Hi
Please go through the below requirement and let me know your interest.

*Job Title: **Identity and Access Managemen*t *Administrator*

*Location: Tulsa, OK*

*Duration: 12+ Months*



*Job Description: *
Identity and Access Management
Should have experience in Design and implementation in various Directory
Servers like SunOne, Novell eDrectory, AD, Oracle Internet Directory,Tivoli
Directory server etc *Proficient in translating business requirements and
policies into technology/Infrastructure solutions *Good in customer
communication and negotiation *Writing proposals Good in effort estimations*
Ability to demonstrate product features, capabilities and running proof of
concepts *Proven experience in multi instance or multi site deployment of
products/applications Experienced in large scale integration of tool with
various applications and platforms over a high end network infrastructure
Multiproduct certifications

IDM Consulting
Requirement collection and documentation - Collect Security enhancements for
fastest and most flexible backup and recovery solution in
the industry,Collect, analyse, interpret and document identity and access
Management,define the scope of the project current business environment to
identify potential weaknesses and risks Good Knowledge of using UML models
and notations, Rational Rose ( modeling tools) Providing Consulting
services on Identity and Access Management Pre-Sales related activities on
Identity and Access Management Solution Demonstrating Proof of Concept on
IAM Solution Developing Solution Architecture based on client?s
requirements Developing Proposals and Statement of Work for the projects
Implementation of Integrated Identity Management solution Evaluating
solutions alternatives Evaluating IDAM products, Preparing change
management plan. Coordinate R& D and pre sales in regard to the new
technology Features and benefit analysis, ROI calculations Help writing
product data sheets and application support literature Should have sound
Estimation models (various approaches), a. estimation calculator,resource
loading b. ball park estimation preparations c. budgetary effort estimation
techniques Data Analysis - Current State Analysis - As-is scenario analysis
of customer environment, Identifying Gaps in various environment,scope
definition, scope definition refinements, determining ROI for security
implementation Perform technical pre-sales work such as opportunity
qualification Work with key partners of the IDAM ecosystem to ensure
technical readiness on this exciting portfolio of technologies and also to
assist with their key projects Run internal and external product sales
seminars Assist Sales staff in identifying and progressing new
opportunities, taking ownership of all pre-sales technical issues and
activities Assist in formulating responses to Tender documents from clients
Assist at marketing events Assist in maintaining current competitive
information in the security market place Development of good relationships
with technical staff within client sites Identification and ownership of
initiatives to target prospective clients Broad knowledge of various
software applications (ERP systems, OSs) architecture validation & POC (
Involved all levels of integration. (User Access,Application, Extended
Enterprise, Process, and Information Integration) GoodIDAM domain knowledge
, - Fine grained entitlement managements - Access Management standards -
SAML, XACML - typical IDAM Access Mgmt Component Deployment architecture
details, LB, FO, DMZ - Various products available andniche products like
securant etc -SSO architectures - Mutli domain, Affiliated site, Federation
etc - Static vs dynamic access control Min 2 Years of implementation
experience in IBM Tivoli Identity Manager, IBM Tivoli Access Manager, SUN
Java System Identity Manager, Access Manager, Netegrity SiteMinder, Oracle
Identity and Access Management, BMC CONTROL-SA

Consulting
Ability to conduct Consulting engagements, do requirements gathering from
customers, understand business need and articulate solutions.
Negotiation,Presentation Skills should be apt to showcase technology depth
and breadth ofthe organization. Ability to map to the right stakeholders,
multi vendor/practice/party coordination. Proactive approach towards
generating downstream business revenue by analyzing the as is business of
the customer.Account Mining to generate opportunities.
Skill4 - ESS Security basics (L1)
Understands basics of Enterprise Security specifically in the areas of
Application Security and Data Security
Skill5 - Branding and Thought Leadership (L1)
Participate in conferences, blog, publish white papers, conduct PoV
sessions for customers


-- 

*Thanks & Regards*
*Baidya   *|  *Technical Recruiter*

<http://www.eteaminc.com/>

*eTeam Inc* <http://www.idctechnologies.com/>
****[email protected] <[email protected]>*
*(**732-248-1900 x 135 | **G**t**a**l**k**/**Yahoo**:* *baidya.recruiter*

*www.linkedin.com/in/baidhy* <http://www.linkedin.com/in/baidhy>

*Before you print this e-mail, please think of our environment*

If you want to be removed from our mailing list. Simply send us an e-mail
with *REMOVE <[email protected]?subject=REMOVE>* in the subject.

-- 
You received this message because you are subscribed to the Google Groups 
"OracleD2K" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/oracled2k.
For more options, visit https://groups.google.com/d/optout.

Reply via email to