BH 20281 - J2EE Developerother related Employment listings - Roseland, NJ at Geebo

BH 20281 - J2EE Developer

Company Name:
Open Systems Technologies
J2EE development expertise with knowledge of .net.
Experience with SSO protocols: SAML, OAuth, OpenID, OpenID Connect, ADFS, Azure.
Wide development experience in API development and REST web services, Identity protocol implementation, authentication systems, security vulnerability mitigation
Secure software coding practices, application code review and vulnerability assessment.
Implementation of two-factor authentication technology to provide support for internal administrative users to comply with corporate wide security compliance policies
Experience with multi-tiered web and application server systems including Apache, Tomcat, WAS,and performance optimizations.
Knowledge of standard identity systems like SiteMinder and stores like AD, LDAP.
Nice to Have:
Identity Management Tools: Tivoli Access Manager, Enterprise Directory Services, PING Federated Identity, Open Authentication Framework/SAML, Identity Guard, Identity Minder,
Sun Identity manager, Novell Identity Manager, Novell eDirectory
Produce security reference architecture (Best Practices, definition and design) for different platforms including application, networking, Windows, LDAP and Databases
Evaluate and perform POC towards the selection of products and vendors for future technology initiatives
Provide security models for public, private, hybrid cloud solutions and other third party hosting solutions
Authentication & Access Control (RBAC, IAM, ERP,AD, LDAP, Databases, RSA Authentication Manager)Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.