*Hi Friend,*

*Greetings for the day!!!*

*This is Vijay from RPO Services; I am working on below requirement. Please
help me with updated resume ASAP………….*

*Reply to [email protected] <[email protected]>*


*Job Title:* Senior Security Engineer with Open IDM and OPEN AM Expertise

*Duration:*6 months

*Location:* Minneapolis, MN



*Qualifications:*

Job Description:
- Stand up OpenAM and OpenIDM environments
- Configure OpenAM as an identity provider (External Federation)
- Work with Directory Services team to configure connections to data
repositories and directories
- Working with network and infrastructure engineers to complete build out
of Production environments
- Define and configure policies
- Define methodology for common claims tokens
- Build recommendations/patterns around the optimal OpenAM application
integration mechanism for given scenarios:
- Example: Policy Agent, Fedlet, direct integration, etc.
- Needs to take into account Java, .NET, and WebSphere



- Configure new application integrations to OpenAM and OpenIDM:
- Create "circle of trust", Configure protocols, define claim sets, manage
certificates, etc for OpenIDM.
- Configure "out of the box" MFA for OpenIDM.
- Configure Single Sign On relationships

- Implement business defined access workflows in OpenIDM (Activiti)
- Support custom development for User interfaces to the Identity tools
- Work with developers to implement a MGI branded web login page for OpenAM
- Work with developers to implement MGI branded pages for flows for OpenIDM
- Work with developers to implement updates and changes to MGI branded
pages for custom Self-Service pages for OpenOTP
- Support Application integration
- Review the OpenAM proof of technology outcomes.
- Assist in the creation of recommendations/patterns around the optimal
OpenAM application integration mechanism for identified integration
scenarios.
- Assist with the technical design of agent-facing web sites, web services
integrations, and native client applications which are needed to support
OpenAM.  These applications could be written in  .Net, Java, and possibly
WebSphere
- Support LDAP and other schema changes to OpenIDM that are needed as new
applications/use cases integrate.
- Operationalize systems
- Work with technical writers to document the systems and produce user
guides
- Complete set-up of current OpenOTP environments to support expanded
roll-out of MFA hard token functionality
- Review the policies that define how user accounts are created & managed.
Document changes to reflect discussions and decisions.
- Work with IT Security to establish and document password policies,
strength, reuse, retry attempts.
- Review, validate and document common user roles.
- Provide support guidance to first and second tier support organizations,
as well as Operational Infrastructure teams for how to handle basic support
items
- Administration and support of production systems
- Consult on upgrade of current OpenOTP environments and contribute as
needed
- Maintain the service health and answer third-level support issues.
- Red Hat Linux admin knowledge required for installation and upgrades.
- Operational Transition Activities
- Create and support the transition plan for MoneyGram Security and Access
teams to take over ownership of the identity framework.

-- 

Thanks & Regards!
Vijay,Sr IT Recruiter,
Direct Number: 214-884-6231,Email:[email protected],


RPO Services

Visit us on www.rposervices.com.

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source J2EE frameworks" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to 
[email protected].
Visit this group at http://groups.google.com/group/open-source-j2ee-frameworks.
For more options, visit https://groups.google.com/d/optout.

Reply via email to