This site uses cookies. To find out more, see our Cookies Policy

Sr. SSO Engineer - Consulting in Dallas, TX at Vaco

Date Posted: 9/11/2018

Job Snapshot

Job Description

Vaco is a private-equity backed solutions company that provides consulting, managed services, staffing, and placement services globally. Established in 2002 by "Big 4" consulting veterans, Vaco now has over 40 offices and has worked with over 9,000 clients. We have over 6,000 consultants and been named to Inc. magazine's list of fastest-growing private companies for the past 12 years. Vaco offers boutique services with global reach.

The Vaco Cyber Security team's success relies on the trusted relationships built with our clients. We recognize the challenge organizations encounter improving security, restructuring operations and handling risk while maintaining compliance and keeping costs down. Our information security specialists work closely with organizations to provide the solutions that best match business and security objectives. As a member of the team, you will have the opportunity to utilize and expand your skills through client experience and industry training while collaborating with security professionals across industries. Our team provides the full spectrum of security services to clients including, Strategy & Advisory, Identity & Access Management, Security Operations, Managed Services, Governance, Risk, and Compliance.

Role Summary:
The Identity Access Management (IAM) SSO Engineer is responsible for the design, development, implementation, application integration and improvement of access management solutions including, but not limited to, Single Sign On & Federation, Directory Services, Multifactor Authentication, and Web Access Management. Ensure these services are robust and scalable to support the employees, contractors, clients and customers.

Essential Responsibilities:
* Lead application integration efforts in SSO, federation, web access management, and directory service environments
* Lead development of access management interfaces to CA SiteMinder/SSO services and SSO-effected directory objects.
* Develop and maintain an access management integration process detailing a technical integration template and procedure
* Identify identity store sources containing data attributes & values required to complete SAML assertions
* Support technical integration needs (design and development) that facilitate connectivity between SSO, directory, and provisioning tools
* Work with the Access Management Solutions Lead to validate integration needs with proposed technical solution
* Successfully transition support and knowledge of new application integrations and environment upgrades to Synchrony's SSO operations team

Things Looking For:
* Bachelor's degree in Computer Engineering or related field, with a minimum of 2 years of experience in Information Security OR in lieu of the Bachelor's degree, a minimum of 5 years of experience in Information Security
* Minimum of 3 years of experience in the development and/or operational experience with the following product offerings: Oracle Unified Directory and CA Siteminder/SSO (12.52+), including implementation, installation, configuration & administration of web agents secure proxies, gateways and policy servers
* Working experience of CA SiteMinder/SSO domains, realms, rules, responses and policies
* Completed a CA SiteMinder/SSO upgrade
* Minimum of 3 years of implementation experience with SSO and federation using SAML 1.x, SAML 2.0, Oauth, OIDC and WS-federation
* Minimum 3 years Java development experience
* Minimum 3 years Unix/Linux shell scripting and Perl experience
* Minimum 3 years of experience supporting IIS, Apache and WebLogic

Desired Traits:
* Working knowledge of Sailpoint Identity IIQ, Bomgar Privileged Identity (formerly Lieberman Rapid Enterprise Defense (RED) Identity Management) and RSA Authentication Manager
* Strong analytical and clear-thinking skills
* Excellent team skills and self-motivated
* Experience in enterprise level security in a financial institution
* Experience of designing and using REST/SOAP web services
* Experience with Identity Hubs/Virtual Directories like Radiant Logic FID or Oracle Virtual Directory
* Experience with Identity Brokers/IDaaS solutions like Okta, PingOne, AWS SSO or Azure AD
* Experience with CASBs (Cloud Access Security Brokers)