Job ID :
Company :
Location :
Type :
Duration :
6 Months
Status :
Openings :
Posted :
03 Feb 2014
Job Seekers, Please send resumes to

Java with Identity Access Management

Minimum Requirements:

Development experience (3 years or more) with skills such as: C, C#, Java, J2EE, C++, .NET, ASP.NET, Javascript, PowerShell 2.0

Strong knowledge of federation concepts, patterns and practices

Deep experience with and strong knowledge of LDAP, DNS, DHCP, AD, ADFS, Shibboleth, SAML, OAuth and WS-* implementations and specifications experience with non-trivial Active Directory Federation Services (ADFS) implementations

Exchange Online experience using the Hybrid server, Hybrid server, DirSync

Working knowledge of cryptographic concepts

Windows programming

XML, SAML, XMLDsig, WS-Federation

Web servers (e.g. IIS, WebSphere, Apache)

Microsoft Web Services Enhancements (WSE), and Windows Identity Foundation (WIF)

CAPICOM, Crypto API, .NET System.Security.Cryptography

Web skills such as: Web protocols: HTTP, SSL, SOAP, Web authentication methods, Secure web coding practices, Generating HTML from programs, IIS Administration and Cross-platform knowledge (Mac, PDAs, Unix, Linux).

Plusses include: Strong technical writing and communication skills, Strong diagnostic and problem solving skills, Ability to comprehend and effectively translate customer requirements into technical solutions, Ability to direct software developers to develop solutions and templates, Ability to create documentation and process diagrams for support personnel, Time management skills with a focus on quality service and deliverables, ability to work as part of distributed team, Advanced certifications (CISSP, MCSE) and working knowledge of Linux operating system


Assist with the expansion of an Identity Management tool set, focusing on automated provisioning of services. The opportunity will require significant Java and EJB skills and possess a strong design and problem-solving background.

Understanding of role management and provisioning principles is critical as the candidate works on interfaces and core capabilities of internal IDM systems.

The platform to be designed/ implemented will blend identity federation, multi-factor authentication and web based identities to enable broad and secure collaboration for a next generation of services and applications (web/ mobile). This position will be part of the Identity & Access Management engineering team which is also responsible for AD, ADFS, PKI and all identity life cycle environments and tools.

Duties will include:

Work closely with IAM development and information security partner teams to define requirements, design architecture, develop solutions and create support documentation.

Design and configure solutions to support SAML 2.0 based authentication to internally hosted and cloud based web applications.

Design, configure and integrate multi-factor solutions including certificate, token based OTP and on demand OTP to provide for higher assurance Single Sign-On (SSO).

Provide strategic guidance to the Identity & Access Management engineering team on industry best practices and trends.

Serve as the subject matter expert for SAML and OAuth authentication and single sign-on processes and platform.

Coordinate with vendors, customers, developers, engineers and support personnel to develop highly scalable, globally deployed authentication solutions.

Provide Tier 3 support for authentication solutions.

Design and configure a solution that allows for high-availability with site resiliency (DR) to be deployed onto a protected network segment.

Develop and maintain applications using Java in JBoss

Work with Oracle Identity Manager as part of the internal Identity Management toolset.