Jobseeker Register

Submit Resume -

Jobseeker Login

Create Resume Online

Submit Your Link in for free and increase your visibility.

Recent Job Search
pro, c, jobs, in, rajkot
pl, 1, jobs, in, agartala

Login / Register
This job has been viewed 590 time(s) since 18th Dec 2015

Us Citizens Iam, Sap Salesforce,

Location : Chicago | Company Name : Arshadconsultancy

Us Citizens Iam Sap Salesforce | arshadconsultancy | chicago |

Identity & Access Management Security Consultants and Manager 
First skill would be Oracle
Oracle ID Manager
Oracle IAM - Identity & Access Management
Second skill is Tivoli
Third is CA
Fourth is Sailpoint
Any combo of the above is better but our meat and spuds if you will is Oracle IAM Consultant level.
EAD tied to Green Card process
Green Card
Open to 80% travel
Open to perm roles
Identity & Access Management Security Consultants and Manager b6
Organization: Technology Growth Platform
Location: Location Negotiable
Travel: 100% (Monday - Friday)
Choose * for a security technology career where the variety of opportunities and challenges allows you to make a difference every day. A place where you can develop your potential and grow professionally, working alongside talented colleagues. The only place where you can learn from our unrivalled experience, while helping our global clients achieve high performance. If this is your idea of a typical working day, then * is where you should be.
* `s Security practice helps organizations work through complex business and technology issues to provide a straightforward approach to information security. Our security professionals bring deep technology skills and industry knowledge to any organization and work closely with clients to design and implement a security solution closely tied to business objectives.
Identity & Access Management Security Consultant:
Our consultants identify and evaluate security gaps and will help to create security project plans. They also anticipate security requirements and identify sound security controls for applications, systems, processes and organizations. Our consultants can easily work with non-security teams to integrate security controls on projects.
We are currently searching for consultants for our Security Technology practice who are familiar with multiple Identity & Access Management products, including Oracle, CA, Sun, Tivoli, SiteMinder and others. Technical experience should include design and developing provisioning flows and adapters for assets, developing Role Based Access Control (RBAC) entitlements to web applications, implementing role resolution, role mining and role administration user interfaces.
Key responsibilities may include:
Working with clients to develop Identity and Access Management strategies, architectures, and implementation plans
Configuration and Implementation of I&AM products and risk mitigation
Design and develop automated provisioning and reconciliation of IT resources
Request-based application and resource provisioning
RBAC authentication to entitled applications and resources
Role based resolution of approvers for request approval flows
Single Sign-on
Ability to travel 100%
Basic Qualifications:
Minimum of a Bachelor degree
Minimum of 2 years experience working in one of the following areas: Application Security; PKI & Authentication; Identity & Access Management or Data Privacy & Security
Minimum of 2 year experience in the consulting environment
Minimum of 2 years experience with packaged or custom IAM solutions.
Preferred Skills:
Industry-adopted security certification (e.g. CISSP)
Minimum of a Bachelor degree in a technical field (e.g. Computer Science, CIS,MIS, Engineering)
Experience deploying and implementing custom applications
Experience with any of the following:
o Provisioning Onboarding
o RBAC Authorization models
o SSO WAC technologies Enterprise SSO
o Federation
o Directory Services Meta-Directory Virtual Directory
Experience with any of the following Security areas:
o Information risk, privacy, and strategy (i.e. security and privacy policies, or risk assessments, or security and privacy compliance);
o Application security; (i.e. application security testing or security integrations with Systems Development Lifecycle (SDL) )
o Infrastructure security; (i.e.- securing networks and servers or security monitoring)
o Identity and access management; (i.e. authentication methods, or provisioning, or entitlement management)
o Data security or encryption

Login / Register