Ping federation with Unix
Ping federation with Unix
Syntricate Technologies
Irving, TX
See who Syntricate Technologies has hired for this role
Job Location: Irving, TX (Onsite)
Duration: Full time (USC/GC/GCEAD)
The resource should be Proficient in authentication services technologies, such as SSO, Kerberos, Federation with hands on experience on at least a few of the following: Ping Identity products (Ping Access, Ping Fed, Ping Directory); Radiant Logic Virtual directory; Broadcom (CA Siteminder, CA Directory server).
The position requires understanding configuration, deployment process, maintenance, and troubleshooting
of the security products listed above. The candidate is expected to understand the various logs generated by the security products and be able to use the information to troubleshoot issues.
The experience with managing the directory servers needs to be using command line, and not using the administrative UI as that is not implemented in the infrastructure. The candidate also needs to be familiar with standard LDAP commands to examine and maintain data in the directory.
In-depth understanding of the Kerberos Domain Controller features in UNIX is a significant plus, again including implementing, configuring, and troubleshooting.
knowledge of Linux commands and Schedulers (CRON, AUTOSYS) is required, And overall, while a programming background is not necessary for the position, the candidate is expected to have experience using UNIX shell scripting while performing their duties.
Auth Specialist Description (NAM)
Duration: Full time (USC/GC/GCEAD)
The resource should be Proficient in authentication services technologies, such as SSO, Kerberos, Federation with hands on experience on at least a few of the following: Ping Identity products (Ping Access, Ping Fed, Ping Directory); Radiant Logic Virtual directory; Broadcom (CA Siteminder, CA Directory server).
The position requires understanding configuration, deployment process, maintenance, and troubleshooting
of the security products listed above. The candidate is expected to understand the various logs generated by the security products and be able to use the information to troubleshoot issues.
The experience with managing the directory servers needs to be using command line, and not using the administrative UI as that is not implemented in the infrastructure. The candidate also needs to be familiar with standard LDAP commands to examine and maintain data in the directory.
In-depth understanding of the Kerberos Domain Controller features in UNIX is a significant plus, again including implementing, configuring, and troubleshooting.
knowledge of Linux commands and Schedulers (CRON, AUTOSYS) is required, And overall, while a programming background is not necessary for the position, the candidate is expected to have experience using UNIX shell scripting while performing their duties.
Auth Specialist Description (NAM)
- Knowledge of middleware products IBM WebSphere & Apache a plus.
- Understanding of firewalls, pooling, VIPs/WIPs, certificates etc. and their impact on application server configuration and architecture.
- Ability to work with and coordinate with Internal teams for any patching/issues/troubleshooting of Application server infrastructure.
- Proficient with Microsoft Office products including Word and Excel and Service Ticketing system are preferred
- Ability to work with Internal teams for any CIVA/CAVA findings.
- Excellent written and verbal communication skills, Ability to work well individually and as part of a team.
- Must have good work ethic to follow documented process.
-
Seniority level
Entry level -
Employment type
Contract -
Job function
Other -
Industries
Information Technology & Services
Referrals increase your chances of interviewing at Syntricate Technologies by 2x
See who you knowGet notified about new Ping federation with Unix jobs in Irving, TX.
Sign in to create job alertSimilar jobs
People also viewed
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Cybersecurity, Privacy and Forensics - Identity and Access Management - Senior Associate
Cybersecurity, Privacy and Forensics - Identity and Access Management - Senior Associate
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
-
Cybersecurity, Privacy and Forensics - Identity and Access Management - Senior Associate
Cybersecurity, Privacy and Forensics - Identity and Access Management - Senior Associate
-
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Advisory - Cyber & Strategic Risk - Cyber Identity - Ping Senior Consultant
Looking for a job?
Visit the Career Advice Hub to see tips on interviewing and resume writing.
View Career Advice Hub