Identity Access Mgmt Architect

Company Name:
HT Staffing
This is a 6-month contract opportunity (with possibility to extend) in Northeast Austin with an energy services company. There is the potential to convert to a permanent employee, at which time, you would be eligible for robust benefits package, competitive salary, and generous 401K program.
Identity and Access Management (IAM) Architect
is responsible for the design and architecture of IAM services. IAM services include identity assurance and registration, access request, access provisioning, access reauthorization, public key infrastructure, remote access, and directory technologies. The IAM Architect will work with service leads on enhancements and continuous improvements and guide the work activities of developers and other technical resources.
Design and develop simple, usable, maintainable, and scalable solutions that meet requirements, adhere to applicable policies, and comply with information security requirements.
Design and develop technical solutions in collaboration with service owners, architects, project managers and other technologists during the lifecycle of solution delivery.
Work with IT teams to design, engineer and integrate with existing IAM solutions.
Demonstrate extensive knowledge across a broad range of identity and access management technologies.
BS in Computer Science (MS preferred)
12+ years of software design and development, including at least 6 years developing custom software for mid-sized Identity and Access Management technologies
8+ years of relevant hands-on technical management experience of software developers/system administrators/architects as well as a record of individual technical achievement developing custom applications
2-5+ years of good experience in Role Mining in Identity and Access Management projects.
Advanced security certifications a plus
Technical Skill Requirements
Expert knowledge of three or more of the following technologies: Directory Services, Authentication/Authorization, Access Provisioning, Access Review, Public Key Infrastructure, and Federation
The candidate must have hands-on experience developing and deploying mid to large-scale enterprise Identity & Access Management solutions
Fluency in more than one technology stack and expertise in several of the following: C, C++, Java, sh/PERL/Python, UNIX/Linux, .NET, Windows, networking and network devices
Exceptional analytical and problem-solving skills
Demonstrated ability to work across a broad range of technologies to deliver complex solutions
Demonstrated ability to effectively coordinate multiple priorities in a dynamic environment
Ability to articulate complex technical issues with both technicians and clients
Ability to compose and present material to communicate difficult concepts and gain consensus
Effective time management skills demonstrated by successful and timely completion of projects

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Technical Director - DevOps Architect (ERN4)
Austin, TX Charles Schwab
UX Architect
Round Rock, TX Apex Systems
Telecommunication/ ROAMING Solutions Architect
Dallas, TX Magnum Hunt, LLC
Chemicals Industry Business Process Architect Job
Houston, TX SAP
Building Access Technician I
Canyon, TX West Texas A&M University
Lead Tech Architect - SuccessFactors/HCM - Dal...
Dallas, TX Rizing