Overview
Remote
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 12 Month(s)
No Travel Required
Able to Provide Sponsorship
Skills
MFA
Security Architect
Active Directory
LDAP
Okta
Ping
SAML
Job Details
Systems Security Architect consultant to integrate, manage, and secure access to their Cloud resources. The consultant will monitor and respond to security incidents, manage multi-factor authentication (MFA) settings, and collaborate with other IT teams to integrate IAM solutions with various applications and systems.
This role is anticipated to be remote, but local candidates will be given preference.
Mandatory Requirements:
- 84 months working in the following 12c PS4 version tools - Oracle Access Manager, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management and Oracle RADIUS Agent in a large, complicated environment with services in High Availability (MDC). IT Security concepts including Identity and Access Management domain such as Identity Life Cycle Management and Single Sign On.
- 84 months debugging internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
- 84 months experience in OAM Suite SSO products, including customizing OAM Features such as Header Based, SAML/Federation, OAuth, OpenID Connect, MFA, Advanced Authentication, etc., as per application use cases in high availability setup; OAAM and/or 12c OAA/OARM Microservices; developing custom pages, authentication plug-in, SAML profiles, etc.
- 84 months experience in Installation, Configuration, Customization, Deployment, Integration and Performance tuning of Oracle Internet Oracle Unified Directory 12cPS4. Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create vitual attributes as per the use cases.
- 84 months experience with JAVA, scripting languages such as Shell, PowerShell, JavaScript, configuring SSL in Oracle Fusion Middleware products etc to automate various tasks in the implementations. Configure to leverage API usage in all Oracle IAM components for various use cases.
- 84 months experience in various SAML and Federation libraries and integrations with different products such as SimpleSAMLPHP, Shibboleth, Okta, Ping, etc.
- 84 months experience in container platform to deploy and run 12c microservices releases in Oracle Access Management such Advanced Authentication in containers. Experience in Kubernetes platform.
- 84 months of experience in WebLogic experience deploying applications, debugging issues in the application server, Configuring providers such as LDAP, SAML Asserters and configuring role based access in the weblogic domain.
- 84 months of experience in Active Directory integrations and migrations from LDAP based authentication to Single Sign On tools for authentication and authorization.
Tasks Include:
- Configure and customize SSO solution in high availability mode using Oracle Access Management to implement various features such as Federation/SAML, OAuth, Open ID Connect, Multi-Factor Authentication besides current solution setup only for Header Based application integrations.
- Work in the following 12c PS4 version tools - Oracle Access Management, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) OR Oracle Adaptive Access Management in a large, complicated environment with services in High Availability (MDC).
- Integrate Workday with current IAM Infrastructure.
- Maintain the OAM/SSO environments with regular patching.
- Developing custom pages for login and MFA, authentication plug-in, SAML profiles, etc.
- Work with vendors and application owners (At colleges) to define the requirements for each application for SSO integrations using OAM Federation Services such as SAML, OIDC and OAuth2.
- Setup and configure applications in the test environments.
- Configure Oracle Unified Directory - Directory Server and Proxy Server. Extend the directory schema and create vitual attributes as per the use cases.
- Document each application integration including the issues resolved during the integration.
- Work with vendors and application owners to confirm applications are functioning as expected.
- Document all details and tasks involved with various integrations, developing solutions in OAM.
- Work closely with application teams on integrating various flavors of applications for SSO. Independently troubleshoot and fix issues related to Application integrations and/or product related issues.
- Configure to leverage API usage in all Oracle IAM components including Oracle Microservices - Oracle Advanced Authentication (OAA) and Oracle Adaptive Risk Management (OARM) for various use cases.
- Debug internal and external integration issues not limited to the products but OS related, Load balancers, Firewalls, App Servers, etc., and collaborate with external teams such as Oracle Support, Networking, Systems, DBA and Application Teams to resolve.
- Create or modify existing BI Publisher reports to generate audit reports as per application team's requirements eg: For PeopleSoft and Workday reports.
- Work closely with other teams to identify and solve issues.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.