Hi Please go through the below requirement and let me know your interest. *Job Title: **Identity and Access Managemen*t *Administrator*
*Location: Tulsa, OK* *Duration: 12+ Months* *Job Description: * Identity and Access Management Should have experience in Design and implementation in various Directory Servers like SunOne, Novell eDrectory, AD, Oracle Internet Directory,Tivoli Directory server etc *Proficient in translating business requirements and policies into technology/Infrastructure solutions *Good in customer communication and negotiation *Writing proposals Good in effort estimations* Ability to demonstrate product features, capabilities and running proof of concepts *Proven experience in multi instance or multi site deployment of products/applications Experienced in large scale integration of tool with various applications and platforms over a high end network infrastructure Multiproduct certifications IDM Consulting Requirement collection and documentation - Collect Security enhancements for fastest and most flexible backup and recovery solution in the industry,Collect, analyse, interpret and document identity and access Management,define the scope of the project current business environment to identify potential weaknesses and risks Good Knowledge of using UML models and notations, Rational Rose ( modeling tools) Providing Consulting services on Identity and Access Management Pre-Sales related activities on Identity and Access Management Solution Demonstrating Proof of Concept on IAM Solution Developing Solution Architecture based on client?s requirements Developing Proposals and Statement of Work for the projects Implementation of Integrated Identity Management solution Evaluating solutions alternatives Evaluating IDAM products, Preparing change management plan. Coordinate R& D and pre sales in regard to the new technology Features and benefit analysis, ROI calculations Help writing product data sheets and application support literature Should have sound Estimation models (various approaches), a. estimation calculator,resource loading b. ball park estimation preparations c. budgetary effort estimation techniques Data Analysis - Current State Analysis - As-is scenario analysis of customer environment, Identifying Gaps in various environment,scope definition, scope definition refinements, determining ROI for security implementation Perform technical pre-sales work such as opportunity qualification Work with key partners of the IDAM ecosystem to ensure technical readiness on this exciting portfolio of technologies and also to assist with their key projects Run internal and external product sales seminars Assist Sales staff in identifying and progressing new opportunities, taking ownership of all pre-sales technical issues and activities Assist in formulating responses to Tender documents from clients Assist at marketing events Assist in maintaining current competitive information in the security market place Development of good relationships with technical staff within client sites Identification and ownership of initiatives to target prospective clients Broad knowledge of various software applications (ERP systems, OSs) architecture validation & POC ( Involved all levels of integration. (User Access,Application, Extended Enterprise, Process, and Information Integration) GoodIDAM domain knowledge , - Fine grained entitlement managements - Access Management standards - SAML, XACML - typical IDAM Access Mgmt Component Deployment architecture details, LB, FO, DMZ - Various products available andniche products like securant etc -SSO architectures - Mutli domain, Affiliated site, Federation etc - Static vs dynamic access control Min 2 Years of implementation experience in IBM Tivoli Identity Manager, IBM Tivoli Access Manager, SUN Java System Identity Manager, Access Manager, Netegrity SiteMinder, Oracle Identity and Access Management, BMC CONTROL-SA Consulting Ability to conduct Consulting engagements, do requirements gathering from customers, understand business need and articulate solutions. Negotiation,Presentation Skills should be apt to showcase technology depth and breadth ofthe organization. Ability to map to the right stakeholders, multi vendor/practice/party coordination. Proactive approach towards generating downstream business revenue by analyzing the as is business of the customer.Account Mining to generate opportunities. Skill4 - ESS Security basics (L1) Understands basics of Enterprise Security specifically in the areas of Application Security and Data Security Skill5 - Branding and Thought Leadership (L1) Participate in conferences, blog, publish white papers, conduct PoV sessions for customers -- *Thanks & Regards* *Baidya *| *Technical Recruiter* <http://www.eteaminc.com/> *eTeam Inc* <http://www.idctechnologies.com/> ****[email protected] <[email protected]>* *(**732-248-1900 x 135 | **G**t**a**l**k**/**Yahoo**:* *baidya.recruiter* *www.linkedin.com/in/baidhy* <http://www.linkedin.com/in/baidhy> *Before you print this e-mail, please think of our environment* If you want to be removed from our mailing list. Simply send us an e-mail with *REMOVE <[email protected]?subject=REMOVE>* in the subject. -- You received this message because you are subscribed to the Google Groups "OracleD2K" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/oracled2k. For more options, visit https://groups.google.com/d/optout.
