Role: IAM Architect with Azure AD experience
Location: Chicago IL (Remote)
FTE Only (No H1)
Job Description:
- Create and execute an IAM roadmap that meets requirements, including but not limited to security for hybrid cloud deployment, B2B REST-based Web Services, fine grained access control, policy driven security, SSO, user provisioning/de-provisioning, and federation
- Design and develop security solutions that meet requirements, adhere to applicable policies, and comply with information security requirements
- Demonstrate extensive knowledge across a broad range of identity and access management technologies
- Provide expertise on Oracle and Ping IAM platform architecture & products (OIM, OUD, PingFederate and PingAccess)
- BS or MS in computer science (or a technical field)
- Expert knowledge of Identity Management, Access Management , Directory Services ,Good understanding of Cloud concepts and hands on knowledge on Azure/AD
- Hands-on management experience of software developers/system administrators/architects
- Hands-on experience developing and deploying large-scale enterprise Identity & Access Management solutions using Oracle products.
- Knowledge of applicable SOX audit controls and applicability to IAM services architecture, design, and processes
- Security certifications like CISSP is a plus
- Demonstrated ability to work across a broad range of technologies to deliver complex solutions
- Should have hands-on working knowledge of PING Access, PING Fed, PING ID, Azure.
- 3+ years Azure AD Experience
- Experience in defining process to create and maintain Azure Subscriptions, Service Principals, Key Vault and Managed Identities
- Experience in defining different conditional access policies for Azure AD applications
- Knowledge on different Azure services such as Azure Storage, Azure Pipeline and Azure Application deployment
- Strong Knowledge on protocols such as SAML, OAuth, OIDC and Open ID
- Experience working with Azure Active Directory B2B and B2C environment
- Experience in deploying on-prem based applications in different Azure cloud zones