DWH is searching for Oracle Fusion Middleware Experts and Senior Microsoft Server Administrators

DWH is searching for Oracle Fusion Middleware Experts and Senior Microsoft Server Administrators

We are looking for English (+German (Italian, Spanish) as an advantage) speaking Oracle Fusion Middleware and Microsoft Sharepoint Administrators for our team for permanent employment (not freelance!!!!) for immediate (fastest possible) start in the north of Munich (near the airport) to work in a highly dynamic and highly secure environment.

Existing and valid security clearances (please specify when applying) and nationality of a Eurofighter production country would be a prerequisite, as required by the customer. Please send us the nationality(ies) you hold with your application.

 

For the position Oracle Fusion Middleware Administration your activities include:

Troubleshooting, Upgrading and patching abilities at the infrastructure level in the following products:

Oracle Weblogic Server, Oracle Webcenter Portal, Oracle Webcenter Content (UCM - Universal Content Management), Oracle Business Process Management, Oracle Business Intelligence Enterprise Edition, Oracle SOA Suite (Service Oriented Architecture), Oracle HTTP server, Oracle Access manager, Oracle Webgates, Oracle Security Service (SSL/Network), Oracle Internet Directory, Oracle Identity Manager, Oracle Business Intelligence BI Publisher

In addition, the ability to perform a level of troubleshooting of the various applications that are installed in the OFM.

The ability to install and upgrade the applications into the various OFM products (with instructions).

Manage privileges within IDM (enterprise role creation and granting and revoking). More in-depth knowledge of IDM would be nice to have.

General knowledge of the whole OFM architecture to understand how the various products are connected.

General knowledge of Oracle databases in order to understand, troubleshoot and configure the connection with OFM.

Ability to do WLST scripting and shell scripting (e.g. for the start and stop processes).

Java knowledge (for performance and tuning requirements).

Logging and managing SRs with Oracle support.

It would be useful if the candidate had the Oracle Certified Associate, Oracle WebLogic Server 12c Administrator certification (if they do not they should be prepared to work towards it here).

The OFM team have the ability to perform all of the tasks outlined in this knowledge and experience section. They also have the ability to perform these tasks on a Solaris platform (as well as Linux and Windows).

The Windows Sharepoint administration tasks include, among others:

 

Senior Windows System Adminstrator with following optional knowledge:

optional

  1. SharePoint 2013 and SQL Databases
    • Design, implementation and maintenance of SharePoint 2013/16 Farms
    • Maintenance of Site Collection with isolated databases.
    • User Profile Service Application for synchronizations.
    • Web Applications and Managed Paths
    • Web Application Proxy (old ADFS Proxy)
    • SQL Sys Admin
  1. AD 2012 and AGPM (Senior Administrator)3. SAN storage and SAN Switches (System administrator)
  2. Network Administrator (at least CCNA certification or 2 years' experience)
  3. Servers and DataCenter Hardware

Optional requirements

  1. NetBackup 7.6.1 or higher ( Expert Level / Senior administrator)
  2. vSphere 5.5 Administration
  3. Windows 2003 and higher Administration
  4. Exchange 2007 and higher Administration
  5. Systems and infrastructure monitoring and troubleshooting
  6. SharePoint Administration (good to have)
  7. Disaster recovery
  8. Documentation
  9. Sophos Antivirus
  10. HP SIM
  11. WSUS
  12. GPOs

The following applies to all vacancies:

The candidate also should have general abilities such as writing of documentation.

The candidate should also be able to speak and write in English

Any other experience needed to perform all the activities

NATO security clearance required for the permanent contract, we will perform the application together with the candidate. If this is already existing it would be an advantage.

Eurofighter production countries nationality (UK, SP, IT, GE) as a requirement

Other soft skills:

teamplayer, friendly, punctual, reliable

 

Certificate Management SOAP and REST API free configurable

Certificate Management SOAP and REST API free configurable

Free configurable and programmable Soap and Rest API support with PCert is ready.

All Customers and Partners are now able to customize their Interfacing within the Software.

All Interfaces are now open sourced (only for the licensee) for individualization, audit and verification trails.

First Interfaces will be to major CA providers for fully automated multi CA, multi domain, multi vendor certificate exchange and code signing. All managed by company policies.

Other API's to PIM systems and HSM.

Next iteration is REST Server API to finish full integrations into partner tools, beta is promising.

 

18 - IT Trust questions

18 - IT Trust questions

How does your IT-Trust landscape look like now?

  • Are we facing with unmanaged risks?
  • Are all our web server certificates up to date and valid?
  • Are all our communication certificates up to date and valid?
  • Are all our code signing certificates up to date and valid?
  • Which one will retire when?
  • Do we have enough time for exchange?
  • Which certificates are weak and need to be renewed?
  • Are all SIEM and APT systems synchronized with our valid trust landscape?
  • I will like to exchange all Apache certificates which expires in the net 30 days tomorrow. How many systems are affected?
  • I would like to remove a specific country from my trusted list, how many programs and computers are affected?
  • Which risks does my Operating systems contain?
  • Which risks does my partner/supplier landscape contain?
  • Do we have unknown software on our computers?
  • How many certificates do we have in total?
  • How do we mange this, manually or automated?
  • Are we prepared for IOT and Industry 4.0? Which steps are missing?
  • Are we using the optimal infrastructure and devices?
  • How secure is our network and our company?

