Description

Responsibilities:
IDAM Developer

Job Description: Deep understanding of identity and access management fundamentals and ability to assess current state and develop needed workflow, provisioning, authentication, authorization, and associated governance and policies:
Design, integrate and implement Identity and Access Management components.
Build governance programs linked to business processes with a clear vision and well-defined goals.
Analyze existing business processes to support provisioning of resources and to ensure compliance with enterprise and regulatory requirements.
Architect comprehensive Identity and Access Management strategic design plans and project approaches according to our established methodologies.
Assist our customers in developing a complete security Identity and Access Management program.
Assist our customers in designing, specifying, and implementing identity management solutions.
Assess compliance of security policies and practices in accordance with regulations such as Sarbanes Oxley, GLBA and HIPAA
Broad understanding of general security technologies, including NT, W2K and UNIX operating systems, networking, firewalls, scanners, security policies, physical security, cryptography, PKI, directory services, VPN, IP-Sec, etc.
Strong knowledge of Federation protocols and standards (SAML 2.0, 1.1, WS-Federation, and Liberty). Required Core Technical Skills:
Minimum 5+ years of experience in designing and implementing Oracle Identity and Access Management products namely OIM, OAM, and OUD
5+ years Java/J2ee development experience with JDeveloper.
Experience with Oracle Identity Manager 12c, Oracle Access Manager 12c, Oracle Unified Directory 12c, Oracle Identity Cloud Service, and AWS
Experience with upgrading the Oracle Identity and Access Management environments to 12c version required.
Experience on OIM (Oracle Identity Manager) connectors for EBS, Microsoft AD (Active Directory), Microsoft Exchange, PeopleSoft and Office 365 required.
Oracle Access Manager experience with configuring different authentication schemes including Kerberos and Federation.

Education

Any Graduate