Sr Data Power Administrator Information Technology (IT) - Miami, FL at Geebo

Sr Data Power Administrator

Company Description Job Description Job Description
Responsibilities:
Manage configuration and maintenance of Data Power appliance.
Should be familiar with SSL protocol, key exchange (public and private), digital signatures, cryptographic algorithms, and certificate authorities.
Configure and manage network access to the appliance.
Be familiar with XML, XML Style sheet Language Transformation (XSLT), X-Path, and XML Schema Definition (XSD) SOAP and Web Services.
Manage the day-to-day operations of the appliance.
Manage the domain backups, as well as lifecycle migration of primary objects.
Manage access to all resources, access policies, Role Based Management (RBM), cryptographic keys, authentication, and authorization.
Managing the firmware image and be able to apply firmware images, and rollback back an upgrade.
Experience of trouble shooting Multiprotocol Gateways and Web Service Proxies.
Interfaces between the applications, other IT Operation teams, IT Dev group, and other corporate teams, install and maintain DEV, SIT, TST, and Production Java applications, J2EE application servers, and assure optimum performance of the applications.
Required Experience Bachelor's Degree in a technical field 7
Years of IT experience with data power appliances.
Experience with caching appliance XC10 Experience in Oracle 10g/11g SOA, ESB and BPEL integration and administration.
Experience of integrating with WebSphere Service Registry and Repository.
Working experience on UNIX, Linux and Windows platforms, and shell scripting Click here to apply.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.