Skip to content
View cjparker102's full-sized avatar
🔐
Building AI-powered IAM tools
🔐
Building AI-powered IAM tools

Block or report cjparker102

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
cjparker102/README.md
╔══════════════════════════════════════════════════════════════════╗
║          { CJPARKER102.DEV } // IDENTITY & ACCESS ENGINEER       ║
╚══════════════════════════════════════════════════════════════════╝

// IAM_ENGINEER · // SECURITY_SPECIALIST · // AI_BUILDER

$ whoami

Christopher Parker — McLean, VA (Washington DC Area) Identity & Access professional at ID.me — building AI-powered IAM tools 8+ years enterprise IT · 500+ users supported · TAMU MS Computer Science


$ cat status.txt
● CURRENTLY    → IT Support Analyst @ ID.me — federal identity verification platform
● LOCATION     → McLean, VA // Washington DC Area
● STUDYING     → MS Computer Science @ Texas A&M University (2025-2026)
● MISSION      → IAM Engineer — combining identity expertise with AI automation
● CONTACT      → iam@cjparker102.dev

$ cat ./idme.txt   // current role deep dive
[ ID.me — IT Support Analyst ]  Aug 2025 - Present · McLean, VA
// Federal identity verification platform serving VA, IRS, SSA and more

OKTA ADMINISTRATION
  » User lifecycle — activation, suspension, account recovery
  » Group membership management and access assignments
  » MFA troubleshooting — resetting and fixing authentication factors
  » Access reporting and escalation to IAM admin team

DEVICE & ENDPOINT MANAGEMENT
  » JAMF Pro — Mac fleet management for 500+ employees
  » Device enrollment, compliance enforcement, MDM policies
  » Remote software deployment and configuration
  » Asset tracking via Asset Panda

OPERATIONS
  » JIRA — ticket management and workflow tracking
  » VPN and remote access support
  » Endpoint security and compliance monitoring
  » IT documentation and runbook creation
  » Reduced ticket resolution time through process automation

$ ls ./certifications/
CREDENTIAL ISSUER STATUS
Okta_Certified_Professional Okta ✅ Dec 2025
CompTIA_Security+ CompTIA ✅ Active
CompTIA_Network+ CompTIA ✅ Active
CompTIA_A+ CompTIA ✅ Active
CompTIA_Secure_Infrastructure_Specialist CompTIA ✅ Active
EC-Council_Certified_Encryption_Specialist EC-Council ✅ Active
CIW_Web_Security_Specialist CIW ✅ Active
Lean_Six_Sigma_Black_Belt Educate 360 ✅ Feb 2025
LPI_Linux_Essentials LPI ✅ Active

$ ls ./education/
📚 Texas A&M University
   → Master of Computer Science (MCS)
   → 2025 - 2026 // IN PROGRESS

📚 Sam Houston State University
   → BS Cybersecurity
   → 2022 - 2024 // COMPLETED

📚 Houston Community College
   → AA Multidisciplinary Studies (Computer Science Focus)
   → 2021 - 2022 // COMPLETED

$ git log ./experience/ --oneline
[2025-present]  IT Support Analyst        @ ID.me           // McLean, VA
[2024]          IT Support Intern         @ U.S. SBA        // Washington, DC
[2018-2021]     Technical Support Eng.    @ Apple           // Austin, TX
[2018]          Deskside Support Tech.    @ IBM/Coupang     // Mountain View, CA
[2017-2018]     IT Support Specialist     @ SCL Health      // Denver, CO
[2017]          IT Advanced Repair Agent  @ Geek Squad      // Denver, CO
[2013-2017]     Problem Solver / ICQA     @ Amazon          // Breinigsville, PA

// ID.me — Okta admin · JAMF Pro 500+ users · built AI ops dashboard pending deployment // Apple — trained 30 engineers · improved compliance by 25% // IBM — Active Directory for 60,000+ users // SBA — automated FOIA processing, cutting time by 70% // SCL Health — 33 hospitals · 400+ tickets/month · 90% resolved without escalation


$ ls ./projects/
📁 it-command-dashboard/              [INTERNAL — ID.me]
   → AI-powered IT operations dashboard built for ID.me
   → JIRA · Confluence · OpsGenie · Claude API integrations
   → AI ticket creation, response generation, similar ticket search
   → Pending department-wide deployment
   → Stack: Python · Node.js · HTML/CSS/JS · Claude API

📁 okta-access-reviewer/              [ACTIVE]
   → AI-powered tool that analyzes Okta access patterns
   → Flags inactive users, over-provisioned accounts, anomalies
   → Stack: Python · Okta SDK · Claude API

📁 iam-offboarding-assistant/         [COMING SOON]
   → Intelligent offboarding automation
   → AI-generated deprovisioning checklists
   → Stack: Python · Okta · AWS IAM

📁 okta-policy-explainer/             [COMING SOON]
   → Paste any Okta policy → AI explains it in plain English
   → Built for audits, compliance, and onboarding
   → Stack: Python · Claude API

📁 dotfiles/
   → My Mac developer environment setup
   → Homebrew · Zsh · Oh My Zsh · IAM dev tools

$ cat ./currently_learning.txt
learning = [
    "Terraform for IAM infrastructure as code",
    "Python automation with Okta SDK",
    "AWS IAM roles, policies, and SCP",
    "AI integration with identity workflows",
    "Zero Trust architecture patterns",
    "MS Computer Science @ Texas A&M (active)"
]

$ cat ./languages.txt
● English                → Native or bilingual proficiency
● American Sign Language → Native or bilingual proficiency

$ cat ./connect.txt

Email LinkedIn GitHub Website

// 8+ years IT · ID.me · Apple · IBM · U.S. SBA · 9 certifications
// Okta admin · JAMF Pro · building AI-powered IAM tools
// Washington DC security corridor · Let's build something secure. 🔐

Popular repositories Loading

  1. dotfiles dotfiles Public

    Ruby

  2. okta-access-reviewer okta-access-reviewer Public

    AI-powered IAM access reviewer — connects to Okta, pulls user and access data, sends it to Claude for security analysis, and generates a risk report. Pairs with okta-chaos-generator.

    Python

  3. cjparker102 cjparker102 Public

  4. okta-chaos-generator okta-chaos-generator Public

    Okta chaos generator — creates 100–200 randomized users with hidden IAM security issues for CTF-style access review practice. Pairs with okta-access-reviewer.

    Python

  5. cjparker102-dev cjparker102-dev Public

    Personal portfolio site — cjparker102.dev

    TypeScript

  6. okta-as-code okta-as-code Public

    Terraform-managed Okta infrastructure — groups, apps, policies, and admin roles defined as code. The prevention layer of a complete IAM lifecycle.

    HCL