Logo
Novalink Solutions

Developer/Programmer Analyst 3

Novalink Solutions, Austin, Texas, us, 78716


Job DescriptionJob Description

Plans, develops, tests, and documents computer programs, applying knowledge of programming techniques and computer systems. Evaluates user request for new or modified program, such as for financial or human resource management systems, clinical research trial results, statistical study of traffic patterns, or analyzing and developing specifications for bridge design, to determine feasibility, cost and time required, compatibility with current system, and computer capabilities. Consults with user to identify current operating procedures and clarify program objectives. Formulates plan outlining steps required to develop program, using methodologies such as structured analysis and design or object-oriented development.

Additional job details and special considerations

1193591 - FY24/25 AES TIERS Cloud Migration

Identity Access Management and LDAP Administrator. The Identity and Access Management (IAM) programmer reports to the IT DCS&O Manager of TIERS Operations. Performs advanced and/or managerial (senior-level) computer systems analysis work. Work involves coordinating the planning, budgeting, and analysis of user requirements, procedures, and problems to automate processing or to improve existing systems. Work with business partners and management to automate processing or to improve existing systems. Implement the management and automation of processing or improvement of existing systems. May plan, assign, and/or manage the work of others. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment. Performing business use case analysis, products/tools integration analysis and recommend solutions with Okta. Performing hands-on technical design, configuration, development, integrations and troubleshooting of IAM/Okta solution. Automating Okta solution deployments to help deliver high-quality software. Implementation of automating user onboarding and offboarding with seamless communication between directories and on-prem/cloud applications. Excellent analytical and troubleshooting skills to identify, track, and resolve technical skills. Documenting data flow and deployment architecture diagrams that include various Okta integrations. Working closely with different teams including technical and non-technical. Lead and ensure HHSC best practices and methodologies are applied to the design, deployment, and operations. Provide technical oversight, review, and quality control throughout the life cycle of the implementation.

Requirements

CANDIDATE SKILLS AND QUALIFICATIONS

Minimum Requirements:

Candidates that do not meet or exceed the

minimum

stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

YearsRequired/PreferredExperience8RequiredExperience with Identity and Access Management tools, processes, and support and the ability to provide leadership to technical and project teams8RequiredExperience with IBM Security Identity Manager (ITIM/ISIM), IBM Security Access Manager (TAM/ISAM) or like IAM software8RequiredMust have analytical and organizational skills and the ability to gather, assemble, correlate, and analyze facts, and propose solutions to problems.8RequiredExperience with 24x7 Oncall rotation.8RequiredKnowledge of Identity and Access Management and LDAP best practices.8RequiredExperience in designing, configuring and implementing Okta solution.8RequiredExperience with authentication methods such as SAML, OAuth and OIDC.8RequiredExperience with onboarding applications into Okta.8RequiredExperience in implementation of user life cycle management with Okta including bulk loads.8RequiredExperience in authentication, authorization and securing access for applications, devices and users.8RequiredExperience in integrating applications using Okta Gateway.8RequiredExperience in migrating users between directories.8RequiredExperience in implementing Okta integrations involving multi-tenant environments.8RequiredExperience in implementing automation for Okta solution using Jenkins and/or other related technologies.8RequiredExperience in implementation of cloud-based solutions, leveraging AWS and demonstrate expertise in authentication and authorization using Okta, SailPoint and/or similar technologies.8PreferredFederated Identity Manager (TFIM/IFIM), Single Sign On (ESSO), Tivoli Directory Integrator (TDI) or like software products8PreferredSkills in written and oral communication, including the ability to make public presentations, write technical information in an understandable format, and produce reports.8PreferredExperience with either RSA IAM, Oracle IdM, DatapoJava, JavaScript, or WebSphere (6.0 - 8.x), and strong technical knowledge of various LDAP repositories such as AD, eDirectory and IBM Security Directory Server (TDS / ISDS)8PreferredSkill in project management, managing projects and able to establish project goals and objectives8PreferredStrong skills in analyzing and evaluating complex federal and state legislation, program, policy, and operations issues as they relate to IAM projects.8PreferredExperience in technologies such as Java, Java Script, HTML, JASON, Python, SQL, Linux8PreferredExperience in integration of Okta with Single Page Applications (Angular, ReactJS or other similar frameworks/libraries) using JWT, OAuth, and other related technologies / standards8PreferredExperience in Websphere or JBoss or similar J2EE application server's configuration to enable robust authorization using Okta and SailPoint.8PreferredPrior experience in IBM Datapower, IBM Security Identity Manager, Security Access Manager, Security Directory Integrator, ITIM Adapters, IBM Security Directory Server.8PreferredFamiliarity with LDAP browsers - LBE, Softerra LDAP Browser, Apache Directory Studio and/or similar tools.8PreferredHands-on experience with Agile Development Methodologies (preferably Scrum).8PreferredHands-on experience with CI/CD methodologies and containerized application deployments.8PreferredSecurity certifications.