Hello,

 

Hope you are doing good!

 

This is Arjun Shah from Savvy Technology Solutions LLC and I am recruiting 
on behalf of our client in TEXAS. After accessing your online resume, I believe 
you may have the qualifications and experience I am looking for to fulfill 
their position. Please revert me beck with your most recent resume along with 
contact details and Rate expectation.  [email protected]

 

Role                       : Identity Access Management (IAM) Analyst

Client                    : Office of the Attorney General

Duration               : 26 (months)

Location               : 5500 Oltorf, Austin TX 78741

 

 

Job Description :

 

The Identity Access Management (IAM) Analyst performs advanced computer systems 
analysis work by managing the installations, day-to-day technical operations, 
modifications, performance management, scripting, and administration of IAM 
Tools/Software and Security Access Management tools and processes. Assists 
in the allocation of tool licenses, tool configuration, identifying necessary 
application patches and upgrades, and coordinating changes with applications 
development teams and the data center vendor. Performs technical evaluations 
of software involving analysis and implementation for the Child Support 
Enforcement 
Agency. Creates technical documents and demonstrations which include the 
findings 
and recommendations, and a specific and detailed description of the recommended 
system and instruction for its implementation. May mentor and coordinate the 
work of others. Performs tool troubleshooting, maintenance, as well as 
developing 
installation strategies and tactics. Works under minimal direction with 
considerable 
latitude for the use of initiative and independent judgment.

 


• Supports the day-to-day technical operations, trole-shooting, support and 
administration of IAM and Security Access Tools/Software.




• Supports IAM and Security Access Tools/Software environment(s), including 
the integration, configuration and deployment to servers.




• Implements performance tuning and troubleshoot performance issues.




• Identifies and coordinates software upgrades and patches.




• May mentor and coordinate the work of others.




• Attends work regularly in accordance with agency leave policy.




• Complies with all policies and procedures, including but not limited to 
applicable 
security and safety rules, regulations and standards.




• Performs related work as assigned.

 

 




Requirements 



Minimum Skills Requirement in years 


Years    

Skills/Experience 


5    

Full-time information technology, system design and development, 
trouble-shooting 
and resolving problems related to personal computers, or closely related 
experience. 



4    

Experience providing ongoing support, maintenance, management, and 
administration 
of IAM and Security Tools/Software 


4    

Experience installing new software releases and system upgrades, performing 
evaluations and installations of patches, and resolving software related 
problems. 



Strong    

Experience with SQL scripting. 


Strong    

Skill in sharing information accurately and effectively both orally and in 
writing. 


Strong    

Considerable skill in planning and organizing work to meet goals and complete 
multiple assignments on aggressive time lines without compromising accuracy. 



Strong    

Ability to exercise judgment and make strategic decisions in a rapidly changing 
environment. 


4    

Graduation from an accredited four-year college or university is required; 
may substitute full-time information technology, system design and development, 
or closely related experience, for the required education on a year-for-year 
basis. 


Yes    

Ability to lift 25 lbs. 


Preferred skill requirements in years 


Years    

Skills/Experience 


4    

Graduation from accredited four-year college or university with a Bachelor 
of Science in Computer Science, Management Information Systems, Engineering, 
Mathematics, or closely related discipline. 


1    

Experience designing and implementing clustered environments for IAM and 
Security 
products. 


1    

Experience administrating IAM and Security suite of tools and processes 
including: 
• Virtual LDAP Proxy Multi Factor Authentication 


1    

Experience with IAM and Security Access Management 


1    

Experience writing, scripts for deployment and installation of Software (DQL, 
SQL or other scripting tool). 


1    

Experience with Windows and AIX or UNIX. 
   

Experience with security processes, technologies and information security 
solutions. 

   

Working knowledge and experience with the Texas Child Support program. 

 

 

 

 

Thanks,

Arjun Shah

[email protected]

Savvy Technology Solutions LLC

 

 

-- 
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/us_itgroups.
For more options, visit https://groups.google.com/d/optout.

Reply via email to