We provide IT Staff Augmentation Services!

Solution Architect Resume Profile

Tempe, AZ

Professional Summary:

  • Experience on building Business Transformation Solutions augmented with Business Intelligence, Analytics, and Transformation aligned with regulations compliance i.e. HIPAA, PCI, SOX, more through optimal utilization of emerging technologies. Experienced in the following disciplines:
  • BPM modeling integration KPI's dimensions following Kimball and Inmon methodologies
  • Business Intelligence tools Tableau Software, Eclipse BIRT, IBM Cognos, and LogiXML
  • Expertise in technology infrastructure development, data architecture, security, communications, and regulations compliance on global enterprise with governance
  • Experienced in auditing/compliance/operations risk and similar control analysis
  • Experience at a financial institution and/or an SEC registrant and in governance regulations compliance in SOX, GLBA, COBIT, BS-7799, ISO/IEC-17799, HIPAA, ICD-10-CM-PCS, PCI
  • Experience in BMC Remedy / Service Delivery Technology
  • Identity and Access Management including Federated Management RSA Tokens
  • Role Based Access Control RBAC on Identity Management solutions
  • In depth experience in Computer Forensics laboratory practices procedures
  • Performed several examinations on compromised / suspected systems
  • Maintain multiple budgets planning, organizing, directing, and controlling work efforts
  • Maturity Models-methodologies i.e. Carnegie Mellon's, RUP, Gartner, Zachman Framework
  • 10 years Enterprise Architecture, Security and Audit: focus on data privacy, confidentiality, integrity, availability aligning security policies, best practices, and compliance
  • Lead IT Protection projects involving strategy, implementation, support, optimization of IT operations, business processes, resiliency, security, and data integrity
  • Facilitate business process design as it relates to managing identities and access privileges such as architecture, delegated administration, workflow, and access control models

Technical Experience Summary:

  • IBM Tivoli Access Manager TAM , Identity Manager TIM , Directory Integration TDI , Federated Identity Manager TFIM , API integration, custom adapter development LDAP, DB2 , custom FESI/IBMJS development, and Web services integration
  • Oracle Access Manager OAM , Oracle Identity Manager OAM , Oracle Identity Analytics
  • Architected Web applications using J2EE, JSP, Spring Struts, MVC, CSS, RSS, AJAX, JSON
  • Computer forensic tools EnCase / FTK, ILook, Sleuth Kit/Autopsy
  • IBM WebSphere Commerce Server, Eclipse/RAD, SVN/CVS, Apache Ant

Advisory Software Engineer Resume Profile

  • Project Manager/Developer - England Hursley : Coded in Assembler, C , J2EE for CICS interface support for WebSphere on OS390 Unix-AIX
  • Developer - USA Santa Theresa : The project VTAM XRF and API's
  • Project Manager/Developer - Canada Don Mills : IBM C / SAA compilers for Cobol2, C , RPG for VSAM, DB2/UDB, DDM on VM, MVS-ESA, DOS/VSE, Windows, OS2
  • Assistant Architect Canada HQ : Research, design, development of Common Delivery Mechanism now named MQ Series
  • Project Manager - Canada HQ : Lead 30 designers/developers for a nation-CRM Analytics, Intelligence, Transformation using Open-Systems multi-vendor/platform delivery on MVS, VM, AS/400, RS/600, Lotus Domino, Web Sphere, DB2/UDB
  • IBM-RTC: Onsite beta-testing of ITIM5.0 on business viability of the product suite

Professional Experience:

Solution Architect

Confidential

Managed Services: strategy, goals for the enterprise architecture framework and policies:

  • Delivering designs on strategic development and the delivery of comprehensive information security and privacy program external or internal threats.
  • Overseeing the creation of a centralized architecture, ensuring designs effectiveness, and sustainable Business/Information/Data/Application/Infrastructure
  • Develop and enforce Honeywell IT security policy, standards, and procedures
  • Develop an Information Security road map and oversee its implementation
  • Define and align IT risk management framework with enterprise risk management framework
  • Evaluate and ensure compliance of IT activities with IT policies, standards and procedures
  • Periodically review and validate user access rights and privileges
Information Security Officer

Confidential

  • Responsible for the activities finances audit compliance of the organization i.e. budgeting and reporting operating expenses and capital expenditures. Oversee operating expense and capital planning processes including the generation of long-range strategic plans, annual budgets, and monthly forecasts. Identify strategic business performance opportunities by collaborating with business leaders. Maximize value added activities and eliminate non-value added activities.
  • Steward Unified Business Processes using IBM-RUP encompassing Business, Technology, and People unifying the transformation roadmap on process, program, and portfolio, all linked together for agile development, deployment, maintenance.
Chief Security Office

Confidential

  • BPM-RBAC engineering including definition of job function roles and configuration of the Tivoli Identity Manager TIM to provision user access to enterprise resources. Work with internal clients across business and technical units to implement RBAC to efficiently provision user accounts and maintain security compliance.
  • Lead Business Analytics unifying corporate RBAC on cross-team coordination with business unit managers and engineers following Kimball and Inmon methodologies using Tableau Software.

Hire Now