Mediabistro logo
job logo

Oracle Cloud Specialist

3B Staffing LLC, Chicago, IL, United States


Title: Oracle Cloud Specialist

Description:

Role Overview

The specialist will be responsible for designing, implementing, and supporting a secure connection between Oracle Cloud (OCI) and Microsoft Azure, the client's main cloud environment.

1. Design of the VPN and Network Architecture

The provider must deliver a complete technical design including:
• Network topology between Azure and OCI.
• Selection of technology: IPSec VPN (site-to-site), or FastConnect + Azure ExpressRoute if required.
• IP addressing plan, subnets, routing tables, network segmentation, and CIDR coordination with MN8.
• Redundancy and high-availability design (dual tunnels, secondary regions if required).
• Encryption standards (IPSec, IKEv2, encryption ciphers).
• Firewall and security rules (OCI security lists, Azure NSGs, route tables).
• DNS resolution between environments if required for Oracle ERP and related services.
• Documentation of architecture, configuration diagrams, and implementation plan.

2. Installation and Configuration

The provider must perform all tasks to build and activate the connection:
• Create and configure VPN gateways in Azure and Oracle Cloud Infrastructure.
• Configure IPSec tunnels on both sides (pre-shared keys, IKE policies, BGP if applicable).
• Configure routing between Azure VNets and OCI VCNs.
• Validate connectivity (ping, traceroute, application-level tests to Oracle ERP endpoints).
• Implement firewall rules and security policies end-to-end.
• Ensure redundancy (active/standby tunnels or active/active if supported).
• Deliver full technical documentation and handover.

3. Operation and Support of the VPN

The provider will manage and support the VPN connection on an ongoing basis:
• 24/7 monitoring of tunnel availability, latency, packet loss and throughput.
• Incident response: maximum 1-hour initial response time, 8-hour resolution target.
• Proactive alerts and corrective actions when connectivity degrades or fails.
• Renewal and management of keys, certificates, or credentials used for encryption.