Enterprise Architect 3
: Job Details :


Enterprise Architect 3

My3Tech

Location: Austin,TX, USA

Date: 2024-12-21T05:12:20Z

Job Description:

Hello All,

I hope you are doing well.

Role: Enterprise Architect 3

Location: Texas (Remote)

Type: C2C/W2

Duration: 6+ months

Client: State of Texas

Position will be remote. Program will only accept LOCAL ONLY candidates for this position.

C) Any and all travel, per diem, parking, and/or living expenses shall be at the worker's and/or Vendor's expense.

D) The worker may be required to work remotely at HHSC discretion, up to 100 percent of the time.

E) The worker may be required to work outside the normal business hours on weekends, evenings and holidays, as requested. Payment for work over 40 hours will be at the hourly rate quoted and must be coordinated and pre-approved through the Agency.

RESPONSE DEADLINE

Vendor shall respond in accordance with Customer specifications, with proposed candidate resumes and the response must be received by 12/21/2024 @ 5:00 PM (CT).

Texas Health and Human Services Commission requires the services of 1 Enterprise Architect 3, hereafter referred to as Candidate(s), who meets the general qualifications of Enterprise Architect 3, Applications/Software Development and the specifications outlined in this document for the Texas Health and Human Services Commission.

All work products resulting from the project shall be considered works made for hire and are the property of the Texas Health and Human Services Commission and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Texas Health and Human Services Commission will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).

Responsible for translating the client's business requirements into specific systems, applications or process designs with interlocked financial modeling for very large complex technical solutions. Analyzes customer service requirements and designs service solutions to meet those objectives. Primary expert to construct the specific solution, scope document, risk profile, and corresponding financials. Maintains and utilizes detailed industry and internal services knowledge in the construction of industry-leading services solutions, including expert working level knowledge of the processes, technologies, and people components involved in the services arena. Uses expertise to construct specific and detailed solutions that encompass process, technology, and staffing plans for customer sales opportunities. Constructs risk assessments and corresponding remediation plans relative to complex services proposals. Participates in the construction of detailed financial models that align with complex services proposals. Composes Statement of Work or other documents, using departmental automation tools as available, to craft detailed and accurate deliverables that specify processes, technology, staffing, and project management involved in proposed services solutions. As needed, provide a trusted expert advisor role as a Subject Matter Expert for technical services, to both internal and external customers, ranging from formal advice to internal and external customer presentations. Follow all organizational Standard Operating Procedures relative to cost modeling, approvals and reviews, and all other associated workflow and deliverables.

Architect. The Identity and Access Management (IAM) programmer reports to the IT DCS&O Manager of TIERS Operations. Performs advanced and/or managerial (senior-level) computer systems analysis work. Work involves coordinating the planning, budgeting, and analysis of user requirements, procedures, and problems to automate processing or to improve existing systems. Work with business partners and management to automate processing or to improve existing systems. Implement the management and automation of processing or improvement of existing systems. May plan, assign, and/or manage the work of others. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment. Performing business use case analysis, products/tools integration analysis and recommend solutions with Okta. Performing hands-on technical design, configuration, development, integrations and troubleshooting of IAM/Okta solution. Automating Okta solution deployments to help deliver high-quality software. Implementation of automating user onboarding and offboarding with seamless communication between directories and on-prem/cloud applications. Excellent analytical and troubleshooting skills to identify, track, and resolve technical skills. Documenting data flow and deployment architecture diagrams that include various Okta integrations. Working closely with different teams including technical and non-technical. Lead and ensure HHSC best practices and methodologies are applied to the design, deployment, and operations. Provide technical oversight, review, and quality control throughout the life cycle of the implementation.

II. CANDIDATE SKILLS AND QUALIFICATIONS

Minimum Requirements:

Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.

Years

Required/Preferred

Experience

12

Required

Experience with Identity and Access Management tools, processes, and support and the ability to provide leadership to technical and project teams

12

Required

Experience with IBM Security Identity Manager (ITIM/ISIM), IBM Security Access Manager (TAM/ISAM) or like IAM software.

12

Required

Must have analytical and organizational skills and the ability to gather, assemble, correlate, and analyze facts, and propose solutions to problems.

12

Required

Experience with 24x7 Oncall rotation

12

Required

Knowledge of Identity and Access Management and LDAP best practices.

12

Required

Experience in authentication, authorization and securing access for applications, devices and users.

12

Required

Experience in migrating users between directories.

12

Required

Experience in IAM design patterns, life cycle management modules

12

Required

Experience in user lifecycle management and Integrating applications with IAM solutions

10

Required

Experience in designing, configuring and implementing Okta solution.

10

Required

Experience with authentication methods such as SAML, OAuth and OIDC.

10

Required

Experience with onboarding applications into Okta.

10

Required

Experience in implementation of user life cycle management with Okta including bulk loads.

10

Required

Experience in integrating applications using Okta Gateway.

10

Required

Experience in implementing Okta integrations involving multi-tenant environments.

10

Required

Experience in implementing automation for Okta solution using Jenkins and/or other related technologies.

10

Required

Experience in implementation of cloud-based solutions, leveraging AWS and demonstrate expertise in authentication and authorization using Okta, SailPoint and/or similar technologies.

10

Required

Experience with End-to-End deployment of Okta and SailPoint

12

Preferred

Skills in written and oral communication, including the ability to make public presentations, write technical information in an understandable format, and produce reports.

12

Preferred

Experience with either RSA IAM, Oracle IdM, DatapoJava, JavaScript, or WebSphere (6.0 - 8.x), and strong technical knowledge of various LDAP repositories such as AD, eDirectory and IBM Security Directory Server (TDS / ISDS)

12

Preferred

Skill in project management, managing projects and able to establish project goals and objectives

12

Preferred

Strong skills in analyzing and evaluating complex federal and state legislation, program, policy, and operations issues as they relate to IAM projects.

12

Preferred

Experience in technologies such as Java, Java Script, HTML, JASON, Python, SQL, Linux

12

Preferred

Familiarity with LDAP browsers - LBE, Softerra LDAP Browser, Apache Directory Studio and/or similar tools.

12

Preferred

Security certifications.

10

Preferred

Experience in integration of Okta with Single Page Applications (Angular, ReactJS or other similar frameworks/libraries) using JWT, OAuth, and other related technologies / standards

10

Preferred

Hands-on experience with CI/CD methodologies and containerized application deployments.

8

Preferred

Federated Identity Manager (TFIM/IFIM), Single Sign On (ESSO), Tivoli Directory Integrator (TDI) or like software products

8

Preferred

Experience in Websphere or JBoss or similar J2EE application server's configuration to enable robust authorization using Okta and SailPoint.

8

Preferred

Prior experience in IBM Datapower, IBM Security Identity Manager, Security Access Manager, Security Directory Integrator, ITIM Adapters, IBM Security Directory Server.

8

Preferred

Hands-on experience with Agile Development Methodologies (preferably Scrum).

Apply Now!

Similar Jobs (0)