrets for agent tool-use
  • Okta Identity Governance & Workflows: Automate the Joiner-Mover-Leaver (JML) lifecycle for agents, including automated certification and revocation
  • Fine-Grained Authorization: Implement ReBAC for intent-bound decisions (e.g., "Can this agent access the Finance API on behalf of the CFO?")
  • Serve as "Customer Zero" by architecting and stress-testing internal AI security frameworks, translating real-world deployment lessons into a continuous stream of public-facing white papers, blogs, and technical guides to steer industry best practices
  • Orchestration: Secure identity patterns such as LangChain, LangGraph, AutoGPT, CrewAI, LlamaIndex, and Semantic Kernel
  • Architect secure connectivity to AI model providers such as Azure OpenAI, AWS Bedrock, Google Vertex AI, OpenAI API, and Anthropic

Skills

  • Proven track record of securing AI agents and non-human identities in a production environment
  • 7+ years in IAM/Security Architecture; proven strategy work across workforce, customer, and Non-Human Identities (NHIs)
  • Deep knowledge of the core protocols OAuth2/OIDC (especially Token Exchange), SAML, mTLS, JWT, and Model Context Protocol (MCP)
  • Hands-on experience with Modern Identity framework SPIFFE/SPIRE
  • Ability to author Architecture Decision Records (ADR) and influence at the VP/CTO level, while simultaneously acting as a peer to Product Management
  • Prior work shaping identity strategy for autonomous/agent systems, multi-agent delegation, or brokered access patterns
  • Exposure to policy-as-code (OPA/Cedar) and service-mesh identity
  • Certifications such as CISSP-ISSAP, CCSP, or TOGAF are welcome but not required or expected

Benefits

  • Equity (where applicable)
  • Bonus
  • Health, dental and vision insurance
  • 401(k)
  • Flexible spending account
  • Paid leave (including PTO and parental leave)

Company Overview

  • Okta is a management platform that secures critical resources from cloud to ground for workforce and customers. It was founded in 2009, and is headquartered in San Francisco, California, USA, with a workforce of 5001-10000 employees. Its website is http://www.okta.com.

  • Company H1B Sponsorship

  • Okta has a track record of offering H1B sponsorships, with 17 in 2026, 117 in 2025, 133 in 2024, 108 in 2023, 201 in 2022, 142 in 2021, 120 in 2020. Please note that this does not guarantee sponsorship for this specific role.

  • Back to blog