*Hello* *Partners ,* *Please send matching profiles to **anil....@metaoption.com* <anil....@metaoption.com>* or reach me (201)-984-3154.*
*Position: Oracle Identity Management Tech Lead* *Location: NY * *Duration: 6+ Months* *Interview: Phone and F2F* *EAD-GC or US Citizen Only.* *Job Description:* Purpose of role/opening: Migrate existing apps to centralized security platform, assist application development teams with integration, and perform on boarding tasks. The consultant will join a premier team delivering identity & access solutions to business units that host internal and external web sites used by employees and corporate customers. Essential Accountability 1. Provide Application architecture & Integration strategy for authentication, single-sign-on, and entitlement requirements for existing and new applications using Oracle Identity Management (OIM) Platform. 2. Provide common Data Model that can accommodate complex business requirements across multiple applications and implement it in OIM. 3. Provide hands-on administration of OIM platforms & hands-on programming/integration for schema/UI customization & API integration. Additional Required accountabilities: Work closely with Corporate IDM team to conform with corporate standard & leverage best practices. Work closely with stakeholders of multiple project teams, and document requirement, proposed architecture, and data model. KNOWLEDGE, EDUCATION & EXPERIENCE: Extensive Knowledge of Oracle Identity Management (OIM) suite with special emphasis on Oracle Access Manager (OAM) and Oracle Entitlement Server (OES) Extensive knowledge of OIM Administration, APIs, and data synchronization Hands on programming in J2EE, Web Services (SOAP, REST) required for OIM integration and customization. Experience: - 5 years: Hands-on installation of & integration with Oracle Manager (OAM) product, 10g and (ideally) 11g version - 5 years: Unix knowledge including shell scripting and logfile analysis. - 3 years: Developing / maintaining an Identity & Access Management platform. - 2 years: Installing and configuring a web server such as Apache, and a directory server such as Sun LDAP. - Java/J2EE and/or .NET development in an enterprise development role. - Hands-on familiarity with WebLogic application server. - Prior knowledge of other products in the Oracle suite: Oracle Identity Federation, Oracle Entitlements Server, Oracle Identity Manager, Oracle Unified Directory. COMPLEXITY:. - There are a dozen external-facing applications that our client's customers use to access their data. Each application has its own custom authentication & authorization mechanism, and user data is stored in multiple databases. Customer's subscription information and periodic updates are provided as a file feed. We need to provide a common authentication mechanism with single-sign-on across multiple applications, and entitlement mechanism that can be provided via APIs to regulate customers' access to their subscription. There are a dozen internal-facing applications that our client's editorial team uses to create content and data. We need to create a common authentication and provisioning mechanism for managing editor's login and profiles, and role-based entitlement mechanism to regulate editorial activities and content access based on their role & department they belong. -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-basis+unsubscr...@googlegroups.com. To post to this group, send email to sap-basis@googlegroups.com. Visit this group at http://groups.google.com/group/sap-basis. For more options, visit https://groups.google.com/d/optout.