╔══════════════════════════════════════════════════════════════════╗
║ { CJPARKER102.DEV } // IDENTITY & ACCESS ENGINEER ║
╚══════════════════════════════════════════════════════════════════╝
$ whoami
Christopher Parker — McLean, VA (Washington DC Area) Identity & Access professional at ID.me — building AI-powered IAM tools 8+ years enterprise IT · 500+ users supported · TAMU MS Computer Science
$ cat status.txt
● CURRENTLY → IT Support Analyst @ ID.me — federal identity verification platform
● LOCATION → McLean, VA // Washington DC Area
● STUDYING → MS Computer Science @ Texas A&M University (2025-2026)
● MISSION → IAM Engineer — combining identity expertise with AI automation
● CONTACT → iam@cjparker102.dev$ cat ./idme.txt // current role deep dive[ ID.me — IT Support Analyst ] Aug 2025 - Present · McLean, VA
// Federal identity verification platform serving VA, IRS, SSA and more
OKTA ADMINISTRATION
» User lifecycle — activation, suspension, account recovery
» Group membership management and access assignments
» MFA troubleshooting — resetting and fixing authentication factors
» Access reporting and escalation to IAM admin team
DEVICE & ENDPOINT MANAGEMENT
» JAMF Pro — Mac fleet management for 500+ employees
» Device enrollment, compliance enforcement, MDM policies
» Remote software deployment and configuration
» Asset tracking via Asset Panda
OPERATIONS
» JIRA — ticket management and workflow tracking
» VPN and remote access support
» Endpoint security and compliance monitoring
» IT documentation and runbook creation
» Reduced ticket resolution time through process automation
$ ls ./certifications/| CREDENTIAL | ISSUER | STATUS |
|---|---|---|
Okta_Certified_Professional |
Okta | ✅ Dec 2025 |
CompTIA_Security+ |
CompTIA | ✅ Active |
CompTIA_Network+ |
CompTIA | ✅ Active |
CompTIA_A+ |
CompTIA | ✅ Active |
CompTIA_Secure_Infrastructure_Specialist |
CompTIA | ✅ Active |
EC-Council_Certified_Encryption_Specialist |
EC-Council | ✅ Active |
CIW_Web_Security_Specialist |
CIW | ✅ Active |
Lean_Six_Sigma_Black_Belt |
Educate 360 | ✅ Feb 2025 |
LPI_Linux_Essentials |
LPI | ✅ Active |
$ ls ./education/📚 Texas A&M University
→ Master of Computer Science (MCS)
→ 2025 - 2026 // IN PROGRESS
📚 Sam Houston State University
→ BS Cybersecurity
→ 2022 - 2024 // COMPLETED
📚 Houston Community College
→ AA Multidisciplinary Studies (Computer Science Focus)
→ 2021 - 2022 // COMPLETED
$ git log ./experience/ --oneline[2025-present] IT Support Analyst @ ID.me // McLean, VA
[2024] IT Support Intern @ U.S. SBA // Washington, DC
[2018-2021] Technical Support Eng. @ Apple // Austin, TX
[2018] Deskside Support Tech. @ IBM/Coupang // Mountain View, CA
[2017-2018] IT Support Specialist @ SCL Health // Denver, CO
[2017] IT Advanced Repair Agent @ Geek Squad // Denver, CO
[2013-2017] Problem Solver / ICQA @ Amazon // Breinigsville, PA
// ID.me — Okta admin · JAMF Pro 500+ users · built AI ops dashboard pending deployment// Apple — trained 30 engineers · improved compliance by 25%// IBM — Active Directory for 60,000+ users// SBA — automated FOIA processing, cutting time by 70%// SCL Health — 33 hospitals · 400+ tickets/month · 90% resolved without escalation
$ ls ./projects/📁 it-command-dashboard/ [INTERNAL — ID.me]
→ AI-powered IT operations dashboard built for ID.me
→ JIRA · Confluence · OpsGenie · Claude API integrations
→ AI ticket creation, response generation, similar ticket search
→ Pending department-wide deployment
→ Stack: Python · Node.js · HTML/CSS/JS · Claude API
📁 okta-access-reviewer/ [ACTIVE]
→ AI-powered tool that analyzes Okta access patterns
→ Flags inactive users, over-provisioned accounts, anomalies
→ Stack: Python · Okta SDK · Claude API
📁 iam-offboarding-assistant/ [COMING SOON]
→ Intelligent offboarding automation
→ AI-generated deprovisioning checklists
→ Stack: Python · Okta · AWS IAM
📁 okta-policy-explainer/ [COMING SOON]
→ Paste any Okta policy → AI explains it in plain English
→ Built for audits, compliance, and onboarding
→ Stack: Python · Claude API
📁 dotfiles/
→ My Mac developer environment setup
→ Homebrew · Zsh · Oh My Zsh · IAM dev tools
$ cat ./currently_learning.txtlearning = [
"Terraform for IAM infrastructure as code",
"Python automation with Okta SDK",
"AWS IAM roles, policies, and SCP",
"AI integration with identity workflows",
"Zero Trust architecture patterns",
"MS Computer Science @ Texas A&M (active)"
]$ cat ./languages.txt
● English → Native or bilingual proficiency
● American Sign Language → Native or bilingual proficiency$ cat ./connect.txt