Your key responsibilities
- Proxy, and PingData Sync.
- Performing installation, configuration, and upgradation of Ping Directory instances.
- Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions.
- Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review.
- Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of
- PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution.
- Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory
- Increase efficiency and maintainability incorporating scripting and automation whenever appropriate.
Skills and attributes for success
- Advanced knowledge of LDAP and LDAP based directories.
- Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.)
- Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory.
- Strong knowledge of PingDirectory administrative configuration.
- Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards.
- Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API.
- Knowledge of SSL/TLS, PKI, certificates, and certificate authorities.
- Have hands-on experience on cloud provider – Azure or AWS or GCP
- Experience in scripting language - python, PowerShell and bash
- Knowledge of other Ping products – Ping Federate, Ping Access.
To qualify for the role, you must have.
- B. Tech./ B.E. with sound technical skills
- Strong command on verbal and written English language.
- Experience in HTML, CSS and JavaScript.
- Strong interpersonal and presentation skills.
- 1-2 Years’ Work Experience.
Certification:
- Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications.
- AWS Cloud practitioner and Azure AZ-900 certification.
What we look for
- hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment.
- Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements.
At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are.
You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:
- Support, coaching and feedback from some of the most engaging colleagues around
- Opportunities to develop new skills and progress your career
- The freedom and flexibility to handle your role in a way that’s right for you
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.