How long do you need to answer all these questions?

 

Answers by your IT-responsible or with Dashboards by www.certnkey.com

 

CAVT product page online with demo video

CAVT product page online with demo video

Complex Algorithmic Vision Technologies (CAVT)

Data-Warehouse GmbH has launched its latest product portfolio for complex video analysis.

 

You can find the new page here:Complex Algorithmic Vision Technologies (CAVT)

PCert Version 3 Alpha available for download to our partners

PCert Version 3 Alpha available for download to our partners

Our brand new version of PCert for Pinning Cryptografic Elements and Remidiate Technology is advancing into a major release. With a fresher GUI and a bunch of new functionalities like:

- Automated forwarding of scanning results via REST to other services.
- Export scans to XML.
- Meshing of remote agents to simplify rollout with only one deployable.
- Online analysis of all rolled out agents.
- Policies enhancement for more automation with fewer clicks.
- enhanced subnet scanning without agents
- more results within less time (up to 3 times faster scans)
- SaaS Version with multitenant management

and several more fantastic features. 

Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cyber security"

Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cyber security"

Registration and information at: https://cybersicherheitsrat.de/2020/06/18/webinar-zertifikate-und-schlussel-im-kontext-der-cybersicherheit/

What is the status of your certificates and keys in your area of responsibility? Do you still have them all under control?

What legal/compliance requirements do you have to meet?
What is the status of your networks? What is the status of your servers and devices?
What is the status of your delivered products? Do you deliver vulnerabilities?

Do you have a complete overview?
Can you prove it?

Now that the IT-SA has been canceled, I am presenting our latest innovation for the first time, which will be important for corporations and large environments. This functionality provides the basis for a large number of new security functions that we will gradually introduce. In this way, we are creating additional options and flexibility for companies and reducing their complexity to a minimum. Keys and certificates as the basis of cyber security are just the beginning of the journey.

Cybersecurity, Made in Germany.

 

Certificates and keys form the basis of almost every security product or security strategy. Nevertheless, they often lead a shadowy existence in the context of cyber security and are considered a special topic for nerds. In practice, however, services unfortunately fail far too often because of certificates, even though these areas are supposedly managed (ISO 27001, SOX, GDPR, NATO RM, etc.). Faulty certificates can also be used to break into systems, encrypt data, intercept communications, exploit state privileges for espionage and deliver insecure or non-compliant products.

Accordingly, the strategic consideration of computer certificates and keys represents a major challenge for decision-makers and IT experts. However, the management methods used to date have been unstructured and based on manual handling and reactive management. Newer services in established structures make the task even more difficult. In view of this challenge and the clearly quantifiable costs arising from incorrect or mismanaged certificates, automated and depersonalized management methods can clearly provide a remedy here and lead to cost savings with increased security gains for companies.

In this joint webinar by the Cyber Security Council Germany and its member Data Warehouse, you will therefore receive an overview of the basics of cyber-secure, trustworthy and automated certificate management. Using examples, you will learn more about the impact on cyber security and gain the necessary overview for individual decision-making. Practical examples and current contexts will be demonstrated live. A special focus will also be placed on computer certificates, which have received little attention to date and act as abasis for trust and authorizations. Although these certificates are present in large numbers in every computer (client, server, devices) and form the basis for the encryption of devices and communication between participants, these trust relationships have not been managed to date and represent a major security risk for companies.

Postponed: X.509 workshop for decision-makers

Postponed: X.509 workshop for decision-makers

The workshop "IT transformation: minimizing cyber risks through key management" on 10.05.2019 is aimed at decision-makers. The aim is to convey the basics and provide support for strategic decisions regarding information security in the areas of communication, digitalization and IoT.

The workshop "IT transformation: minimizing cyber risks through key management" is aimed at decision-makers. The aim is to convey the basics and provide support for strategic decisions relating to information security in the areas of communication, digitalization and IoT.

Topics of the workshop:

  • Is IT transformation (IoT, Industry 4.0) sensible or even possible without an IT trust?
  • Why is digital key management just as important as real user access?
  • Risks for or in your company
  • How can I treat them? What is the state of the art?
  • What requirements for my company arise from GDPR, MaRisk, SOX, ISO 27001?
  • How can I prove compliance or minimize liability risks?
  • Which decisions are necessary, which are optional and with what consequences?

The 4-hour workshop in Munich (Ottobrunn) deals with these questions, with which decision-makers and managers can carry out their individual risk/opportunity assessment and become capable of making decisions together with the technical team.

Date

TBA

Venue

Data-Warehouse GmbH
Beethovenstr. 35
85521 Ottobrunn