Strong understanding of Identity Management technologies, including access control and account
Strong understanding of access policies, enterprise-wide policy enforcements
Expertise in at least one suite of identity tools (Oracle, CA, IBM TIM/TAM)
General understanding of application security requirements both from enterprise and cloud perspectives.
Basic understanding of technologies used for data mining and report generators