Company Description
At Arbeit Group, we are dedicated to delivering client-centric and reliable solutions that drive success across IT, telecom, and staffing. With a strong foundation in Malaysia and an expanding presence throughout the APAC region, we serve key industries including Telecom, IT, Automotive, and BFSI, bringing expertise and strategic insights that our clients trust. Our tailored, end-to-end services encompass IT infrastructure, digital transformation, system integration, cloud and telecom security, and IoT solutions. Built on principles of integrity, agility, and excellence, Arbeit Group stands as a dependable partner in digital transformation.
Role Description
This is a full-time, on-site role for an Oracle Golden Gate (OGG) position located in Jakarta, Indonesia. The Oracle Golden Gate specialist will be responsible for implementing and managing OGG solutions, ensuring seamless data replication, integration between various Oracle Applications, and working collaboratively with team members to support business processes and consulting engagements. Daily tasks will include configuring OGG, monitoring data flows, troubleshooting issues, and optimizing performance for client environments.
Qualifications
- Proficient in Oracle Database versions
11g, 12c, 19c
, or higher. - Experienced in
installation, configuration, patching, and upgrading
Oracle Databases. - Skilled in performing
backup and recovery
operations using
RMAN
. - Strong understanding of
performance tuning
(SQL tuning, database tuning, AWR, ASH, ADDM). - Proficient in managing
Oracle Data Guard
(both physical and logical standby). - Hands-on experience in
implementing and administering Oracle GoldenGate (OGG)
, including: - • Configuration of capture and replication processes.
- • Setup of extract, pump, and replicat components.
- • Troubleshooting latency and OGG errors.
- • Performing
zero-downtime database migration
using OGG. - Familiar with
High Availability (HA)
and
Disaster Recovery (DR)
concepts. - Understanding of
database security principles
, including user privileges, auditing, and encryption.