II. CANDIDATE SKILLS AND QUALIFICATIONS
Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. | ||
Years | Required/Preferred | Experience |
12 | Required | Experience with Identity and Access Management tools, processes, and support and the ability to provide leadership to technical and project teams |
12 | Required | Experience with IBM Security Identity Manager (ITIM/ISIM), IBM Security Access Manager (TAM/ISAM) or like IAM software. |
12 | Required | Must have analytical and organizational skills and the ability to gather, assemble, correlate, and analyze facts, and propose solutions to problems. |
12 | Required | Experience with 24x7 Oncall rotation |
12 | Required | Knowledge of Identity and Access Management and LDAP best practices. |
12 | Required | Experience in authentication, authorization and securing access for applications, devices and users. |
12 | Required | Experience in migrating users between directories. |
12 | Required | Experience in IAM design patterns, life cycle management modules |
12 | Required | Experience in user lifecycle management and Integrating applications with IAM solutions |
10 | Required | Experience in designing, configuring and implementing Okta solution. |
10 | Required | Experience with authentication methods such as SAML, OAuth and OIDC. |
10 | Required | Experience with onboarding applications into Okta. |
10 | Required | Experience in implementation of user life cycle management with Okta including bulk loads. |
10 | Required | Experience in integrating applications using Okta Gateway. |
10 | Required | Experience in implementing Okta integrations involving multi-tenant environments. |
10 | Required | Experience in implementing automation for Okta solution using Jenkins and/or other related technologies. |
10 | Required | Experience in implementation of cloud-based solutions, leveraging AWS and demonstrate expertise in authentication and authorization using Okta, SailPoint and/or similar technologies. |
10 | Required | Experience with End-to-End deployment of Okta and SailPoint |
12 | Preferred | Skills in written and oral communication, including the ability to make public presentations, write technical information in an understandable format, and produce reports. |
12 | Preferred | Experience with either RSA IAM, Oracle IdM, DatapoJava, JavaScript, or WebSphere (6.0 - 8.x), and strong technical knowledge of various LDAP repositories such as AD, eDirectory and IBM Security Directory Server (TDS / ISDS) |
12 | Preferred | Skill in project management, managing projects and able to establish project goals and objectives |
12 | Preferred | Strong skills in analyzing and evaluating complex federal and state legislation, program, policy, and operations issues as they relate to IAM projects. |
12 | Preferred | Experience in technologies such as Java, Java Script, HTML, JASON, Python, SQL, Linux |
12 | Preferred | Familiarity with LDAP browsers - LBE, Softerra LDAP Browser, Apache Directory Studio and/or similar tools. |
12 | Preferred | Security certifications. |
10 | Preferred | Experience in integration of Okta with Single Page Applications (Angular, ReactJS or other similar frameworks/libraries) using JWT, OAuth, and other related technologies / standards |
10 | Preferred | Hands-on experience with CI/CD methodologies and containerized application deployments. |
8 | Preferred | Federated Identity Manager (TFIM/IFIM), Single Sign On (ESSO), Tivoli Directory Integrator (TDI) or like software products |
8 | Preferred | Experience in Websphere or JBoss or similar J2EE application server’s configuration to enable robust authorization using Okta and SailPoint. |
8 | Preferred | Prior experience in IBM Datapower, IBM Security Identity Manager, Security Access Manager, Security Directory Integrator, ITIM Adapters, IBM Security Directory Server. |
8 | Preferred | Hands-on experience with Agile Development Methodologies (preferably Scrum). |
Any Graduate