Marius-Alexandru A Voinescu
Verified Expert in Engineering
IAM Engineer and Developer
Marius-Alexandru is an experienced IAM engineer, an Okta Certified Administrator, and a CNSS Certified Network Security Specialist with a strong background in law. He is highly skilled in designing and architecting the Okta product into business infrastructure, be it on-premises, cloud, or hybrid. Marius-Alexandru enjoys learning about cybersecurity and ethical hacking and how they can be applied in our day-to-day lives and work.
Portfolio
Experience
Availability
Preferred Environment
Okta, Identity & Access Management (IAM)
The most amazing...
...tool I've built is a full JML process with the help of Okta Workflows and public APIs for an app, that, inside of the Okta app store, only had SAML.
Work Experience
Identity & Access Management Systems Engineer
NTT Data
- Assisted with the migration of different company subsidiaries to Okta. Integrated their apps and day-to-day operations in the new tool, including building custom APIs and Okta Workflows to automate the JML process.
- Provided engineering support for complex projects that leverage NTT DATA Services IAM platforms and performed root causes analysis on system incidents.
- Ensured processing and responses to IAM requests to deliver premium security and Access Management services to the organization.
Identity & Access Management Specialist
Garrett-Advancing Motion
- Managed and enhanced the Active Directory, CyberArk, and other technologies that the company implemented.
- Tracked and delivered project streams of Active Directory, LDAP, Privilege Access Management, Identity Management security, and aligned with business priorities.
- Implemented a POC for different tools to improve the day-to-day operations of the IAM and Cybersecurity team. One of the POCs I worked on was Crowdstrike Falcon Identity Threat Detection.
Identity & Access Management Systems Engineer
NTT Data Services
- Assisted with the migration of different company subsidiaries to Okta. Integrated their apps and day-to-day operations in the new tool, including building custom APIs and Okta Workflows to automate the JML process.
- Provided engineering support for complex projects that leverage NTT DATA Services IAM platforms and performed root causes analysis on system incidents.
- Ensured processing and responses to IAM requests to deliver premium security and Access Management services to the organization.
Okta Tier 2 Technical Support Engineer
Computer Generated Solutions
- Supported implementation for cloud applications such as Office 365, ServiceNow, Cisco, G Suite, Salesforce, AWS, Zendesk, Box, DropBox, Concur, BlueJeans, Jive, Yammer, Slack/HipChat, and Workday.
- Assisted with Multifactor Authentication (MFA) support for a broad set of cloud applications and on-premises systems, such as SMS and Voice, Okta Verify Push, U2F, YubiKey, RSA SecureID, Google Authenticator, Symantec VIP, Apple TouchID, and Duo Security.
- Troubleshot RCA bugs for engineering with full end-to-end ownership.
Experience
Personal SIEM Instance
https://github.com/anubis619/siem_projectWhile other tools like SumoLogic, Splunk, and Sentinel are a few of the most used SIEM tools by companies, they tend to come with a high price for personal use.
Education
Bachelor's Degree in Law and Justice Administration
Transilvania University of Brașov - Brasov, Romania
Certifications
CompTIA Security+ Certification
CompTIA
Google Cybersecurity Certificate
Coursera
eLearning Junior Penetration Tester
iNE Security
ICSI | CNSS Certified Network Security Specialist
ICSI (International CyberSecurity Institute), UK
Okta Certified Administrator
Okta
Okta Certified Professional
Okta
Skills
Tools
Jira, Nessus, Metasploit, NMap, Chronicle, Splunk
Languages
SAML, Python 3, JavaScript, HTML, CSS
Frameworks
Windows PowerShell
Paradigms
Penetration Testing
Platforms
Wazuh, Linux, Azure
Industry Expertise
Cybersecurity, Network Security
Other
Okta, System Administration, Single Sign-on (SSO), Multiple Factor Analysis (MFA), Security, Identity & Access Management (IAM), Law, Civil Law, Active Directory Federation, CyberArk, LDAP, Ethical Hacking, Vulnerability Management, SIEM, Vulnerability Identification, Threat Analytics, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), NIST, Risk Assessment, Access Control, Cryptography, Cyber Forensics, Data Security, Disaster Recovery Plans (DRP), Malware Analysis, Threat Detection, Security Policies & Procedures
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring