We provide IT Staff Augmentation Services!

Iam/sail Point Resume

Dallas, TX

SUMMARY

  • Strong IT experience in Sailpoint Identity and Access Management and Java Web development.
  • Experienced in end - to-end integration of IAM Solution using SailPoint Identity and Access Management Suite that includes requirement gathering, analysis, design, development, maintenance, and upgrades.
  • Over 8+ years' experience specifically in SailPoint IQ, Sun Identity Manager
  • Expertise in designing and deploying Identity and Access Management Solution to improve user experience, meet compliance and reduce costs.
  • Experience in managing applications access in Okta and Active Directory. Exposure in design and architecture of PIM using Cyber-Ark. Account management i.e. adding /deleting accounts /group management. implemented workflow actions to drive troubleshooting across multiple event types in Splunk.
  • Expert in installing and configuring Splunk forwarders on Linux, Unix and Windows
  • Strong working knowledge of Identity and Access Management technologies - User Management, Password Management, Account Management, Entitlement Management, and Role Management.
  • Knowledge in Azure Compute services, Web Apps, Data Factory & Storage, Azure Networking, Hybrid Integration and Azure IAM
  • Gathered and analyzed IAM, PAM security requirements, identify gaps in security architecture and recommend best practice processes and solutions in large and complex enterprises
  • Hands on Experience with complete user life cycle management i.e. Joiner, Mover, Leaver and Rehire Lifecycle Events.
  • Configured the SSO (Single sign - on) and SLO (Single Log-out) for all the service providers.
  • Configured the signed Authn Requests for all the SSO.
  • Experience in handling various modules of CyberArk, mainly Enterprise Password vault (EPV), Application Identity management (AIM), Central Policy Manager (CPM), Privileged Session management (PSM), Event Notification Engine (ENE). Upgrading CyberArk suite of products from 7.x to 9.x. (CPM, PSM, EPV and PVWA)
  • Experience as a security professional in installing, managing and monitoring of CyberArk Privileged account security tool modules.
  • Experienced in IAM/PAM tools with deployment, configuration, integration and troubleshooting CyberArk Privileged Account Security product suite - Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application Identity Manager, and Privileged Threat Analytics
  • Experienced on Cloud based Identity and Access Management Solutions like OKTA and PingOne.
  • Provided SailPoint application consultation and development support to consumer applications as required
  • Experience with Installation and configuration of CyberArk Vault, CPM, CyberArk PVWA, OPM CyberArk PSM, AIM, and PSM SSH proxy Architecture and design.
  • Extensive experience on boarding Windows, UNIX, Database servers, RACF and Network device into CyberArk
  • Used various sources to pull data into Power BI such as SQL Server, SAP BW, Oracle, SQL Azure etcUsed various sources to pull data into Power BI such as SQL Server, SAP BW, Oracle, SQL Azure etc
  • Expert in installing and using Splunk apps for UNIX, Linux, Cisco, DBConnect, VMware etc
  • Knowledge on Configuration files in Splunk (props.conf, Transforms.conf, Output.conf
  • Experience in managing applications access in Okta and Active Directory. Exposure in design and architecture of PIM using Cyber-Ark. Account management i.e. adding /deleting accounts /group management.
  • Experience in cloud computing servers like Amazon Web Services (AWS) and IaaS.
  • Hands on experience with Provision, Access Groups, Role Base Access Control(RBAC)
  • RabitMQ, foreman & Chef configuration for repo of 3d Android VM & Multimedia Saas Optimization. ARM-backend node.js on Raspberry Pi & Cisco WEBGL/OpenGL ES3 iaas, over node.js for mobile game cloud
  • Worked on Virtualization tools, which are used to develop proof of concept solutions leveraging VMware Workstation, and Oracle Virtual Box.
  • Developed custom workflows (With multi-level approval and time-based escalation for Approval process, profile update and self-service, changing the profile of User and modifications to Groups).
  • Knowledge in developing applications using Java/J2EE components, information security in SailPointIdentitIQ.
  • Performed Integration with multiple applications such as AD, Delimited File and JDBC with different types of databases like Oracle, MySQL.
  • Experienced in developing applications using Java1.7 and Java 1.6, J2EE Technologies (Servlets, JSP, JSF and Java Web Services), JDK, JDBC, XML, JavaScript, HTML, DHTML, CSS.
  • Part of Privileged Access Management (PAM) Remediation and Engineering team whose role is to secure Web Based applications on user access and authorization.
  • Good understanding in the Identity Management, IAM capabilities, Oracle Suite Implementation and SailPoint Implementation
  • Strong Experience on AWS platform and its dimensions of scalability
  • Experience in administration of User and Role Provisioning, Connectors, Workflow, Certificate Management, Session Management, Encryption technologies and directories like LDAP,MS Active Directory.
  • Provisioning application's requests in IdentityIQ to Create/Amend/Delete user access for the on boarded applications. Good understanding of policies in CyberArk Central Policy Manager (CPM) and PAM.
  • Worked on upgrading the latest versions 6.4,7.0,7.1,7.2 of SailPoint and worked on patching 7.0,7.1 versions of SailPoint
  • Experience with Restful services based on Jersey Framework handling various HTTP responses and using both JSON and XML.
  • Setup the federation environment and implemented SAML 2.0 wherein the authentication information can be passed to service providers as an Identity Provider.
  • Extensive working knowledge in Linux, UNIX, Windows, Databases, SQL, PL/SQL language and in web technologies such as Tomcat, JBoss.
  • Experienced in integrating various applications with Okta to provide SSO as well as user provisioning, deprovisioning and reconciliation.
  • Strong Technical background, excellent analytical ability and debugging skills, good communication skills, team player and goal oriented, with a commitment to excellence.

