Location
Chennai | India
Job description
Job Description (Posting).
' 4+ years of experience in supporting Ping Identity and Access Management solutions Excellent command over SAML O-auth, OIDC, WS Federation, WS- Trust & related technologies. Experience in methodologies like SOAP, Artifact, POST Etc. Excellent command on various adapters like: - Kerberos, Open token, HTML, IWA, NTLM, Azure. Excellent knowledge of SSL certificates, Encryption and Decryption Signing Certificates etc. Experience in Implementation and Version Upgrade on Windows and Unix Servers. Should have a Good command over server clustering, load balancing, F5 URLs deployment etc. Should have knowledge of various selectors and policies in IDP and SP level. Should have worked on various IDP and SP used cases for deployment of new SaaS & On-premises applications. Excellent knowledge and understanding of AD concepts and working experience with at least few of the following directories: o Oracle Internet Directory/Oracle Virtual Directory o Sun Directory Servero Active Directory o Tivoli Directory Server o Novell Directory Server o CA Directory Experience and exposure in RBAC, Compliance solutions, Access certifications solutions is an added advantage. Should have the ability to understand customer scenario and requirements (may include integration situations) and be capable of suggesting solutions. Should have good knowledge on SSO, Strong Authentication and PKI (Public Key Infrastructure) technologies and products Excellent communication skills and ability to work with global counterparts. Play active role in the execution of the project and demonstrate strong technical skills Demonstrate a general knowledge of market trends and competition Be a strong team playerQualifications: 8+ years of strong Ping IAM experience Strong oral, written communications skills Customer Facing Exposure is must Open to travel requirements Open to working in 24x7 shifts' (1.) To clearly understand the client's cybersecurity environment and respective product. (2.) To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools (3.) To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection (4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team. (5.) To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes. (6.) To implement changes, monitor security device performance and implements performance tuning when necessary. (7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client
Qualification
B-Tech
Skill (Primary)
Infrastructure Management Services (IMS)-Security-Perimeter security solution
Job tags
Salary