*Job Title: Senior Security Engineer with Open IDM and OPEN AM Expertise*

*Start Date: 5/18/2015*

*End Date: 11/30/2015*

*Location:Minneapolis, MN, US*




*H1B COPY MUST FOR SUBMISSION*



*Job Description:*



*- Stand up OpenAM and OpenIDM environments*

*- Configure OpenAM as an identity provider (External Federation)*

*- Work with Directory Services team to configure connections to data
repositories and directories*

*- Working with network and infrastructure engineers to complete build out
of Production environments*

*- Define and configure policies*

*- Define methodology for common claims tokens*

*- Build recommendations/patterns around the optimal OpenAM application
integration mechanism for given scenarios:*

*- Example: Policy Agent, Fedlet, direct integration, etc.*

*- Needs to take into account Java, .NET, and WebSphere*



*- Configure new application integrations to OpenAM and OpenIDM:*

*- Create “circle of trust”, Configure protocols, define claim sets, manage
certificates, etc for OpenIDM.*

*- Configure “out of the box” MFA for OpenIDM.*

*- Configure Single Sign On relationships*



*- Implement business defined access workflows in OpenIDM (Activiti)*

*- Support custom development for User interfaces to the Identity tools*

*- Work with developers to implement a MGI branded web login page for
OpenAM*

*- Work with developers to implement MGI branded pages for flows for
OpenIDM*

*- Work with developers to implement updates and changes to MGI branded
pages for custom Self-Service pages for OpenOTP*

*- Support Application integration*

*- Review the OpenAM proof of technology outcomes.*

*- Assist in the creation of recommendations/patterns around the optimal
OpenAM application integration mechanism for identified integration
scenarios.*

*- Assist with the technical design of agent-facing web sites, web services
integrations, and native client applications which are needed to support
OpenAM.  These applications could be written in  .Net, Java, and possibly
WebSphere*

*- Support LDAP and other schema changes to OpenIDM that are needed as new
applications/use cases integrate.*

*- Operationalize systems*

*- Work with technical writers to document the systems and produce user
guides*

*- Complete set-up of current OpenOTP environments to support expanded
roll-out of MFA hard token functionality*

*- Review the policies that define how user accounts are created & managed.
Document changes to reflect discussions and decisions.*

*- Work with IT Security to establish and document password policies,
strength, reuse, retry attempts.*

*- Review, validate and document common user roles.*

*- Provide support guidance to first and second tier support organizations,
as well as Operational Infrastructure teams for how to handle basic support
items*

*- Administration and support of production systems*

*- Consult on upgrade of current OpenOTP environments and contribute as
needed*

*- Maintain the service health and answer third-level support issues.*

*- Red Hat Linux admin knowledge required for installation and upgrades.*

*- Operational Transition Activities*

*- Create and support the transition plan for MoneyGram Security and Access
teams to take over ownership of the identity framework.*



Need following details for quick process:




Candidate Name

Education

Phone

Email ID

Visa Status & Validity

Current Location

Willing to relocate

Best time to reach

Availability

Reason for Change (if currently working)

Date Of Birth:

Skype ID:



Thanks& Regards
Contact
Syam Krishnan
703-831-8282 X 241
s...@canopy-one.com / syamcanopy...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
Resource Center" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-resource-center+unsubscr...@googlegroups.com.
To post to this group, send email to sap-resource-center@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-resource-center.
For more options, visit https://groups.google.com/d/optout.

Reply via email to