*Must have Baseline*
*Contract period- 12 months + 2 x 12 months extensions*
*Canberra, ACT based*
The Department is seeking a seasoned One Identity Manager Consultant with a minimum of 5 years of experience in identity and access management (IAM) solutions and expertise in .NET and Angular development. The ideal candidate will play a key role in implementing and customising One Identity Manager solutions while developing robust applications and integrations. This role requires hands-on technical expertise, leadership, and the ability to work collaboratively with cross-functional teams to deliver secure, scalable, and efficient IAM solutions.
Key duties and responsibilities-
1. One Identity Manager Implementation:
2. Lead the design and deployment of One Identity Manager solutions to enhance IAM processes.
3. Configure and customise complex workflows, policies, and connectors to meet business requirements.
4. Develop advanced customisations, including custom scripts, modules, and processes in One Identity Manager.
5. Application Development:
6. Build, maintain, and enhance custom applications and extensions using
.NET (C#)
and
Angular
.
- Design and implement integrations between One Identity Manager and external systems using APIs and web services.
- Ensure high-quality, scalable, and secure code to support business operations.
1. Technical Expertise:
2. Architect and implement advanced identity lifecycle management processes, role-based access control (RBAC), and provisioning/deprovisioning workflows.
3. Create complex reports, dashboards, and visualisations in the One Identity Manager environment.
4. Ensure solutions align with security policies, compliance requirements, and industry best practices.
5. Leadership and Collaboration:
6. Collaborate with business stakeholders to analyse and document IAM requirements.
7. Act as a technical lead and mentor for junior team members, providing guidance on best practices and technical challenges.
8. Work closely with IT teams to ensure seamless integration with other enterprise systems.
9. Support and Maintenance:
10. Proactively monitor and troubleshoot complex issues in the One Identity Manager environment.
11. Oversee the application of patches, updates, and upgrades to One Identity Manager and associated systems.
12. Provide post-implementation support and develop detailed technical documentation.
Technical skills
Experienced in identity and access management (IAM) solutions, including SAML, OAuth, OpenID Connect, and integration with Active Directory and Azure AD. Proficient in .NET (C#), Angular, and cloud-based IAM platforms. Skilled in developing and consuming RESTful APIs, SOAP services, and managing Microsoft SQL Server. Expertise in PowerShell and Python for automation and efficiency. Proven ability to design and implement role-based access control (RBAC) models for secure access management.
About the team
The project team is cross-functional, with a blend of APS and contractors. The project and team are in place, with established scope, governance and reporting.
About the project
The project will deliver a series of initiatives that upgrade and enhance the existing departmental Identity Access Management platform. These include both the IAM suite of applications, and integration points with key downstream applications.
Essential criteria
1. Proven track record in developing IAM (preferably One Identity Manager) solutions with .NET (C#) in a government agency.
2.
Proficiency in scripting languages like PowerShell or Python and web development frameworks such as Angular.
1. Deep knowledge of IAM protocols such as SAML, OAuth, OpenID Connect, and integration with Active Directory/Azure AD.
2. Experience in designing and implementing role-based access control (RBAC) and attribute-based access control (ABAC) models.
Desirable criteria
1. Experience in identity and access management (IAM) solutions with expertise in One Identity Manager.
2. Experience with cloud-based IAM solutions, such as Azure AD or AWS IAM.
3. Familiarity with DevOps practices, CI/CD pipelines, and version control tools like Git.
4. Experience with containerisation (Docker, Kubernetes) and microservices architecture.