Identity Management Architect Resume
Washington, DC
SUMMARY:
- Over 22 years of experience in IT industry
- Specializing in Oracle Identity Management suite of products: Access Management (OAM/OAAM) and Identity Governance (OIM/OIA/OPAM)
- Identity and Access Management design, analysis, best practices and Enterprise Architecture (High - Availability, Disaster recovery and Active/Active support for MDC) including Password Management, LDAP Management, Provisioning, Delegated Administration, Self-Service, Role-based Access and Lifecycle Management.
- Access Management, Authentication and Authorization, Single Sign-on (SSO) and Federation
- Solid experience in using design patterns, J2EE (Java, JSP, JMS, Servlets), SOA, Web Services, message level security (XML Signature and XML Encryption, WS-Security 1.0 and 1.1, WS-Trust, WS-Secure Conversation, WS-Security Policy), transport level security (SSL), SAML and frameworks (ADF, JSF, Web Center).
TECHNICAL SKILLS:
Operating Systems: Windows, UNIX (Solaris, HP-UX, Linux, RHEL, AIX), VMWARE
Identity Governance: Oracle Identity Manager, Oracle Access Manager, Oracle SOA Suite, Oracle Business Intelligence Suite, Oracle Identity Analytics, Oracle Privileged Account Manager, OVD, OUD, DSEE, Oracle Fusion Middleware, WebLogic, Sun Identity Manager, Site Minder, Ping Federate, Single Sign-on, DSEE, PKI, Openssl, Web Center.
High availability and disaster recovery: OAM/OIM/OIA/OID/OVD High availability, scale out/scale up and disaster recovery, OAM Active/Active Multi-Data Center (MDC) deployment, DataGuard, Weblogic cluster, EMC SRDF, Oracle RAC, NetApps Snap Mirror
Programming Languages/Databases/Frameworks: RDBMS (Oracle, DB2, MS SQL), PL/SQL, SQL, J2EE (Java, JSP, Servlets, JMS), ADF, Skyros, Struts, JSF, JavaScript, ETL, Fusion Middleware, XpressAnalysis and Design: OOA/OOD, UML, OMT, Rational Rose, Borland Together, Design Patterns, Visio
Protocols: FTP, SMTP, SOAP, HTTP, HTTPS, SFTP, SSH etc.
PROFESSIONAL EXPERIENCE:
Confidential (Washington DC)
Identity Management Architect
Responsibilities:
- As an Architect, provided technical guidance (that included gathering, architecture, design, implementation, documentation, deployment, code reviews, resolution of the audit related issues, best practices, etc.) on successful integration of ~40 new applications into Identity Management infrastructure in order to automate ACL s. Scope of the assignment included consuming data from the data source, building reusable parser, configuring resource/user/data owner/etc. s, setup up reports, import data Accounts, Roles and Glossary, building glossary and roles
- Reviewed/Analyzed existing Identity platforms and provided recommendations as for Architecture, performance tuning (achieved 30-50% improvement as a result of this effort), best practices in deploying solution, application integration, etc.
- Provided roadmap, POC/Demo and design for integration of the ~50 applications into the new Identity Management platform. Scope: account administration, s, reporting, etc.
- Provided OIM Upgrade roadmap
- Managed offshore/onshore teams, responsible for success of the projects.
Confidential (Los Angeles, CA)
Identity Management Architect
Responsibilities:
- As an Identity Management Architect, provided technical guidance to address immediate, short term and long term needs of the client that included:
- Addressed immediate availability issues of all existing OIM, OAM environments as well as maintenance and support of all OIM, OAM, OVD, OID environments
- Executed code reviews and Implemented various Application customizations (OIM, OID, OVD) (custom OIM scheduled task, extension of LDAP Schema, etc.)
- Reviewed/Analyzed existing Identity Platform and provided Architecture recommendation that would address OIM scalability and availability issues
- Provided Road Map for OIM, OAM, OID, OVD upgrade
Confidential( Foster City, CA)
Identity Management Consultant
Responsibilities:
- As a result of successful collaboration with talented Oracle Engineering and Support teams, Oracle introduced T2P cloning process for OIM/OAM/OBIEE Applications. T2P cloning process facilitated Confidential production deployment and considerably simplified/speeded up creation of the new OIM environments.
- Implemented security hardening of the OIM/OAM platform, remediated discovered during penetration test vulnerabilities implemented OIM customizations focusing on User Provisioning and Password Management
- Implemented OIM/OIA integration (Role Mining/Role engineering, entitlements, policies, accounts, roles, users synchronization)
- Designed, implemented and deployed several SSO integrations:
- POC for Complex Single Sign-on integration that involved merging entitlements from multiple sources (OAM/OBIEE/OVD/OHS/Kerberos)
- OAM/E-Business Suite integration (OAM/OHS/EBS)
- SSO for V.me application (OHS/OAM/Kerberos)
- Provided road map for OAM Active/Active MDC support). Worked in collaboration with Oracle Engineering Team
- Provided technical guidance on correcting existing OAM /OIM/ OIA Architecture, move from Simple Deployment to Enterprise Deployment and address issues of High-Availability and Disaster recovery. Implemented the solution.
