Experience with Identity and Access Management tools processes and support and the ability to provide leadership to technical and project teamsRequired 12Years
Experience with IBM Security Identity Manager (ITIM/ISIM) IBM Security Access Manager (TAM/ISAM) or like IAM software. Require 12Years
Must have analytical and organizational skills and the ability to gather assemble correlate and analyze facts and propose solutions to problems. Required 12Years
Experience with 24x7 Oncall rotationRequired 12Years
Knowledge of Identity and Access Management and LDAP best practices. Required 12Years
Experience in authentication authorization and securing access for applications devices and users. Required 12Years
Experience in migrating users between directories. Required 12Years
Experience in IAM design patterns life cycle management modulesRequired 12Years
Experience in user lifecycle management and Integrating applications with IAM solutions Required 12Years
Experience in designing configuring and implementing Okta solution. Required 10Years
Experience with authentication methods such as SAML OAuth and OIDC. Required 10Years
Experience with onboarding applications into Okta. Required 10Years
Experience in implementation of user life cycle management with Okta including bulk loads. Required 10Years
Experience in integrating applications using Okta Gateway. Required 10Years
Experience in implementing Okta integrations involving multitenant environments. Required 10Years
Experience in implementing automation for Okta solution using Jenkins and/or other related technologies. Required 10Years
Experience in implementation of cloudbased solutions leveraging AWS and demonstrate expertise in authentication and authorization using Okta SailPoint and/or similar technologies. Required 10Years
Experience with EndtoEnd deployment of Okta and SailPoint Required 10Years
Skills in written and oral communication including the ability to make public presentations write technical information in an understandable format and produce reports. Preferred 12Years
Experience with either RSA IAM Oracle IdM DatapoJava JavaScript or WebSphere (6.0 8.x) and strong technical knowledge of various LDAP repositories such as AD eDirectory and IBM Security Directory Server (TDS / ISDS) Preferred 12Years
Skill in project management managing projects and able to establish project goals and objectives Preferred 12Years
Strong skills in analyzing and evaluating complex federal and state legislation program policy and operations issues as they relate to IAM projects. Preferred 12Years
Experience in technologies such as Java Java Script HTML JASON Python SQL Linux Preferred 12Years
Familiarity with LDAP browsers LBE Softerra LDAP Browser Apache Directory Studio and/or similar tools. Preferred 12Years
Security certifications. Preferred 12Years
Experience in integration of Okta with Single Page Applications (Angular ReactJS or other similar frameworks/libraries) using JWT OAuth and other related technologies / standards Preferred 10Years
Handson experience with CI/CD methodologies and containerized application deployments. Preferred 10Years
Federated Identity Manager (TFIM/IFIM) Single Sign On (ESSO) Tivoli Directory Integrator (TDI) or like software products Preferred 8Years
Experience in Websphere or JBoss or similar J2EE application servers configuration to enable robust authorization using Okta and SailPoint. Preferred 8Years
Prior experience in IBM Datapower IBM Security Identity Manager Security Access Manager Security Directory Integrator ITIM Adapters IBM Security Directory Server. Preferred 8Years
Handson experience with Agile Development Methodologies (preferably Scrum). Preferred 8Years
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.