Location: Austin,TX, USA
Hello All,
I hope you are doing well.
Role: Enterprise Architect 3
Location: Texas (Remote)
Type: C2C/W2
Duration: 6+ months
Client: State of Texas
Position will be remote. Program will only accept LOCAL ONLY candidates for this position.
C) Any and all travel, per diem, parking, and/or living expenses shall be at the worker's and/or Vendor's expense.
D) The worker may be required to work remotely at HHSC discretion, up to 100 percent of the time.
E) The worker may be required to work outside the normal business hours on weekends, evenings and holidays, as requested. Payment for work over 40 hours will be at the hourly rate quoted and must be coordinated and pre-approved through the Agency.
RESPONSE DEADLINE
Vendor shall respond in accordance with Customer specifications, with proposed candidate resumes and the response must be received by 12/21/2024 @ 5:00 PM (CT).
Texas Health and Human Services Commission requires the services of 1 Enterprise Architect 3, hereafter referred to as Candidate(s), who meets the general qualifications of Enterprise Architect 3, Applications/Software Development and the specifications outlined in this document for the Texas Health and Human Services Commission.
All work products resulting from the project shall be considered works made for hire and are the property of the Texas Health and Human Services Commission and may include pre-selection requirements that potential Vendors (and their Candidates) submit to and satisfy criminal background checks as authorized by Texas law. Texas Health and Human Services Commission will pay no fees for interviews or discussions, which occur during the process of selecting a Candidate(s).
Responsible for translating the client's business requirements into specific systems, applications or process designs with interlocked financial modeling for very large complex technical solutions. Analyzes customer service requirements and designs service solutions to meet those objectives. Primary expert to construct the specific solution, scope document, risk profile, and corresponding financials. Maintains and utilizes detailed industry and internal services knowledge in the construction of industry-leading services solutions, including expert working level knowledge of the processes, technologies, and people components involved in the services arena. Uses expertise to construct specific and detailed solutions that encompass process, technology, and staffing plans for customer sales opportunities. Constructs risk assessments and corresponding remediation plans relative to complex services proposals. Participates in the construction of detailed financial models that align with complex services proposals. Composes Statement of Work or other documents, using departmental automation tools as available, to craft detailed and accurate deliverables that specify processes, technology, staffing, and project management involved in proposed services solutions. As needed, provide a trusted expert advisor role as a Subject Matter Expert for technical services, to both internal and external customers, ranging from formal advice to internal and external customer presentations. Follow all organizational Standard Operating Procedures relative to cost modeling, approvals and reviews, and all other associated workflow and deliverables.
Architect. The Identity and Access Management (IAM) programmer reports to the IT DCS&O Manager of TIERS Operations. Performs advanced and/or managerial (senior-level) computer systems analysis work. Work involves coordinating the planning, budgeting, and analysis of user requirements, procedures, and problems to automate processing or to improve existing systems. Work with business partners and management to automate processing or to improve existing systems. Implement the management and automation of processing or improvement of existing systems. May plan, assign, and/or manage the work of others. Works under minimal supervision, with extensive latitude for the use of initiative and independent judgment. Performing business use case analysis, products/tools integration analysis and recommend solutions with Okta. Performing hands-on technical design, configuration, development, integrations and troubleshooting of IAM/Okta solution. Automating Okta solution deployments to help deliver high-quality software. Implementation of automating user onboarding and offboarding with seamless communication between directories and on-prem/cloud applications. Excellent analytical and troubleshooting skills to identify, track, and resolve technical skills. Documenting data flow and deployment architecture diagrams that include various Okta integrations. Working closely with different teams including technical and non-technical. Lead and ensure HHSC best practices and methodologies are applied to the design, deployment, and operations. Provide technical oversight, review, and quality control throughout the life cycle of the implementation.
II. CANDIDATE SKILLS AND QUALIFICATIONS
Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.
Years
Required/Preferred
Experience
12
Required
Experience with Identity and Access Management tools, processes, and support and the ability to provide leadership to technical and project teams
12
Required
Experience with IBM Security Identity Manager (ITIM/ISIM), IBM Security Access Manager (TAM/ISAM) or like IAM software.
12
Required
Must have analytical and organizational skills and the ability to gather, assemble, correlate, and analyze facts, and propose solutions to problems.
12
Required
Experience with 24x7 Oncall rotation
12
Required
Knowledge of Identity and Access Management and LDAP best practices.
12
Required
Experience in authentication, authorization and securing access for applications, devices and users.
12
Required
Experience in migrating users between directories.
12
Required
Experience in IAM design patterns, life cycle management modules
12
Required
Experience in user lifecycle management and Integrating applications with IAM solutions
10
Required
Experience in designing, configuring and implementing Okta solution.
10
Required
Experience with authentication methods such as SAML, OAuth and OIDC.
10
Required
Experience with onboarding applications into Okta.
10
Required
Experience in implementation of user life cycle management with Okta including bulk loads.
10
Required
Experience in integrating applications using Okta Gateway.
10
Required
Experience in implementing Okta integrations involving multi-tenant environments.
10
Required
Experience in implementing automation for Okta solution using Jenkins and/or other related technologies.
10
Required
Experience in implementation of cloud-based solutions, leveraging AWS and demonstrate expertise in authentication and authorization using Okta, SailPoint and/or similar technologies.
10
Required
Experience with End-to-End deployment of Okta and SailPoint
12
Preferred
Skills in written and oral communication, including the ability to make public presentations, write technical information in an understandable format, and produce reports.
12
Preferred
Experience with either RSA IAM, Oracle IdM, DatapoJava, JavaScript, or WebSphere (6.0 - 8.x), and strong technical knowledge of various LDAP repositories such as AD, eDirectory and IBM Security Directory Server (TDS / ISDS)
12
Preferred
Skill in project management, managing projects and able to establish project goals and objectives
12
Preferred
Strong skills in analyzing and evaluating complex federal and state legislation, program, policy, and operations issues as they relate to IAM projects.
12
Preferred
Experience in technologies such as Java, Java Script, HTML, JASON, Python, SQL, Linux
12
Preferred
Familiarity with LDAP browsers - LBE, Softerra LDAP Browser, Apache Directory Studio and/or similar tools.
12
Preferred
Security certifications.
10
Preferred
Experience in integration of Okta with Single Page Applications (Angular, ReactJS or other similar frameworks/libraries) using JWT, OAuth, and other related technologies / standards
10
Preferred
Hands-on experience with CI/CD methodologies and containerized application deployments.
8
Preferred
Federated Identity Manager (TFIM/IFIM), Single Sign On (ESSO), Tivoli Directory Integrator (TDI) or like software products
8
Preferred
Experience in Websphere or JBoss or similar J2EE application server's configuration to enable robust authorization using Okta and SailPoint.
8
Preferred
Prior experience in IBM Datapower, IBM Security Identity Manager, Security Access Manager, Security Directory Integrator, ITIM Adapters, IBM Security Directory Server.
8
Preferred
Hands-on experience with Agile Development Methodologies (preferably Scrum).