Security Engineer Iam Sailpoint Resume
NY
SUMMARY
- Around 6+ years of experience in Analysis, Design and Development of enterprise applications using Java, J2EE, Identity and Access Management (IAM) Technologies.
- 3+ years of experience as a SailPoint IdentityIQ Developer.
- Experienced in Agile Development.
- Good understanding on Identity Access Management (IAM) concepts like Identity Life Cycle, Identity Provisioning, De Provisioning, Aggregation, Application Onboarding, User Onboarding, Workflow Design.
- Aggregating users into Sailpoint through Authoritative applications like Active Directory, WorkDay, PeopleSoft, Oracle DB.
- Good Experience in Installation and Upgrade of SailPoint IdentityIQ Versions.
- Expertise in creating and modifying workflows for implementing business processes.
- Customization and configuration of workflows for provisioning accounts across various internal and external systems in Sailpoint IdentityIQ.
- Developed LCM Events like Joiner, Rehire, Leaver in IdentityIQ.
- Developed Custom Workflows, Rules in IIQ.
- Created Various Business Roles and IT Roles to get access for end users.
- Configured Identity Risk Rating in IIQ and developed a rule to set base risk scores for all Entitlements, Roles and Policies.
- Created a Population to assign Risk Scores by doing Refresh on Identity.
- Configured Services Standard Build & Services Standard Deployment (SSB/SSD).
- Created many Quick Links which triggers a workflow to Provision user access.
- Scheduled daily Tasks to run aggregation and assign roles for new users.
- Onboarded WebServices application to create accounts through afterProvisioning Rule.
- Implemented Multi Factor Authentication using OKTA.
- Worked on custom Email Templates.
- Privileged Account Management experience with BeyondTrust PasswordSafe.
- Experienced in developing applications using three tier architectural frameworks such as MVC (Model, View and Controller), Struts, Spring Framework, Hibernate.
- Strong knowledge on Core Java Collections, Lists, HashMap
- Working experience with source control solutions like BitBucket Git.
- Extensive experience in design and development of multi - tier applications using Java, J2EE, Hibernate, XML, AJAX.
- Created a Privileged Onboarding Workflow where it creates an account based on the workgroup users select.
- Experience in Client-Side Technologies like HTML, CSS, JavaScript.
- Hands on experience with industry standard IDE like Eclipse.
- Experienced in developing database to create its objects like tables, views, stored procedures, triggers in Oracle, MS SQL Server.
- Strong experience in handling different web application servers like Apache Tomcat, WebSphere.
- Strong knowledge in developing WebServices using SOAP, REST API, OAuth 2.0, SCIM API.
- Good knowledge on Linux SSH Sessions and debugging through PuttY.
TECHNICAL SKILLS
SailPoint: IdentityIQ 6.4, 7.0, 7.1, 7.2p1, 7.3
Java & J2EE: Core Java, JSP, JDBC, Hibernate
Programming Languages: C, C++, Java, Linux Shell Scripts
Databases: Oracle, MySQL, MS SQL Server
Web Servers: WebSphere, Apache Tomcat
Web Technologies: HTML, CSS, JavaScript
Network Protocols: TCP/IP, UDP, SMTP, HTTP, DHCP, DNS, FTP
Tools: Ant, Maven, Log4j, PuttY
PROFESSIONAL EXPERIENCE
Security Engineer IAM SailPoint
Confidential, NY
Responsibilities:
- Upgraded SailPoint IdentityIQ from 7.2 to 7.3p2 in multiple environments.
- Developing Lifecycle Manager workflows, Lifecycle Events, Certifications, Reports, Custom Email Templates, Task Definitions, Rules, Business/IT Roles.
- Created Organizational Business, IT Roles for various application entitlements.
- Aggregation refresh of data from authoritative, non-authoritative applications to IdentityIQ using direct connectors like Active Directory, Delimited Files, JDBC, Azure, Workday, RSA, Oracle.
- Configured Zoom Connector for provisioning and deprovisioning of Zoom licenses through IIQ.
- Responsible for implementing scoping, preparing reports, task definitions and rules for onboarding process.
- Created Identity Selector Rules to assign a business role based on requirements.
- Configured Multi Factor Authentication with RSA Secure ID Application for enabling two factor authentication.
- Provision user access, manage applications, assign roles using LCM.
- Developed a Privileged Account Management workflow to create PA Accounts with higher privileges in IdentityIQ.
- Performed Access management and reporting using Compliance Manager
- Key responsibilities included assisting the client in their Role Based Access Control and Separation of Duties (SOD) policies initiatives.
