DWH is searching for Oracle Fusion Middleware Experts and Senior Microsoft Server Administrators

DWH is searching for Oracle Fusion Middleware Experts and Senior Microsoft Server Administrators

We are looking for English (+German (Italian, Spanish) as an advantage) speaking Oracle Fusion Middleware and Microsoft Sharepoint Administrators for permanent employment (not freelance!!!!) to start immediately (as soon as possible) in the north of Munich (near the airport) to work in a highly dynamic and highly secure environment.

Existing and valid security clearances (please specify when applying) and nationality of a Eurofighter production country would be a prerequisite, as required by the customer. Please send us the nationality(ies) you hold with your application.

 

For the position Oracle Fusion Middleware Administration, your duties will include:

Troubleshooting, Upgrading and patching abilities at the infrastructure level in the following products:

Oracle Weblogic Server, Oracle Webcenter Portal, Oracle Webcenter Content (UCM - Universal Content Management), Oracle Business Process Management, Oracle Business Intelligence Enterprise Edition, Oracle SOA Suite (Service Oriented Architecture), Oracle HTTP server, Oracle Access manager, Oracle Webgates, Oracle Security Service (SSL/Network), Oracle Internet Directory, Oracle Identity Manager, Oracle Business Intelligence BI Publisher

In addition, the ability to perform a level of troubleshooting of the various applications that are installed in the OFM.

The ability to install and upgrade the applications into the various OFM products (with instructions).

Manage privileges within IDM (enterprise role creation and granting and revoking). More in-depth knowledge of IDM would be nice to have.

General knowledge of the whole OFM architecture to understand how the various products are connected.

General knowledge of Oracle databases in order to understand, troubleshoot and configure the connection with OFM.

Ability to do WLST scripting and shell scripting (e.g. for the start and stop processes).

Java knowledge (for performance and tuning requirements).

Logging and managing SRs with Oracle support.

It would be useful if the candidate had the Oracle Certified Associate, Oracle WebLogic Server 12c Administrator certification (if they do not they should be prepared to work towards it here).

The OFM team have the ability to perform all of the tasks outlined in this knowledge and experience section. They also have the ability to perform these tasks on a Solaris platform (as well as Linux and Windows).

Windows Sharepoint administration tasks include, but are not limited to:

 

Senior Windows System Adminstrator with following optional knowledge:

optional

  1. SharePoint 2013 and SQL Databases
    • Design, implementation and maintenance of SharePoint 2013/16 Farms
    • Maintenance of Site Collection with isolated databases.
    • User Profile Service Application for synchronisations.
    • Web Applications and Managed Paths
    • Web Application Proxy (old ADFS Proxy)
    • SQL Sys Admin
  1. AD 2012 and AGPM (Senior Administrator)3. SAN storage and SAN Switches (System administrator)
  2. Network Administrator (at least CCNA certification or 2 years' experience)
  3. Servers and DataCenter Hardware

Optional requirements

  1. NetBackup 7.6.1 or higher ( Expert Level / Senior administrator)
  2. vSphere 5.5 Administration
  3. Windows 2003 and higher Administration
  4. Exchange 2007 and higher Administration
  5. Systems and infrastructure monitoring and troubleshooting
  6. SharePoint Administration (good to have)
  7. Disaster recovery
  8. Documentation
  9. Sophos Antivirus
  10. HP SIM
  11. WSUS
  12. GPOs

The following applies to all positions to be filled:

The candidate also should have general abilities such as writing of documentation.

The candidate should also be able to speak and write in English

Any other experience needed to perform all the activities

NATO security clearance required for the permanent contract, we will perform the application together with the candidate. If this is already existing it would be an advantage.

Eurofighter production countries nationality (UK, SP, IT, GE) as a requirement

Other soft skills:

teamplayer, friendly, punctual, reliable

 

Certificate Management SOAP and REST API free configurable

Certificate Management SOAP and REST API free configurable

Free configurable and programmable Soap and Rest API support with PCert is ready.

All Customers and Partners are now able to customize their Interfacing within the Software.

All interfaces are now open sourced (only for the licensee) for individualisation, audit and verification trails.

First interfaces will be to major CA providers for fully automated multi CA, multi domain, multi vendor certificate exchange and code signing. All managed by company policies.

Other API's to PIM systems and HSM.

Next iteration is REST Server API to finish full integrations into partner tools, beta is promising...

 

18 - IT Trust questions

18 - IT Trust questions

How does your IT Trust landscape look like now?

  • Are we facing unmanaged risks?
  • Are all our web server certificates up to date and valid?
  • Are all our communication certificates up to date and valid?
  • Are all our code signing certificates up to date and valid?
  • Which one will retire when?
  • Do we have enough time for exchange?
  • Which certificates are weak and need to be renewed?
  • Are all SIEM and APT systems synchronised with our valid trust landscape?
  • I will like to exchange all Apache certificates which expires in the net 30 days tomorrow. How many systems are affected?
  • I would like to remove a specific country from my trusted list, how many programs and computers are affected?
  • Which risks does my Operating systems contain?
  • Which risks does my partner/supplier landscape contain?
  • Do we have unknown software on our computers?
  • How many certificates do we have in total?
  • How do we mange this, manually or automated?
  • Are we prepared for IOT and Industry 4.0? Which steps are missing?
  • Are we using the optimal infrastructure and devices?
  • How secure is our network and our company?

