[Close] 

PeopleSoft Security Analyst - HG02216

Company Name:
HyperGen Inc
Our Direct Client located in Richardson, TX. has an immediate Full Time Permanent position for an Associate PeopleSoft Security Analyst.
Job Description:
This position will be responsible for PeopleSoft security development, designing, automating repeatable tasks, testing, documenting and maintenance of projects supporting campus-wide PeopleSoft applications (Campus Solutions v9.1; HCM v.9.1; Financials v.9.2.1; EPM/OBIEE v.9.1). Thinking strategically, suggesting process improvements and creating standardizations. Participate in analysis and design of securing all entry points for PeopleSoft system. Assist in resolving PeopleSoft security related production issues and analyzing security request for new/modification of PLs/Roles/Query data groups or user functions. Responsible for compliance with University policies and procedures related to the overall People Soft Security environment including PS Access change management controls and related documentation.
Minimum Qualifications:
Bachelor's degree in Computer Information Systems, Computer Science or equivalent. 6 months - 2 years of PeopleSoft security design, or PeopleSoft development and support work using PeopleSoft. Must be familiar with the full life cycle development process including significant experience interacting with users, designing and compiling detail specifications based on user requirements, role/PL design and development, testing, implementation, and documentation. Ability to maintain PeopleSoft security across multiple instances (DEV, TST, CNV, QA, PRD, etc.); help out in maintaining Integrated PeopleSoft security across application zones (Campus Solutions, HCM, EPM, FMS, etc.) Apply knowledge of PeopleSoft Security delivered functionality (User Profiles, Roles, Permission List, Portal Security, Sync, etc.) to maximize features and functionality in support of identified customer requirements. Ability to make recommendations to improve, streamline and automate PeopleSoft security. Ability to configure/develop security objects that adhere to Oracle/PoepleSoft development, standards and best practices, and ability to document the security changes so that it may be interpreted, maintained and enhanced. An equivalent combination of relevant education and experience may be considered.
Preferred Qualifications:
Master's degree in CIS, CS or equivalent. Strong SQL knowledge.
Minimum Responsibilities:
Analyzes and fixes new security issues/requests. Analyzes new security roles/ permissions or change requests on the basis of best practices. Works with users, IT Department managers, employees to analyze, document and define requirements associated with new development or maintenance/enhancements to existing security roles/permissions/portal registry contents. Reviews completed roles/permissions with users, IT department managers, employees to ensure requirements are fully met. Designs and tests new development or enhancement / maintenance of existing roles, permissions, portal registry contents and documenting the requirements using approved documentation and design methodologies. Specifications will be based on user inputs, written user requirements and IPS team discussions. Structures roles / permissions according to design specifications, utilizing current techniques and published industry standards and best practices, and then test for compliance with requirements. Resolves production security issues. Follows and suggest improvement in internal policies and procedures. Acts as a team player.
Additional Responsibilities:
Other duties as assigned.
Other Information:
Serves as a representative of the Company displaying respect, civility, professional courtesy, consideration of others and discretion in all interactions with members of the Company, Community and the general public.
If you are interested please send your updated resume salary history and requirement to my email at
No Calls Please
No work visa sponsorship at this time
No Third Party Resumes
Thank you

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Acquisition Security Analyst
San Antonio, TX ManTech International Corporation
Federal - Oracle Application Security Analyst
San Antonio, TX Accenture
Sr Staff, Security Analyst
Roanoke, TX Charles Schwab
Systems Security Analyst Senior
Dallas, TX Experian
Senior SAP Security Analyst (Digital Technolog...
Houston, TX General Electric
Cyber Security Analyst
Arlington, TX L3 Technologies