- Configured Rally Connector and created provisioning policy to create users.
- Developed reports, analytics using the Identity IQ provided role/user/audit search.
- Continuously supporting end users by working on Level 3 Incident Tickets in ServiceNow.
- Configured SSB (Services Standard Build), SST (Services Standard Testing) & SSP (Services Standard Performance), SSD (Services Standard Deployment).
- Configured Identity Risk Rating through Custom Rule and Created Custom Task Definition to assign Risk Score to identities.
- Implemented Single Sign-On solution for both internal and external sources for validating access levels.
- Created many quick links to automate the process of creating domain accounts, Physical Access Requests and VPN Requests, generated reports through rules.
- Worked on UI Customizations for Manage Passwords Page.
- Developed Various Custom Email Templates for Password Change, Access Requests.
- Used GIT Repository for check-in/checkout and merging the various code versions.
- Implemented Access Certification, Automated Provisioning & Governance aspects of IIQ.
- Integrated Beyond Trust Power Broker Application in IIQ through web service connector to provision and deprovision the Access.
- Experienced in database creation and maintenance and thorough understanding of IdentityIQ DB structure and design.
- Based on ClientID, Client secret and domain onboarded Azure AD Application.
- Implemented Self-service feature, Password management feature, Provisioning feature and forgot password change in Sailpoint.
- Responsible to manage Administration functionality of the Sailpoint such as loading data, create roles, create policies, scheduling tasks and certifications and reports.
- Deployed Rules and Workflows directly to IIQ through Eclipse.
Environment: SailPoint Identity IQ 7.2p1, 7.3p2 LDAP, Active Directory, Azure AD, Apache Tomcat 8.0, Beyond Trust Pacman, XML, Oracle DB, REST API, SCIM API, PuttY, Core Java, Bean Shell Scripting, ServiceNow, Linux.
Security Engineer IAM SailPoint
Confidential, TX
Responsibilities:
- Worked on email write back for authoritative source when the user email has been terminated.
- Implemented the rule for assigning the G3 email to the identity automatically if having a particular agency email domain, which would even assign the Linked mailbox and kiosk through IT role provisioning policy.
- Implemented multiple level of approvals for few entitlements.
- Worked on Active Directory Connector AfterCreate rule to create mailUser for an AD account.
- Created the Run rule task to change the user’s active status, disable the accounts and remove the roles based on the end date.
- Worked on RACF Account creation with new RACF ID captured in email and sent to the requester and Manager.
- Assigning Business Roles to user based on the user agency using Identity selector rule.
- Performed the transfer of contractor to employee and strip off the user roles based on the requirement, leaving the email roles untouched.
- Worked on Rehire Lifecycle event trigger rules and workflow.
- Created Job change trigger rule based online of business and workflow to update AD attributes.
- Following the document from Compass performed SSB to build and deploy complete prod environment to Dev to work identically.
- Worked on various connectors like AD, JDBC, Webservices, Delimited file connectors.
- Implemented web services connector for provisioning and deprovisioning of an application.
- Created before operation rule and after operation rule for Create and Add Entitlement operations in webservices connector.
- Implemented correlation rule to correlate A suffixed, S suffixed accounts based on the AD attribute.
- Implemented the build map rule in the applications to create the email when performing the onboarding.
- Implemented the Rule in the provisioning policy for the distinguishedName attribute to assign unique CN to the user based on the location.
- Created Role based SoD policies for entitlements which are of high risk.
- Implemented and Scheduled various type of User Entitlement Reviews for applications and databases.
- Modified Passwords workflow to add manager approvals when user changes passwords on non-prod applications.
- Configured Zoom Connector for provisioning and deprovisioning of Zoom licenses through IIQ.
Environment: SailPoint Identity IQ 7.0, 7.2p1, 7.3, Bean Shell Scripting, ServiceNow, Linux. Active Directory, XML, Apache Tomcat 8.0, Beyond Trust Pac, Oracle, SQL Server, REST API, SCIM API, PuttY, Core Java, Hibernate
SailPoint Consultant
Confidential, GA
Responsibilities:
- Involved in complete implementation of SailPoint IQ 7.0 version.
- Development of Lifecycle Manager Workflows, Lifecycle Events, Certification Events, Custom Email Templates and Task Definitions.
- Integrate SailPoint IQ 7.0 technologies with in-house and third-party applications for birthright provisioning, access request approval and fulfillment, provisional, custom workflows.
- Created Life Cycle Events Joiner, Rehire, Leaver.
- Performed the task of onboarding UAR data into SailPoint.
- Provision user access, manage applications, assign roles using LCM.
