*Hello* *Partners ,*

*Please send matching profiles to **anil....@metaoption.com*
<anil....@metaoption.com>* or reach me (201)-984-3154.*


*Position: Oracle Identity Management Tech Lead*

*Location: NY *

*Duration: 6+ Months*

*Interview: Phone and F2F*

*EAD-GC or US Citizen Only.*

*Job Description:*

Purpose of role/opening: Migrate existing apps to centralized security
platform, assist application development teams with integration, and
perform on boarding tasks. The consultant will join a premier team
delivering identity & access solutions to business units that host internal
and external web sites used by employees and corporate customers.

Essential Accountability

   1. Provide Application architecture & Integration strategy for
   authentication, single-sign-on, and entitlement requirements for existing
   and new applications using Oracle Identity Management (OIM) Platform.
   2. Provide common Data Model that can accommodate complex business
   requirements across multiple applications and implement it in OIM.
   3. Provide hands-on administration of OIM platforms & hands-on
   programming/integration for schema/UI customization & API integration.

Additional Required accountabilities:
Work closely with Corporate IDM team to conform with corporate standard &
leverage best practices.
Work closely with stakeholders of multiple project teams, and document
requirement, proposed architecture, and data model.


KNOWLEDGE, EDUCATION & EXPERIENCE:
Extensive Knowledge of Oracle Identity Management (OIM) suite with special
emphasis on Oracle Access Manager (OAM) and Oracle Entitlement Server (OES)
Extensive knowledge of OIM Administration, APIs, and data synchronization
Hands on programming in J2EE, Web Services (SOAP, REST) required for OIM
integration and customization.

Experience:

   - 5 years: Hands-on installation of & integration with Oracle Manager
   (OAM) product, 10g and (ideally) 11g version
   - 5 years: Unix knowledge including shell scripting and logfile
   analysis.
   - 3 years: Developing / maintaining an Identity & Access Management
   platform.
   - 2 years: Installing and configuring a web server such as Apache, and a
   directory server such as Sun LDAP.
   - Java/J2EE and/or .NET development in an enterprise development role.
   - Hands-on familiarity with WebLogic application server.
   - Prior knowledge of other products in the Oracle suite: Oracle Identity
   Federation, Oracle Entitlements Server, Oracle Identity Manager, Oracle
   Unified Directory.


COMPLEXITY:.

   - There are a dozen external-facing applications that our client's
   customers use to access their data. Each application has its own custom
   authentication & authorization mechanism, and user data is stored in
   multiple databases. Customer's subscription information and periodic
   updates are provided as a file feed. We need to provide a common
   authentication mechanism with single-sign-on across multiple applications,
   and entitlement mechanism that can be provided via APIs to regulate
   customers' access to their subscription.

There are a dozen internal-facing applications that our client's editorial
team uses to create content and data. We need to create a common
authentication and provisioning mechanism for managing editor's login and
profiles, and role-based entitlement mechanism to regulate editorial
activities and content access based on their role & department they belong.

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-basis+unsubscr...@googlegroups.com.
To post to this group, send email to sap-basis@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to