Systems Architect (Oracle Identity & Access Management)

Overview

On Site
DOE
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 30 Month(s)
No Travel Required

Skills

See job description

Job Details


Trigyn's direct government client has an immediate need for a Systems Architect in New York, NY.

Description:
This position is responsible for integrating, managing and securing access to an organization's cloud resources. They also monitor and respond to security incidents, manage multi-factor authentication (MFA) settings, and collaborate with other IT teams to integrate IAM solutions with various applications and systems

? Configure and customize SSO solution in high availability mode using Oracle Access Management to implement various features such as Federation/SAML, OAuth, Open ID Connect, Multi-Factor Authentication besides current solution setup only for Header Based application integrations.
? Work in the following 12c PS4 version tools - Oracle Access Management, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management in a large, complicated environment with services in High Availability (MDC).
? How would you explain the key components of Identity and Access Management, particularly Identity Life Cycle Management and Single Sign-On, and how have you applied them in past projects?
? Integrate workday with client's current IAM Infrastructure.
? Maintain the OAM/SSO environments with regular patching.
? Can you describe a time when you used Java or scripting languages like Shell, PowerShell, or JavaScript to automate tasks during an Oracle Fusion Middleware implementation, particularly involving SSL configuration?
? Developing custom pages for login and MFA, authentication plug-in, SAML profiles, etc.
? Work with vendors and application owners (At colleges) to define the requirements for each application for SSO integrations using OAM Federation Services such as SAML, OIDC and OAuth2.
? Setup and configure applications in the test environments.
? Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create virtual attributes as per the use cases.
? Document each application integration including the issues resolved during the integration.
? Work with vendors and application owners to confirm applications are functioning as expected.
? Diligently document all details and tasks involved with various integrations, developing solutions in OAM.
? Work closely with application teams on integrating various flavors of applications for SSO. Independently troubleshoot and fix issues related to Application integrations and/or product related issues.
? Configure to leverage API usage in all Oracle IAM components including Oracle Microservices - Oracle Advanced Authentication (OAA) and Oracle Adaptive Risk Management (OARM) for various use cases.
? Debug internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
? Create or modify existing BI Publisher reports to generate audit reports as per application team's requirements e.g.: For PeopleSoft and Workday reports.
? Work closely with other teams to identify and solve issues.
? Duties as assigned.

Mandatory Qualification:
? Defines the architecture of a computerized system (i.e., a system composed of software and hardware) in order to fulfill certain requirements, including a breakdown of the system into components, the component interactions and interfaces (including with the environment, especially the user), and the technologies and resources to be used in the design.
? Candidate is able to provide guidance to large teams and/or has extensive industry experience and is considered at the top of his/her field.

? 84 months of experience working in the following 12c PS4 version tools - Oracle Access Manager, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management and Oracle RADIUS Agent in a large, complicated environment with services in High Availability (MDC). IT Security concepts including Identity and Access Management domain such as Identity Life Cycle Management and Single Sign On.
? 84 months of experience debugging internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
? 84 months of experience in OAM Suite SSO products, including customizing OAM Features such as Header Based, SAML/Federation, OAuth, OpenID Connect, MFA, Advanced Authentication, etc., as per application use cases in high availability setup; OAAM and/or 12c OAA/OARM Microservices; developing custom pages, authentication plug-in, SAML profiles, etc.
? 84 months of experience in Installation, Configuration, Customization, Deployment, Integration and Performance tuning of Oracle Internet Oracle Unified Directory 12cPS4. Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create virtual attributes as per the use cases.
? 84 months of experience with JAVA, scripting languages such as Shell, PowerShell, JavaScript, configuring SSL in Oracle Fusion Middleware products etc. to automate various tasks in the implementations. Configure to leverage API usage in all Oracle IAM components for various use cases.
? 84 months of experience in various SAML and Federation libraries and integrations with different products such as SimpleSAMLPHP, Shibboleth, Okta, Ping, etc.
? 84 months of experience in container platform to deploy and run 12c microservices releases in Oracle Access Management such Advanced Authentication in containers. Experience in Kubernetes platform.
? 84 months of experience in WebLogic experience deploying applications, debugging issues in the application server, configuring providers such as LDAP, SAML Asserters and configuring role-based access in the WebLogic domain.
? 84 months of experience in Active Directory integrations and migrations from LDAP based authentication to Single Sign On tools for authentication and authorization.
? 84 months of experience in developing custom Oracle BI Publisher reports.

For Immediate Response call , or send your resume to
For Immediate Response call , or send your resume to

TRIGYN TECHNOLOGIES, INC. is an EQUAL OPPORTUNITY EMPLOYER and has been in business for 35 years. TRIGYN is an ISO 9001:2015, ISO 27001:2013 (ISMS),ISO 20000:2018 and CMMI Level 5 certified company.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.