TECHNICAL SKILLS

Identity Management Tools: CA SiteMinder, Sun Identity Manger, Microsoft Forefront (FIM), Oracle Identity Manager, Oracle Access Manager, OID, OUD, Role Base Access Control (RBAC), Attribute Base Access Control(ABAC), Azure Cloud Technology - SAAS Delivery Deployment, ISAAS Cloud Development, Enterprise Single Sign-On, ForgeRock, Quick Connect Virtual Directory Server, SAML 2.0, SOAP, Access Cloud, Request Manager.

Technologies: Web Services, SOAP, XML, TWEST, JSP, JAVA, TCP/IP,DNS, SSH, HTTPS, VPN, HTML / DHTML/ XHTML.

Operating Systems: Solaris, Linux and Windows, Oracle Enterprise Linux 5/4, Solaris 10/9/8.

Web Servers: Apache, IIS, IHS

Application Server: Oracle WebLogic, IBM Websphere, BEA Weblogic 10.x, Jboss 4.x, Oracle Application Server (OAS) 10.1.x, Apache Tomcat 6.x/5.x

Database: Oracle, LDAP, AD, ADAM, PL/SQL, MS Access, MySQL, SQL Server.

PROFESSIONAL EXPERIENCE

Confidential - Dallas, TX

IAM/Sail point

Responsibilities:

  • Worked as a Senior SailPoint Developer for the ASM Production Support Team: Understanding the business requirements, code development, unit testing, confirming and validating the change request
  • Launched Manger Certification (Annual User Access Review 2019) by developing exclusion rule and recipient rule as per the business requirements
  • Upgrade Apache Tomcat from 8.5.x to 9.0.x on all the production servers.
  • Fixing IQ Service errors/warnings during provisioning of groups/roles.
  • Provided solutions on the missing information of the ServiceNow tickets, which was integrated into SailPoint.
  • Developed forms, Identity Triggers, quick links, Rules, Email templates related to Vendor management thru IIQ Dashboard
  • Experience Splunk Administration and configuration with SSO enablement.
  • Experience in implementing data retention policies and creating various Splunk roles and groups
  • Modified the Leaver Workflow with the changes in Sunset Identity and Sunset Delete Identity workflow and rule libraries.
  • Re-designed the Rehire Workflow with a customization in the rule level.
  • Developed the Identity Trigger Rule and Exclusion Rule for Mover Certification.
  • Rectified null pointer exception issue for role/entitlements with the change in the Field Value Rule.
  • Pruned the old/unnecessary cubes in IIQ from the OOB Task for which a rule was run before pruning to transfer the assigned roles from the old cube to the new cube.
  • Automated the manual work items generated for logical applications with a provisioning rule.
  • Splunk dashboard creation and advanced searching and reporting
  • Used SQL Query to fetch the required information from the corresponding application and SailPoint table.
  • Email Template Report Development for the daily monitoring of the scheduled tasks/servers and the terminated user

