My blog has moved and can now be found at

No action is needed on your part if you are already subscribed to this blog via e-mail or its syndication feed.

Sunday, April 6, 2008
« New Information Sharing Strategy for the... | Main | National response to hazards and Identit... »

I typically don't do this, but this particular job opening in my organization is for someone that I will be directly working with.  As such, it is in my best interest to make sure that the opening gets socialized to folks in the right communities so that I can continue to work with folks who are a whole lot smarter and more knowledgeable than I am :-)

So if you have a knowledge base that spans identity, security and privacy technologies, would like a job that has a direct impact on and enhances of the security of the nation, and would like to work in an environment that values your individual contributions to a kick-ass team, we are hiring! 

Here are some of what I consider to be the relevant details of the job opening. The full description of the job, as well as how to apply for it, can be found on the official job requisition.

The ideal candidate will have a knowledge base that spans identity, security and privacy technologies as well as the ability to bridge the software development and computing infrastructure domains.


  • Provide subject matter expertise in implementing identity and access control solutions in support of a variety of sponsors in the Government and Intelligence Communities. [...]
  • Maintain current knowledge of identity technologies in the commercial marketplace with an eye towards how it could be applied to sponsor needs. Expectation is that the candidate actively participates in the technical community [...]
  • Actively work to share knowledge and experience gained in external community participation and project work via participation in internal Communities of Practice, online forums [...]
  • Participate in standards organizations such as OASIS, W3C and others on behalf of JHU/APL in the creation and modification of standards [...]


  • Self-motivated to learn and apply technology to solve problems
  • Ability to “Argue like you are right, Listen like you are wrong”
  • Self-starter who proactively searches for and obtains potential solutions to problems
  • Demonstrated experience with the implementation of identity solutions which may include:
    • Application of relevant standards such as SAML, XACML, WS-SX, etc.
    • Implementation and/or administration of directory services (LDAP etc) and/or Virtual Directory Capabilities,
    • Implementation and/or administration of PKI,
    • Implementation and/or administration of Web Access Management solutions
  • Full lifecycle implementation experience as related to an Identity Management Project


  • Demonstrated experience in one or more of the relevant areas of Identity, Security, and Privacy with an interest in focusing on the Identity Management area.
  • At least 5 years of increasingly complex software development with one or more of the major software platforms (i.e. .NET and/or JEE) and/or infrastructure experience with one or more major operating systems (i.e., *nix, Windows) in an Enterprise class environment
  • Awareness of the fundamental principles of Service Oriented Architecture
  • Must be eligible for US Department of Defense (DoD) clearance requiring background investigation and/or polygraph examination.  [Please be aware that holding a U.S. Citizenship is part of the requirement for obtaining a security clearance]
  • [...]

If you are interested, apply via the official job site, but in addition, drop me a note that you have applied with your attached resume to my work e-mail (anil dot john -at- jhuapl dot edu), so that I can have it flagged internally and properly routed.

If you would simply like to find out more about the job, the work environment etc, or would like any clarifications before you take action, please feel free to contact me.  Needless to say, if you know of someone else who would be interested, please pass the details on to them. tags: ,

Technorati tags: ,
Tags:: Musings
4/6/2008 3:08 PM Eastern Daylight Time  |  Comments [0]  |  Disclaimer  |  Permalink   
Comments are closed.