Drag

IDENTITY MANAGEMENT/IAM/IDM

Location : ,

Job Description

IAM Developer

Required Skills:

  • 8 plus years of relevant experience in Identity and Access Management.
  • 5 plus years of experience with multi-factor authentication platforms.
  • 5 plus years of experience with various authentication and authorization solutions and directory platforms.
  • Extensive experience in designing and configuring Third Party integrations using SAML.
  • In-depth understanding of authentication, authorization, role-based access, least privilege, and segregation of duties access control concepts.
  • Proven track record of troubleshooting and resolving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions.
  • Bachelor’s degree in computer science/Engineering or related field preferred.
  • Demonstrated ability to make well-informed decisions by assessing the costs and benefits of potential actions.
  • Detail-oriented and quality-driven with excellent communication and interpersonal skills.
  • Relevant industry training and/or certification is a plus.
  • Ability to deliver high-quality results in a high-energy environment following Agile Practices.
  • Demonstrated ability to quickly ramp on different IAM Technology stacks ( eg : Okta )
  • Strong multitasking skills to manage the demands of multiple projects, issues, and tasks.

Nice to Have:

  • Experience with tools such as CloudWatch, RockMon, AppDynamics, DataDog, and Elk Kibana.
  • Familiarity with Amazon Web Services and experience with ForgeRock implementation on SAAS.
  • Experience using ForgeRock products, with expertise in ForgeRock AM, DS, IG, IDM, and Active Directory.
  • Solid understanding and experience with ForgeRock Access Management, Directory Services, Identity Management, and Identity Gateway.

RM notes:

  • Design and Implement authentication trees.
  • A person who can understand access mgt and have knowledge on ForgeRock OR Okta

Top 3 skills:

  • ForgeRock, Okta and extensive exp in OIDC: Open Id Connect