IBM
Software Engineering Software Developer Gandhinagar, IN
IBM, Indiana, Pennsylvania, us, 15705
Introduction
At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, let's talk.
Your Role and Responsibilities
IBM Security Verify Adapters are the systems integration “glue” that link the Verify server products, such as IBM Security Verify Governance Identity Manager and IBM Security Verify Governance, to the customer’s enterprise systems. Adapters enforce identity security policies on the customer’s servers and applications. As the developer for the z/OS edition adapters, you are responsible for implementing enhancements to as well as maintaining the code for the ACF2, Top Secret, RACF and zSecure RACF adapters. You will be part of our larger ISVG adapters development team based in the Gandhinagar, Gujarat location and participate in all aspects of adapter development and customer support as well as the maintenance of our DTAP environment.You are responsible for performing the basic operations on an IBM Z: defining and submitting jobs, navigating ISPF, creating and running Rexx Execs as well as navigating the z/OS UNIX System Services command line to edit files and scripts. These skills allow you to operate the adapters as well as find the relevant information in the z/OS and UNIX logs to diagnose any issue that gets reported by our customers. You are also familiar with the process of defining and creating users, groups and resource permissions in at least one of the following security systems: RACF, zSecure, ACF2 or Top Secret.
Required Technical and Professional Expertise
The ideal candidate is a self-motivated individual with:Minimum of 3 years of experience as a C programmer and preferably some experience with assembler.Experience with the Agile methodology and CI/CD.Familiarity with performing the basic operations on an IBM Z system and UNIX services.Familiarity with security systems like RACF, zSecure, ACF2 or Top Secret.Prior experience with IBM Z: TSO, JCL, ISPF, OMVS, Rexx, Callable Services.
Preferred Technical and Professional Expertise
The candidate is preferred to have:Some prior experience with Agile, GitHub, Tekton, Docker.Some experience with the other security systems and z Linux.Some experience working with callable services.Some experience with (debugging) APPC.
#J-18808-Ljbffr
At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, let's talk.
Your Role and Responsibilities
IBM Security Verify Adapters are the systems integration “glue” that link the Verify server products, such as IBM Security Verify Governance Identity Manager and IBM Security Verify Governance, to the customer’s enterprise systems. Adapters enforce identity security policies on the customer’s servers and applications. As the developer for the z/OS edition adapters, you are responsible for implementing enhancements to as well as maintaining the code for the ACF2, Top Secret, RACF and zSecure RACF adapters. You will be part of our larger ISVG adapters development team based in the Gandhinagar, Gujarat location and participate in all aspects of adapter development and customer support as well as the maintenance of our DTAP environment.You are responsible for performing the basic operations on an IBM Z: defining and submitting jobs, navigating ISPF, creating and running Rexx Execs as well as navigating the z/OS UNIX System Services command line to edit files and scripts. These skills allow you to operate the adapters as well as find the relevant information in the z/OS and UNIX logs to diagnose any issue that gets reported by our customers. You are also familiar with the process of defining and creating users, groups and resource permissions in at least one of the following security systems: RACF, zSecure, ACF2 or Top Secret.
Required Technical and Professional Expertise
The ideal candidate is a self-motivated individual with:Minimum of 3 years of experience as a C programmer and preferably some experience with assembler.Experience with the Agile methodology and CI/CD.Familiarity with performing the basic operations on an IBM Z system and UNIX services.Familiarity with security systems like RACF, zSecure, ACF2 or Top Secret.Prior experience with IBM Z: TSO, JCL, ISPF, OMVS, Rexx, Callable Services.
Preferred Technical and Professional Expertise
The candidate is preferred to have:Some prior experience with Agile, GitHub, Tekton, Docker.Some experience with the other security systems and z Linux.Some experience working with callable services.Some experience with (debugging) APPC.
#J-18808-Ljbffr