Confidential - New York

IAM/SailPoint

Responsibilities:

  • Support in Analysis of the business requirements and present design review to estimate the timeline required to complete the project.
  • Actively involved in code reviews, discussions and infrastructure reviews, interacted with internal project teams and managers.
  • Analyze, design, develop document and lead to set the Multi-tenant, Hybrid Cloud Framework of whole SAAS DevOps of CA leveraging Utmost CAAS.
  • Upgrading from 6.4 to 7.0 and involved in installation of SailPoint IIQ in various environments like UNIX and Windows.
  • Experience in deploying Splunk in large distributed Splunk environment with 5TB of license
  • Production error monitoring and root causeanalysis using SPLUNK
  • Worked on integrating Okta with commercial Billing applications.
  • Worked on troubleshooting the issues encountered in Okta during the application integration with SAML, provisioning of users, importing of users etc.
  • Part of Privileged Access Management (PAM) Remediation and Engineering team whose role is to secure Web Based applications on user access and authorization.
  • Expertise in using J2EE technologies like JSP, Servlets, EJB, JDBC, Java Beans, JMS, RMI JNDI, XML and Web services (RESTful and SOAP).
  • Having Knowledge in JavaScript frameworks, Java Beans, which includes Angular JS,
  • Work closely with SailPoint architect and engineers for design and solution architecture Implementation of Self Service feature of SailPoint IIQ.
  • Implementation of Password features (PTA, forgot password, Change Password) of SailPoint IIQ.
  • Involved in CyberArk significant updates from 8x to 9x versions for domestic and worldwide clients.
  • Created several different dashboards for multiple different teams and clusters
  • Troubleshoot Splunk components like forwarders, indexers and search heads and performance issues
  • Good comprehension of policies in CyberArk Central Policy Manager (CPM) and (PSM).
  • Resolved CyberArk issue's in CPM to communicate with a host to accommodate credentials.
  • On-boarded Privileged Accounts and Super User IDs in the CyberArk Safes utilizing Bulk upload utility.
  • Administer Splunk as well as create, test and deploying operational search strings.
  • On boarded new data into a multi-tiered Splunk environment.
  • Responsible for design and implementation of SailPoint IdentityIQ.
  • Designed and implemented Okta SSO and Okta MDM from ground up with 150+ SAML/SaaS applications. Worked with more than 40 different groups to integrate their applications to SSO.
  • Development of infrastructure automation in AWS (EC2, DynamoDb, Lambda, EBS, RDS, Dynamo, ELB, EIP etc) with AWS Cloud Formation.
  • Upgraded the IdentityIQ from 7.0p2 to 7.2p2
  • Built Joiner, Mover and Leaver workflows to maintain user accounts.
  • Design and implementation of Users database access provisioning, de-provisioning and password reset management using SailPoint Identity IQ. Created and ran the aggregation task to bulk load authoritative source data from Active Directory, Exchange and LDAP.
  • Familiar with Access Governance and Compliance, with knowledge of engineering SODS.
  • On boarded various applications like delimited file, AD etc.
  • Tested build map rules, creation rules and customization rules to create Employee and Contractor user accounts in SailPoint from their current application's exported feed files.
  • Implemented provisioning, de-provisioning and other related functionalities for new application.
  • Worked on ping federate both inbound and outbound calls using SAML 2.0.
  • Developed BuildMap rules, Pre-Iterate rules and Customization rules.
  • Configuration and development of SailPoint Life Cycle Events (LCM).
  • Build and Configure SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
  • Set up Containerized SAAS, Docker Incentive Pusher for Bench-mark among hypervisor-less Docker, and hypervisors with KVM, Xen, ESXI & Hyper-V
  • Experienced in using IAM/PAM tools for deployment, configuration, integration and troubleshooting of CyberArk Privileged Account Security product suite - Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application Identity Manager, and Privileged Threat Analytics.
  • Involved in Sailpoint migration from 7.0 to 7.0p6.
  • Experience in Java, Servlets, Java Beans, JavaScript.
  • Experience in using SAML 2.0. WS-FED, OAUTH2.0 to implement SSO to external web applications in SiteMinder, ADFS, OKTA and AZURE AD.
  • Involved in design and implementation of IdentityIQ solution in FDIC, configuring Active Directory, and Shared Folders.
  • Design complex exclusion rules, correlation and data loading tasks in Identity IQ.
  • Involved in all phases of testing from creating test cases to sending the reports for validation approvals.
  • Develop complex workflows and service adapters in the SailPoint Identity IQ configuration interface
  • Using Form Models Concept creating the Identity IQ objects like Quick links, Forms, Rules, and Custom Objects to design the workflows.
  • Design correlation and data loading tasks in IdentityIQ.
  • Reviewed business requirement documents and created QA test scenarios and tested Office 365 email user migration project. Verified Office 365 email migrations in LDAP directories, including Active Directory. conversion scripts using SQL, stored procedures, functions and packages to migrate data from SQL server
  • Managed client requirements and configure SailPoint connectors.
  • Worked with OKTA support by opening cases on several issues.
  • Worked on provisioning users from OKTA to AD and also importing users from AD to OKTA.
  • Installed Chef cookbooks and Migrated Chef Server to AWS Ops Works using which cloud services were automated.
  • Assist in updating (SailPoint IIQ) workgroups and Monitor SailPoint IIQ product functionalities.
  • Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs. Environment: Java, Bean Shell, JavaScript, SailPoint 6.x,7.0,7.0,7.2p2, SAML, OKTA, OIM, Clear Case, Clear Quest, MS Access, Sybase, AWS, Visio, Excel and SQL (TOAD), Active Directory, LDAP, Oracle10g, MySQL, XML, Flat,

