This position is located in the Chief Information Officer, Software Services Division. Primary responsibilities include performing all aspects of business applications architecture, design and development in compliance with federal standards. Exercise ability to serve as a Second Level Support Applications Developer applying an in-depth knowledge of the application development policies, guidelines, and procedures; technical standards for data exchange and interface designs; system lifecycle management; data management, auditing; project analysis and management; configuration management; and business re-engineering; and system testing. Serve as a Second Level Support Technical Lead utilizing hands-on experience to implement data management, lifecycle management, project management, requirements management, information management, development of policies, procedures and standards; assisting with strategic planning and development of business solutions.
Develops database designs based on organizational mission and functional requirements. Defines data elements, data relationships, and data tables using database theory including entity relationship diagramming; object-oriented, hierarchical, and relational design; and data normalization.
Installs and maintains Web-based systems, Web-based information services, or Web-based research tools and e-Government operations.
Performs work involving the analysis, design, documentation, development, modification, testing, installation, implementation, and support of new or existing applications software. Participates in implementing commercial off-the-shelf (COTS) software or developing customized applications. Prepares inputs, outputs, flow diagrams, decision logic tables, and linkages with other applications systems. Tests, validates, and documents the applications.
Participates in, or performs, the planning, design, and implementation of an agency-wide enterprise architecture that integrates business, application, information, and technology architectures into a cohesive unit.
Ensures, or participates in ensuring, the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools.
Evaluates, acquires, configures, and uses software intended to ensure that automated systems are secure from unauthorized use, viral infection, and other problems that would compromise sensitive information in terms of confidentiality, integrity, and availability, or would compromise other aspects of overall system security.