Job Description
Title – OIM Developer
Location – Dallas TX – onsite only
Duration: Full Time
Description:
Join our Security Operations team, where you'll drive strategic initiatives and support enterprise-wide identity and access management. You’ll be at the forefront of:
• Security operations strategy and governance
• Leading Security Operations teams and fostering development
• Strategic leadership and forward-thinking planning
Additional Skills:
• Proven expertise in end-to-end deployment of Oracle Identity Manager solutions, including requirements analysis, solution design, configuration, customization, integration, migration, and ongoing support
• Strong understanding of identity lifecycle management, access certifications, compliance management, and application onboarding using Oracle Identity Manager
• Demonstrated experience integrating Oracle Identity Manager with major enterprise applications (e.g., SAP, ServiceNow, Workday etc.)
• Proficiency with core technologies relevant to Oracle Identity Manager implementation, such as Java, RESTful APIs, SQL/RDBMS, and Linux
• Experience in designing and implementing cloud security solutions
• Familiarity with cloud platforms (e.g. AWS, Azure, Google Cloud) and their security features
• Knowledge about regulatory compliance and industry standards (e.g. GDPR, PSI-DSS, ISO 27001)
• Strong understanding of directory services such as Active Directory, LDAP, Ping and Azure AD
• Knowledge of authentication protocols (e g. SAML, OAuth, OpenID Connect, Kerberos)
• Understanding of network security principles and practices
• Strong problem-solving skills to address security challenges and incidents
• Excellent written and verbal communication skills to articulate security concepts
• Ability to collaborate effectively with cross-functional teams
• Experience in supporting security projects including planning, execution, and monitoring
• Ability to assist in designing and implementing access control policies and procedures
• Strong problem solving and analytical skills to identify and address access management issues
Key Responsibilities
• Design, and implement large-scale identity and access management (IAM) solutions
• Serve as the technical subject matter expert (SME) for IAM solutions, providing guidance on best practices, solution optimization, and future-state architectures
• Oversee end-to-end lifecycle management of identities (human and non-human), including onboarding, access provisioning, deprovisioning, and certification campaigns
• Design and implement advanced workflows, connectors, and automations within the IGA platform to streamline access requests, approvals, and policy enforcement
• Integrate IGA platform with a diverse technology stack (e.g., directories, cloud platforms, HR systems, databases, and SaaS applications), ensuring seamless interoperability
• Lead technical troubleshooting, incident resolution, and root cause analysis for escalated IAM issues, engaging with third-party vendors as needed
• Establish and enforce IAM governance policies, controls, and standards in collaboration with security, risk, audit, and compliance teams
• Drive continuous improvement initiatives, process automation, and adoption of emerging IAM tools and technologies
• Develop and maintain comprehensive documentation for IAM architectures, standard operating procedures, and security controls
• Communicate complex technical solutions and IAM strategies to technical and non-technical stakeholders, including presentations, status reports, and executive briefings
• Stay updated with current industry trends, emerging threats, and regulatory changes to ensure the organization's IAM capabilities evolve accordingly
͏
Do
-
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
-
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
|
No. |
Performance Parameter |
Measure |
|
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
|
2. |
Process Adherence |
Adherence to SLAâÂÂs (90-95%), response time and resolution time TAT |
͏
͏
Experience: 3-5 Years .
The expected compensation for this role ranges from $45,000 to $121,000 .
Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options.
Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.