Confidential - Malvern, PA

IAM/Sailpoint Engineer

Responsibilities:

  • Installed, Configured, Designed and implemented SailPointIdentity IQ.
  • Involved in building, testing, supporting and determining SailPoint Identity IQ Solution design.
  • Worked on onboarding connectors like Active Directory, LDAP and other Out of the Box connectors, UNIX and Outlook Office 365.
  • Consult and configure access management policies for customer applications using enterprise level identity management tools.
  • Troubleshoot and tune Splunk deployment for servers,applications and network devices
  • Create and optimize Alerting, Reporting and advanced dashboards
  • Worked on leading IAM concepts such as Least Privilege, Privileged Access, Roles and Data Mining, Segregation of Duty and Role Based Access Control (RBAC).
  • Extensively worked on identifying, analyzing, and resolving defects and issues with SailPoint IIQ.
  • RabitMQ, foreman & Chef configuration for repo of 3d Android VM & Multimedia Saas Optimization. ARM-backend node.js on Raspberry Pi & Cisco WEBGL/OpenGL ES3 iaas, over node.js for mobile game cloud
  • Actively involved in the implementation of SailPoint & IdentityIQ
  • Extensively worked on Identity Governance including User Provisioning, Access Certifications, Access request, Workflow, Delegated Administration and Password Self-Service.
  • Worked on developing user provisioning and deprovisioning workflows, aggregation, tasks, rules and roles in SailPoint IIQ.
  • Cyber Ark integration with SIEM tool Arcsight.
  • Managed sessions in Privileged session management (PSM).
  • Generated reports of the account and devices inventories in the Cyber Ark.
  • Perform system, security, and application log and reports reviews following established procedures.
  • Provide regular support guidance to Splunk project teams on complex solution and issue resolution
  • Create multiple Splunk role based LDAP authentication
  • Good understanding of policies in Cyber Ark Central Policy Manager (CPM) and (PSM) on boarding windows and Linux accounts.
  • Involved in discussions with Okta-Workday project.
  • Hands on experience in Sailpoint product upgradation (From 7.1 to 7.2). Coordinated with Production team, DB team, App Server team to achieve the upgradation. Reviewed the existing codes and functionalities in old versions before the upgradation.
  • Worked on Out of the Box connectors provided by SailPoint IIQ and developed custom connectors using JAVA and Web Services to integrate with target applications.
  • Developed and Implemented Restful Web Services using Spring REST Framework.
  • Designed and deployed SailPoint Identity IQ to connect to data sources on diverse agency networks and integrated SailPoint IIQ data with multiple external databases and applications.
  • Worked with multiple agencies to identity unique requirements and characteristics and translate them into the design of overall system.
  • Administered user accounts and profiles and performed test planning and test activities for SailPointApplication post patch application.
  • Interacted with application teams that manage major user repositories and need to automate user access request process, to gather requirements, design and deliver solution to integrate with the existing IDM implementation.
  • Troubleshoot logon and access permission issues, to enable successful application and project timelines.
  • Installation of SailPoint IIQ in various environments like UNIX and Windows.

