Perfil del Candidato:
- University Degree
- Certification will be a plus: CISSP, CISA, CISM, ITIL
- IBM Security Identity Manager, IBM Security Access Manager
- Oracle Identity Manager, Oracle Access Manager, Oracle Identity Analytics.
- CA IdentityMinder, CA SiteMinder, CA GovernanceMinder
- NetIQ Identity Manager, NetIQ Access Manager
Datos del Puesto:
Join Accenture and help transform leading organizations and communities around the world. The sheer scale of our capabilities and client engagements and the way we collaborate, operate and deliver value provides an unparalleled opportunity to grow and advance. Choose Accenture, and make delivering innovative work part of your extraordinary career.
-Design of Identity and Access Management Architecture for large organizations
-Description of technical and functional requirements in projects of Identity and Access Management, developing RFI / RFP documents.
-Task planning and effort estimation.
-Analysis of technical and functional requirements.
-Design and implementation of identity models, management processes and architecture of solutions (composition and design of the hardware and software infrastructure).
-Development of integration and acceptance testing plans.
-Business Roles modeling.
-Expert opinion regarding customer needs, based on previous experience in implementation projects and products from different manufacturers.
-Design and implementation of integration connectors for the provisioning of end systems and data collection from data sources.
-Design of integration methods for access control and single sign-on for Web applications, both in unique domain environments and multidomain and federated environments.
-Design and implementation of authentication mechanisms using Single Sign-On in desktop applications.
-Report design and preparation, both operational and management oriented.
-Knowledge of integration standards (SAML, OpenID Connect, OAuth, SPML, SCIM).
-Design of implementation and consolidation of centralized directories of LDAP identities, using both physical and virtual directories.
-Extensive knowledge in other areas within Information Security (standards, regulations, SIEM, perimeter and technical security, trade security solutions ...)