Previous Job
Previous
Java Engineer
Ref No.: 17-04737
Location: Pheonix, Arizona
NTT DATA Services is a leading IT services provider and global innovation partner with 130,000 professionals based in over 50 countries. NTT DATA recently acquired Dell Services. NTT DATA Services emphasizes long-term commitment and combines global reach and local intimacy to provide premier professional services, including consulting, application services, business process, IT outsourcing, and cloud-based solutions. We are a part of NTT Group, one of the world's largest technology services companies, generating more than $100 billion in annual revenues and partner to 80% of the Fortune 100. Visit www.nttdataservices.com to learn how our consultants, projects, managed services, and outsourcing engagements deliver value for a wide range of businesses and government agencies.

Designs, develops, configures, and implements solutions to resolve medium to complex technical and business issues related to related to information security, identity management, user access authentication, authorization, user provisioning, and /or role-based access control.
Designs, develops, and implements solutions to successfully integrate new information security and identity management systems with the existing architecture.
Provides end-user support and works on multiple functions of medium to high complexity. Identifies and recommends functional, technicalogical and/or control solutions.

May work on or drive one or more projects as part of a Security or Security Risk Management team.

Acts as a subject matter expert (SME) for one or more security, IDM, or risk management areas.

Experience:

Experience evaluating and implementing new hardware and software solutions and managing vendor support/SLA required.
Experience with UNIX/Linux/BSD operating systems preferred.
2+ years technical project experience designing, developing, integrating, and implementing solutions to resolve complex technical and business issues preferred.
Coding experience and proficiency (e.g. Python, Perl, Ruby, PowerShell, Java, bash, etc) preferred.
Experience in Windows Office (Work, Excel, etc) required.
Experience in UNIX/Linux OS and/or Cisco IOS strongly preferred.

Education:
Bachelor's Degree in Computer Science, Information Security, Information Systems, or related field, or equivalent professional experience required.

Training:
One or more relevant technical/professional security certifications (such as: COMP-TIA Network+, Security+, SANS GIAC, CISSP, CRISC, CISA, or vendor-specific) required
Two or more strongly preferred.

Special Skills:
Proficient understanding of regulatory and compliance mandates, including but not limited to HIPAA, HITECH, PCI, Sarbanes-Oxley preferred.
Strong knowledge of healthcare environments preferred.

Essential Functions:
Detects and identifies vulnerabilities in systems, including but not limited to databases, applications, network elements and devices, and data storage
• Develop advanced custom scripts, programs, and application interfaces to enhance existing monitoring infrastructure as part of project team efforts
• Pursue continuing education to maintain advanced knowledge of best practices, compliance requirements, and threats and trends in identity management and information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team
• Lead root-cause analysis efforts to determine improvement opportunities when failures occur. Contribute as lead and SME on incident research and resolution when appropriate, mentoring incident team members
• Assist in Continual Service Improvement efforts by identifying opportunities for process improvement
• Manage workload, prioritizing tasks and documenting time, and other duties as directed by management.
• Provides training, and coaching for Analysts, Technicians, and Engineers in the IT Security organization
Assists management in the definition of cross-platform information security and/or identity management policies and procedures, standard operating procedures, processes and guidelines.
• Participate in the collection and documentation of departmental knowledge artifacts; key participant in the development, population, and championing of knowledge management and collaboration systems for the IT Security team.
• Communicates complex technical information to team members and many levels of management
• Provides identity management advice and support for network systems and applications.
• Act as a security advocate for IT operations team's adherence to Dignity Health policies and industry best practices

Core Competencies:
The extent to which an organization's mode of operation, mission and values are consistent with the type of environment that provides personal satisfaction
Working effectively and cooperatively with others; establishing and maintaining good working relationships
Effectively meeting customer needs; building productive customer relationships; taking responsibility for customer satisfaction and loyalty.
Having achieved a satisfactory level of technical and professional skill or knowledge in position-related areas; keeping up with current developments and trends in areas of expertise

Job Specific Competencies:

Analytical Thinking:
Able to breakdown raw information and undefined problems into specific, workable components that, in turn, clearly identify the issues at hand. Makes logical conclusions, anticipates obstacles, and considers different approaches that are relevant to the decision making process.

Communication for Results:
Expresses technical and business concepts, ideas, feelings, opinions, and conclusions orally and in writing. Listens attentively and reinforces words through empathetic body language and tone

Conceptual Thinking:
Synthesizes facts, theories, trends, inferences, and key issues and/or themes in complex and variable situations. Recognizes abstract patterns and relationships between apparently unrelated entities or situations. Applies appropriate concepts and theories in the development of principles, practices, techniques, tools and solutions.

Consulting:
Uses professional or technical expertise to advise, intervene, and/or influence a customer or internal partner over whom there is no direct authority.

Information Seeking:
Gathers and analyzes information or data on current and future trends of best practice. Seeks information on issues impacting the progress of organizational and process issues. Translates up-to-date information into continuous improvement activities that enhance performance

Problem Solving:
Anticipates, identifies and defines problems. Seeks root causes. Develops and implements practical and timely solutions

Risk Management:
Identifies risks and obstacles to plans. Defines scarcity and conflicts of resource needs, and potential constraints. Investigates risks within various project elements, assesses impact, and develops contingency plans to address major risks.

Business Enterprise Knowledge:
Solicits information on enterprise direction, goals and industry competitive environment to determine how own function can add value to the organization and to customers. Makes decisions and recommendations clearly linked to the organization's strategy and financial goals, reflecting an awareness of external dynamics. Demonstrates awareness by providing clear explanations for actions taken relative to customer requirements, needs, and industry trends

System Thinking:
Ability to plan and account for impacts of system development efforts across architectural system components, critical business processes, data and applications. Conceptualizes the impact of changes to system platforms as a result of system acquisition, system merger, or implementation of enterprise-wide systems.

In addition to the job description below the ideal candidate will have experience in the following:
• Development background
• Scripting experience – javascript, perl, bash
• Linux OS experience
• Novell/NetIQ/Microfocus Identity Management scripting (DirXML)
• Ldap/eDirectory experience
• Web development
• Ability to document solutions
• Software troubleshooting experience





The Company is an equal opportunity employer and makes employment decisions on the basis of merit and business needs. The Company will consider all qualified applicants for employment without regard to race, color, religious creed, citizenship, national origin, ancestry, age, sex, sexual orientation, genetic information, physical or mental disability, veteran or marital status, or any other class protected by law. To comply with applicable laws ensuring equal employment opportunities to qualified individuals with a disability, the Company will make reasonable accommodations for the known physical or mental limitations of an otherwise qualified individual with a disability who is an applicant or an employee unless undue hardship to the Company would result.