Logo
Novalink Solutions

Identity Access Management and LDAP Administrator

Novalink Solutions, Austin, Texas, us, 78716


Job Description Job Description

Plans, develops, tests, and documents computer programs, applying knowledge of programming techniques and computer systems. Evaluates user request for new or modified program, such as for financial or human resource management systems, clinical research trial results, statistical study of traffic patterns, or analyzing and developing specifications for bridge design, to determine feasibility, cost and time required, compatibility with current system, and computer capabilities. Consults with user to identify current operating procedures and clarify program objectives. Formulates plan outlining steps required to develop program, using methodologies such as structured analysis and design or object-oriented development.

Additional job details and special considerations

1193591 - FY24/25 AES TIERS Cloud Migration

Identity Access Management and LDAP Administrator. The Identity and Access Management (IAM) programmer reports to the IT DCS&O Manager of TIERS Operations. Performs advanced and/or managerial (senior-level) computer systems analysis work. Work involves coordinating the planning, budgeting, and analysis of user requirements, procedures, and problems to automate processing or to improve existing systems. Work with business partners and management to automate processing or to improve existing systems. Implement the management and automation of processing or improvement of existing systems. May plan, assign, and/or manage the work of others. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment. Performing business use case analysis, products/tools integration analysis and recommend solutions with Okta. Performing hands-on technical design, configuration, development, integrations and troubleshooting of IAM/Okta solution. Automating Okta solution deployments to help deliver high-quality software. Implementation of automating user onboarding and offboarding with seamless communication between directories and on-prem/cloud applications. Excellent analytical and troubleshooting skills to identify, track, and resolve technical skills. Documenting data flow and deployment architecture diagrams that include various Okta integrations. Working closely with different teams including technical and non-technical. Lead and ensure HHSC best practices and methodologies are applied to the design, deployment, and operations. Provide technical oversight, review, and quality control throughout the life cycle of the implementation.

Requirements

CANDIDATE SKILLS AND QUALIFICATIONS

Minimum Requirements:

Candidates that do not meet or exceed the

minimum

stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

Years Required/Preferred Experience 8 Required Experience with Identity and Access Management tools, processes, and support and the ability to provide leadership to technical and project teams 8 Required Experience with IBM Security Identity Manager (ITIM/ISIM), IBM Security Access Manager (TAM/ISAM) or like IAM software 8 Required Must have analytical and organizational skills and the ability to gather, assemble, correlate, and analyze facts, and propose solutions to problems. 8 Required Experience with 24x7 Oncall rotation. 8 Required Knowledge of Identity and Access Management and LDAP best practices. 8 Required Experience in designing, configuring and implementing Okta solution. 8 Required Experience with authentication methods such as SAML, OAuth and OIDC. 8 Required Experience with onboarding applications into Okta. 8 Required Experience in implementation of user life cycle management with Okta including bulk loads. 8 Required Experience in authentication, authorization and securing access for applications, devices and users. 8 Required Experience in integrating applications using Okta Gateway. 8 Required Experience in migrating users between directories. 8 Required Experience in implementing Okta integrations involving multi-tenant environments. 8 Required Experience in implementing automation for Okta solution using Jenkins and/or other related technologies. 8 Required Experience in implementation of cloud-based solutions, leveraging AWS and demonstrate expertise in authentication and authorization using Okta, SailPoint and/or similar technologies. 8 Preferred Federated Identity Manager (TFIM/IFIM), Single Sign On (ESSO), Tivoli Directory Integrator (TDI) or like software products 8 Preferred Skills in written and oral communication, including the ability to make public presentations, write technical information in an understandable format, and produce reports. 8 Preferred Experience with either RSA IAM, Oracle IdM, DatapoJava, JavaScript, or WebSphere (6.0 - 8.x), and strong technical knowledge of various LDAP repositories such as AD, eDirectory and IBM Security Directory Server (TDS / ISDS) 8 Preferred Skill in project management, managing projects and able to establish project goals and objectives 8 Preferred Strong skills in analyzing and evaluating complex federal and state legislation, program, policy, and operations issues as they relate to IAM projects. 8 Preferred Experience in technologies such as Java, Java Script, HTML, JASON, Python, SQL, Linux 8 Preferred Experience in integration of Okta with Single Page Applications (Angular, ReactJS or other similar frameworks/libraries) using JWT, OAuth, and other related technologies / standards 8 Preferred Experience in Websphere or JBoss or similar J2EE application server's configuration to enable robust authorization using Okta and SailPoint. 8 Preferred Prior experience in IBM Datapower, IBM Security Identity Manager, Security Access Manager, Security Directory Integrator, ITIM Adapters, IBM Security Directory Server. 8 Preferred Familiarity with LDAP browsers - LBE, Softerra LDAP Browser, Apache Directory Studio and/or similar tools. 8 Preferred Hands-on experience with Agile Development Methodologies (preferably Scrum). 8 Preferred Hands-on experience with CI/CD methodologies and containerized application deployments. 8 Preferred Security certifications.