Environment: SUN IDM SailPoint IIQ 6.2, Core Java, J2EE, Okta, JDBC, Apache, AWS, AJAX, IAM, XML, JavaScript, MySQL, JavaScript, MVC, HTML5, CSS PL/SQL

Confidential - Indianapolis, IN

IAM Engineer

Responsibilities:

  • Extensively gathered requirements from all users, experts, and key personnel to understand the current functionality of the existing system.
  • Involved in the development of Solution Design Overview document and technical document.
  • Developed Interactive web pages using AJAX and JavaScript.
  • Involved in developing XML, HTML5, and JavaScript for client side presentation and data validation on the client side within the forms.
  • Developed Web Services using Restful to retrieve data for client. side.
  • Implemented workflows in IIQ and provisioning in SailPoint IIQ using SAP HR and Active Directory connector.
  • Implemented a Restful service to retrieve forgot username and password flow.
  • Configuration of Roles, Policies and Certifications for governance compliance enhancing rules, aggregation, workflows, entitlements, groups, workgroup, etc.
  • Designed and implemented solutions which manage the Identity lifecycle of almost all applications with the enterprise, without directly controlling the identity store within the application.
  • Deployed several out-of-box connectors to connect various client Systems (JDBC, LDAP, AD, Oracle Database Direct)
  • Manage SailPoint installation, integration, provisioning and connectors (AD, PeopleSoft HRMS (read).
  • Involved in documentation during various phases of product life cycle.
  • Setup applications Active Directory, LDAP, Oracle and Flat Files.
  • Provide guidance to business people to inform, instruct, and educate to help them make their individual deployments effective and successful.
  • Using IIQ Console for operations such as checkout, import, connector Debug.
  • Performed Access re-certification, automatic manual remediation for applications managed for Employees and Contractors.
  • Developed Rules like Build Map, Correlation, Exclusion, Policy Violation, Policy Formatting etc., as part of connector development.
  • Build pre-populate adapters for updating Active Directory attributes using the business logic and business rules.
  • Worked on customizations and improvement on SailPoint IIQ 6.3 for a customer in financial sector
  • Designed and implemented solutions which manage the Identity lifecycle of almost all applications with the enterprise, without directly controlling the identity store within the application.
  • Customization of the SailPoint IIQ product to implement enterprise security and access control.
  • Collaborate within a team to develop, manage, execute and own overall project plan.
  • Conducted reviews on project plans to get key deliverables on given timelines.
  • Interacted with the development and testing teams to improve overall quality of the Application.
  • Performed unit testing and involved in bug fixing of the applications and actively involved in production related issues.

Environment: Java, J2EE, JavaScript, XML, Active Directory, LDAP, Apache Tomcat, Oracle, IIQConsole, IQService, LCM.

Hire Now