How long do you need to answer all these questions?

 

Answers by your IT-responsible or with Dashboards by www.certnkey.com

 

CAVT product page online with demo video

CAVT product page online with demo video

Complex Algorithmic Vision Technologies (CAVT)

Data-Warehouse GmbH has put the latest product portfolio for complex video analyses online.

 

The new page can be found here:Complex Algorithmic Vision Technologies (CAVT)

PCert Version 3 Alpha available for download to our partners

PCert Version 3 Alpha available for download to our partners

Our brand new version of PCert for Pinning Cryptografic Elements and Remidiate Technology is advancing into a major release. With a fresher GUI and a bunch of new functionalities like:

- Automated forwarding of scanning results via REST to other services.
- Export scans to XML.
- Meshing of remote agents to simplify rollout with only one deployable.
- Online analysis of all rolled out agents.
- Policies enhancement for more automation with fewer clicks.
- enhanced subnet scanning without agents
- more results within less time (up to 3 times faster scans)
- SaaS version with multitenant management

and several more fantastic features. 

Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cybersecurity".

Webinar 30.6.2020, 11:00 "Certificates and keys in the context of cybersecurity".

Registration and information at: https://cybersicherheitsrat.de/2020/06/18/webinar-zertifikate-und-schlussel-im-kontext-der-cybersicherheit/

How are you doing with your certificates and keys in your area of responsibility? Do you still have them all under control?

What legal/compliance requirements do you have to meet?
What is the status of your networks? What is the status of your servers, devices?
What is the status of your delivered products? Do you deliver vulnerabilities?

Do you have a complete overview?
Can you prove it?

Now that the IT-SA has been cancelled, I am presenting our latest innovation here for the first time, which is becoming important for corporations and large environments. This functionality provides the basis for a variety of new security features that we will gradually introduce. In this way, we create additional possibilities and flexibility for companies and reduce their complexity to a minimum. Keys and certificates, as the basis of cybersecurity, are only the beginning of the journey.

Cybersecurity, Made in Germany.

 

Certificates and keys form the basis of almost every security product or security strategy. Nevertheless, they often lead a shadowy existence in the context of cyber security and are considered a special topic for nerds. In practice, however, services unfortunately fail far too often because of certificates, although these areas are supposedly managed (ISO 27001, SOX, DSGVO, NATO RM, etc.). Faulty certificates can also cause systems to be broken into, data to be encrypted, communications to be intercepted, states to exploit privileges for espionage and insecure or non-compliant products to be delivered.

Accordingly, the strategic consideration of computer certificates and keys is a major challenge for decision-makers and IT experts. However, the management methods used in this regard have so far been unstructured and based on manual handling and reactive management. Newer services in grown structures make the task even more difficult. In view of this challenge and the clearly quantifiable costs arising from faulty or incorrectly managed certificates, automated and depersonalised management methods can clearly provide a remedy here and lead to cost savings with an increased security gain for companies.

In this joint webinar of the Cyber Security Council Germany e.V. and its member Data-Warehouse, you will therefore get an overview of the basics of cyber-secure, trusted and automated certificate management. With the help of examples, you will learn more about the impact on cyber security and get the necessary overview for individual decision-making. Practical examples and current contexts will be demonstrated live. A special focus will also be placed on computer certificates, which have received little attention so far and which act as abasis for trust and authorisation. Although these certificates are present in large numbers in every computer (client, server, devices) and form the basis for encryption of devices and communication between participants, these trust relationships have not been managed so far and represent a major security risk for companies.

Postponed: X.509 Workshop for Decision Makers

Postponed: X.509 Workshop for Decision Makers

The workshop "IT Transformation: Minimising Cyber Risks through Key Management" on 10 May 2019 is aimed at decision-makers. The aim is to convey the basics and provide assistance for strategic decisions around information security in the areas of communication, digitalisation and IoT.

The workshop "IT Transformation: Minimising Cyber Risks through Key Management" is aimed at decision-makers. The aim is to convey the basics and provide assistance for strategic decisions around information security in the areas of communication, digitalisation and IoT.

Topics of the workshop:

  • Is IT transformation (IoT, Industry 4.0) sensible or even possible without IT trust?
  • Why is digital key management as important as real user access?
  • Risks for or in your company
  • How can I treat them? What is the state of the art?
  • What requirements does DSGVO, MaRisk, SOX, ISO 27001 impose on my company?
  • How can I prove compliance or minimise liability risks?
  • Which decisions are necessary, which are optional and with which consequences?

The 4-hour workshop in Munich (Ottobrunn) addresses these questions, which decision-makers and responsible persons can use to carry out their individual risk/opportunity assessment and become capable of making decisions together with the technical team.

Appointment

TBA

Venue

Data-Warehouse GmbH
Beethovenstr. 35
85521 Ottobrunn