Oracle Access Management Architect | New York, NY (Hybrid) | VISA : Local Profiles

Overview

On Site
Full Time
Part Time
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 2+ year(s)

Skills

JD
Cloud Computing
OIDC
System Integration
Auditing
PeopleSoft
Workday
PS
PostScript
Oracle HTTP Server
Risk Management
RADIUS
IT Security
Management
Firewall
Servers
Collaboration
Computer Networking
Database Administration
OAM
OAuth
Multi-factor Authentication
High Availability
Oracle Adaptive Access Manager
Customization
Internet
Oracle Identity Management
Proxies
Shell
Windows PowerShell
JavaScript
SSL
Oracle Fusion Middleware
API
Use Cases
Microservices
Oracle
Identity Management
Kubernetes
Debugging
Application Servers
SAML
Oracle WebLogic
Active Directory
Migration
LDAP
SSO
Authentication
Authorization
Oracle BI Publisher
Mentorship
Mapping
Knowledge Transfer
Performance Tuning
Documentation
Oracle UCM
IMG

Job Details

Hi,

Position: Oracle Access Management Architect

Location: New York, NY (Hybrid)

Duration: 2+ years

Interview Mode: In-Person

VISA : Local Profiles

JD

Job Overview: This position is responsible for integrating, managing and securing access to an organization's cloud resources. They also monitor and respond to security incidents, manage multi-factor authentication (MFA) settings, and collaborate with other IT teams to integrate IAM solutions with various applications and systems. Candidate must have a minimum of 7 years of experience with responsibilities listed below.

Detailed Responsibilities:

  • Configure and customize SSO solution in high availability mode using Oracle Access Management to implement various features such as Federation/SAML, OAuth, Open ID Connect, Multi-Factor Authentication besides current solution setup only for Header Based application integrations.
  • Work in the following 12c PS4 version tools - Oracle Access Management, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management in a large, complicated environment with services in High Availability (MDC).
  • Integrate workday with current IAM Infrastructure.
  • Maintain the OAM/SSO environments with regular patching.
  • Developing custom pages for login and MFA, authentication plug-in, SAML profiles, etc.
  • Work with vendors and application owners to define the requirements for each application for SSO integrations using OAM Federation Services such as SAML, OIDC and OAuth2.
  • Setup and configure applications in the test environments.
  • Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create visual attributes as per the use cases.
  • Document each application integration including the issues resolved during the integration.
  • Work with vendors and application owners to confirm applications are functioning as expected.
  • Document all details and tasks involved with various integrations, developing solutions in OAM.
  • Work closely with application teams on integrating various flavors of applications for SSO. Independently troubleshoot and fix issues related to Application integrations and/or product related issues.
  • Configure to leverage API usage in all Oracle IAM components including Oracle Microservices - Oracle Advanced Authentication (OAA) and Oracle Adaptive Risk Management (OARM) for various use cases.
  • Debug internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
  • Create or modify existing BI Publisher reports to generate audit reports as per application team's requirements eg: For PeopleSoft and Workday reports.
  • Work closely with other teams to identify and solve issues.
  • Other duties as assigned.


Technical Skills Required:

  • 84 months working in the following 12c PS4 version tools - Oracle Access Manager, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management and Oracle RADIUS Agent in a large, complicated environment with services in High Availability (MDC). IT Security concepts including Identity and Access Management domain such as Identity Life Cycle Management and Single Sign On.
  • 84 months debugging internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
  • 84 months experience in OAM Suite SSO products, including customizing OAM Features such as Header Based, SAML/Federation, OAuth, OpenID Connect, MFA, Advanced Authentication, etc., as per application use cases in high availability setup; OAAM and/or 12c OAA/OARM Microservices; developing custom pages, authentication plug-in, SAML profiles, etc.
  • 84 months experience in Installation, Configuration, Customization, Deployment, Integration and Performance tuning of Oracle Internet Oracle Unified Directory 12cPS4. Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create vitual attributes as per the use cases.
  • 84 months experience with JAVA, scripting languages such as Shell, PowerShell, JavaScript, configuring SSL in Oracle Fusion Middleware products etc to automate various tasks in the implementations. Configure to leverage API usage in all Oracle IAM components for various use cases.
  • 84 months Experience in various SAML and Federation libraries and integrations with different products such as SimpleSAMLPHP, Shibboleth, Okta, Ping, etc.
  • 84 months experience in container platform to deploy and run 12c microservices releases in Oracle Access Management such Advanced Authentication in containers. Experience in Kubernetes platform.
  • 84 months of experience in WebLogic experience deploying applications, debugging issues in the application server, Configuring providers such as LDAP, SAML Asserters and configuring role based access in the weblogic domain.
  • 84 months of experience in Active Directory integrations and migrations from LDAP based authentication to Single Sign On tools for authentication and authorization.
  • 84 months of experience in developing custom Oracle BI Publisher reports.

This phase involves ongoing mentoring of client employees, identifying the knowledge to be transferred, mapping out the key stakeholders involved, and setting clear objectives and expectations for the knowledge transfer process. During this phase, the selected candidate shall document the knowledge that needs to be transferred. This could include, but is not limited to, creating documents, manuals, and guidelines. All work performed during the engagement (development, deployment, configuration, integration, performance tuning, etc.) must be fully and clearly documented to allow both processes and their products to be replicated in additional environments by staff with reproducible results. Demonstration and other in-person knowledge transfers must be provided as requested to supplement documentation.

Niranjan Kumar | Technical Recruiter

Email:
Stellent IT | office :

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.