- Followed RBAC Framework to give access only through Roles.
- Performs IAM technical support and development, including monitoring and responding to server events, ensuring data replication, gathering IAM statistics, and performing general maintenance by working with Level 2 and/or Level 3 operations personnel.
- Configured Eclipse IDE SailPoint Plugin to deploy code directly to IIQ Environments.
- Develop complex workflows and service adapters in the SailPoint Identity IQ configuration interface.
- Worked with various application teams to establish connectivity AD, eNovell Directory, Peoplesoft, Windows Local Direct.
- Created a rule where the work items get rejected automatically after certain time period.
- Created Single Sign-On Authentication Rule in IIQ.
- Implemented Desktop Reset, Provisioning feature and forgot password change in Sailpoint.
- Managed client requirements and configure SailPoint connectors.
- Rewriting the workflows to encompass the new way of provisioning. Restructured the entire product to reflect direct provisioning across many applications.
- Responsible to manage Administration functionality of the Sailpoint such as loading data, create roles, create policies, scheduling tasks and certifications and reports.
Environment: SailPoint Identity IQ 7.0, AD, JDBC, Active Directory, PeopleSoft, XML, Tomcat 8.0, SQL server, REST Web services.
Java/ SailPoint Developer
Confidential, GA
Responsibilities:
- Designed and implemented Access Certification, Automated Provisioning and Governance aspects of IIQ.
- SailPointprovisioning via both out of the box SailPoint connectors, and custom written Java code connecting to a variety of systems via mechanisms such as SOAP and REST web services, JDBC, custom API’s etc.
- Rewriting the workflows to encompass the new way of provisioning.
- Restructured the entire product to reflect direct provisioning across many applications. In the process of upgrading the IdentityIQ product from 6.1 to 6.4.
- Onboarded Oracle DB Connector in IIQ.
- Implementation of different direct/custom connectors to connect Mainframe (RACF), Unix and Oracle...etc.
- Installed and configured RACFSailPointconnector to integrate with Mainframe systems.
- Wrote policy rules to ensure SOD and written new workflows to reflect business needs.
- Design and developed a shell script to find on a server all the users who has sudo access, then generate a report that can be run from the CRON (UNIX system scheduler).
- Built a customized task to generate manager certificates in bulk to improve the Technical and Functional Acceptance Testing process efficiency.
- Implemented and Customized theSailPointproduct to configure products (such as BladeLogic, TAM, and OIM), systems administration, operational support and problem resolution.
- Implemented Identity-aware applications using Windows Identity foundation.
- Responsible and active in the analysis, definition, design, implementation, management, and deployment of full software development life-cycle of project.
- Wrote object-oriented JavaScript for transparent presentation of both client- and server-side validation.
- Developed User Interface and implementing business process using HTML, JSP and Servlets.
- Responsible for coding SQL Statements and Stored procedures for back end communication using JDBC.
- Developed an API to write XML documents from a database.
Environment: SailPointIIQ 6.4, J2EE, JUnit, HTML, CSS, JavaScript, Hibernate, SQL Server, SVN, Java 7, Bean shell script, Tomcat 7, Apache, Ant, AJAX, Log4J, XML.
Java Developer
Confidential
Responsibilities:
- Implemented object/relational persistence for the domain model.
- Implemented the Web services and associated business modules integration.
- Worked on generating the web services classes by using Service Oriented Architecture SOA, WSDL, UDDI, and SOAP.
- Developed and implemented the MVC Architectural Pattern using Struts Framework including JSP and Action classes.
- Responsible for developing Use case diagrams, Class diagrams, Sequence diagrams and process flow diagrams for the modules using UML and Rational Rose.
- Involved in Preparation of the technical design documents and involved in identifying and implementation of different J2EE design patterns like Service Locator, Business Delegate, and DAO.
- Involved in Units integration, bug fixing, and User acceptance testing with test cases.
- Developed the presentation layer using JSP, Struts Tag libraries, HTML, XHTML, CSS and client validations using JavaScript.
- Used Struts MVC framework for configuring the application.
- Responsible as CVS administrator and for deploying web application in the Oracle App Server.
- JUnit, JMock Frameworks were used for performing unit and integration testing by writing test cases.
- ANT and Maven was used as a build tool. Also worked in an agile work environment.
- Used Log4j for logging errors, messages and performance logs.
Environment: Windows XP, JDK 1.6, JSP 2.2, Struts2.x, HTML, XHTML, XSLT, JDBC, JMS, SOAP, Web Services, Oracle 10g, Maven, JBoss 6.1, CVS, PL/SQL, and Log4j.