What are the responsibilities and job description for the Ping Architect (REMOTE) position at Xlysi?
Ping architect
Remote
Role Description:
The identity & Access Management (IAM) team is looking for an Authentication Sr. Engineer/Architect to implement the next-generation Identity solution for enterprise users.
General requirements:
1. The person must be able to work in a team and independently.
2. Able to understand the business requirements and convert them into technical artifacts.
3. Able to work based on US Eastern or Central time zone.
4. Remote work is acceptable.
Technical requirements:
1. Overall 15 years of hands-on working experience in the Identity and Access Management area at the enterprise level.
2. The person must be able to understand and gather business requirements, translate them to technical requirements and design the solution to meet the tactical and strategic approaches.
3. The person must be able to produce architectural patterns and solution design documents.
4. A hands-on technical experience is required to conduct the POC and solution design in a development environment.
5. Must have the ability to lead the discussion with various folks including business, engineering, and operation teams.
6. The person must be an expert in Authentication & Access Management area and related technology.
6.1. Authentication space (10 years) MUST:
6.1.1. Multi-factor authentication (MFA) including password less MFA
6.1.2. Security knowledge of various technology & protocols - FIDO, PKI, Mobile MFA, OTP, FIDO key, Biometric authentication, behavior & risk-based authentication
6.1.3. Implementation experience with web, device (laptop, etc.), infrastructure, and API authentication use cases.
6.1.4. Mobile security knowledge is a plus.
6.1.5. Identity proofing (verification) using driver’s license solution.
6.2. Access Management space (10 years):
6.2.1. Identity Federation & Single Sign-On (SSO)
6.2.2. Expert knowledge of implementing SAML, OpenID Connect (OIDC), and OAuth 2.0
6.2.3. Security knowledge about session management
6.2.4. Identity gateway (proxy) and similar implementation knowledge
6.2.5. Continuous access control
6.2.6. Integration with cloud and on-premises systems including Azure AD, GCP, Salesforce, etc.
7. DevOps & Java Experience (10 years):
7.1. Java development using various tools and technology.
7.2. REST API development (Client and Server)
7.3. Various DevOps tools such as GitHub, Jenkins, etc.
7.4. Kubernetes and other docker container technology knowledge.
8. Should have REST API and JSON working experience.
9. Must have LDAP and Active Directory integration experience.
10. Should have some development experience in building POC and prototypes.1
1. Working knowledge of some of the IAM products is required.
11.1. Ping Identity, Okta, HYPR, Axiad, ForgeRock, SiteMinder, Transmit Security, Entra AD, etc.
12. Azure and GCP cloud experience are a plus.Preferred:1. CISSP certification2. Development experience in any of the technologies, Java, PowerShell, etc.
Remote
Role Description:
The identity & Access Management (IAM) team is looking for an Authentication Sr. Engineer/Architect to implement the next-generation Identity solution for enterprise users.
General requirements:
1. The person must be able to work in a team and independently.
2. Able to understand the business requirements and convert them into technical artifacts.
3. Able to work based on US Eastern or Central time zone.
4. Remote work is acceptable.
Technical requirements:
1. Overall 15 years of hands-on working experience in the Identity and Access Management area at the enterprise level.
2. The person must be able to understand and gather business requirements, translate them to technical requirements and design the solution to meet the tactical and strategic approaches.
3. The person must be able to produce architectural patterns and solution design documents.
4. A hands-on technical experience is required to conduct the POC and solution design in a development environment.
5. Must have the ability to lead the discussion with various folks including business, engineering, and operation teams.
6. The person must be an expert in Authentication & Access Management area and related technology.
6.1. Authentication space (10 years) MUST:
6.1.1. Multi-factor authentication (MFA) including password less MFA
6.1.2. Security knowledge of various technology & protocols - FIDO, PKI, Mobile MFA, OTP, FIDO key, Biometric authentication, behavior & risk-based authentication
6.1.3. Implementation experience with web, device (laptop, etc.), infrastructure, and API authentication use cases.
6.1.4. Mobile security knowledge is a plus.
6.1.5. Identity proofing (verification) using driver’s license solution.
6.2. Access Management space (10 years):
6.2.1. Identity Federation & Single Sign-On (SSO)
6.2.2. Expert knowledge of implementing SAML, OpenID Connect (OIDC), and OAuth 2.0
6.2.3. Security knowledge about session management
6.2.4. Identity gateway (proxy) and similar implementation knowledge
6.2.5. Continuous access control
6.2.6. Integration with cloud and on-premises systems including Azure AD, GCP, Salesforce, etc.
7. DevOps & Java Experience (10 years):
7.1. Java development using various tools and technology.
7.2. REST API development (Client and Server)
7.3. Various DevOps tools such as GitHub, Jenkins, etc.
7.4. Kubernetes and other docker container technology knowledge.
8. Should have REST API and JSON working experience.
9. Must have LDAP and Active Directory integration experience.
10. Should have some development experience in building POC and prototypes.1
1. Working knowledge of some of the IAM products is required.
11.1. Ping Identity, Okta, HYPR, Axiad, ForgeRock, SiteMinder, Transmit Security, Entra AD, etc.
12. Azure and GCP cloud experience are a plus.Preferred:1. CISSP certification2. Development experience in any of the technologies, Java, PowerShell, etc.