- Engaged in successful project that allowed to significantly improve performance of DSEE infrastructure that supports authentication to thousands UNIX (Solaris, AIX, Linux) servers
- Provided Road Map for Moving OIM to Partitioned deployment Architecture (Complete separation of Back-Office (Scheduled jobs) and Front-Office (interactive web interfaces)). Worked in collaboration with Oracle Engineering and Support teams.
Confidential (Pleasanton, CA)
Identity Management Consultant
Responsibilities:
- Performed assessment of the existing Identity Management Solution
- Provided roadmap, short term and long term strategies for the system improvement based on industry best practices. Scope included architecture/infrastructure, code enhancements, product integrations, etc.
- Performed an upgrade of the Identity Management system. As a part of this project, existing environments were reset to production, code management and build process were adjusted to the industry standards
- Designed and implemented integration with SAP GRC Access Control. This included:
- Integration of Compliant User Provisioning and Super User Privilege Management capabilities of SAP GRC Access Control: automation of Firefighter Ids assignment by creating a request in CUP
- Submission of the requests to SAP Access Control for Segregation of Duties (SoD) compliance, request status retrieval, support of the multilevel approvals, escalations, notifications, audit, password resets and automated provisioning of the requested access to the target SAP systems.
- Identified missing functionality of the provided by Oracle Identity Management product. Worked with Oracle Engineering/Support teams to provide support for SAPGRC AC IDM REQUESTDETAILS web service. (Provided requirements, design and guidance)
Confidential (McLean, VA)
Identity Management Consultant
Responsibilities:
- Identity Management Platform Deployment
- Integration Tivoli Access Manager for SSO and Authorization
- Assisted with requirements gathering and design (support for system accounts, batched e-mail notifications, reporting, custom adapters, etc.)
Confidential (Arlington, VA)
Identity Management Consultant
Responsibilities:
- Completed the design and architecture of the Enterprise Identity Management solution
- Designed and implemented Proof-of-Concepts (POC) projects focusing on User Provisioning, Role-based Access Control, Identity Audit and Compliance, Password Management, and Application Single Sign-On, integration with Microsoft Active Directory
- Designed and implemented request-base, policy-based and direct provisioning of the users, multiple levels of approvals, e-mail notifications and reporting.
- Performed upgrades, applied patches to the product, performance tuning
Confidential (Philadelphia, PA)
Identity Management Consultant
Responsibilities:
- Performed evaluation of CA, Oracle and Sun Identity Management products
- Established the strategic plan, roadmap and architecture of the Confidential Identity Management System in collaboration with Sun Microsystems Architects
- Designed and implemented Proof-of-Concepts (POC) projects focusing on User Provisioning, Role-based Access Control, Identity Audit and Compliance, Password Management and Application Single Sign-On.
- Architect, Design and Implemented Integrations with various external systems ( Microsoft Active Directory, SAP, SiteMinder, Remedy, and custom applications), Employee On-boarding and tracking, self-registration and password reset
Confidential (Detroit, MI)
Identity Management Consultant
Responsibilities:
- Worked with the vendor on assessing the scope of a project, identifying risks, developing accurate estimates
- Installed and configured Identity and Access Manager
- Implemented Self-Service Registration, Password Management, User Provisioning and De-provisioning
- As a part of the skilled HP Architects team, provided design and architecture of the high-availability and disaster recovery solution using EMC SRDF, HP ServiceGuard and HP Continental Clusters
- Provided estimates for space allocation, server capacity
- Coordinated effort among the various teams
- Designed Security for the system
- Implemented Web Services with message (WS-Security) and transport level security (SSL)
Confidential (Detroit, MI)
Senior Consultant
Responsibilities:
- Designed and Implemented single sign-on solutions
- Architect, Design and Implementation of the Customer Notification Service - SOA based application to automate calling centers (TTS Engine, Web Services)
Confidential (Farmington, MI)
Senior Consultant
Responsibilities:
- VIP Rep Agreement Portal that facilitates signing of the service agreements for phone services
- MyACN Portal automates activities of sales representatives
Confidential
Senior Consultant (Troy, MI)
Responsibilities:
- As a part of the team, designed and implemented customer Internet Portal (NIF) used to automate retail business activity
- Designed and implemented role-based workflows
- Designed and Implemented external system interfaces
- Performed application troubleshooting and addressed performance issues
Confidential (Troy, MI)
Senior Consultant
Responsibilities:
- Design and implemented Quick Loan Internet Portal aimed to automate mortgage business activity (pulling user credit report, running loan through Fannie May automated underwriting engine DU for underwriting eligible mortgages)
- Designed and implemented internet detector module for Offline version of the application.
- Designed and Implemented interface with external system.
Confidential (Troy, MI)
Consultant
Responsibilities:
- Confidential Online Banking System ( Confidential, Confidential )
- Onboarding (designed to automate human resources activities)
- ITK ( Confidential asset management system) www. Confidential .com www. Confidential .com www. Confidential .com
Confidential (Piscataway, NJ)
Consultant
Responsibilities:
- Designed and implemented a set of common components/framework to support “System Service Level Manager (SLM)” application that was leveraged by other team members
Confidential (Troy, MI)
Software Engineer
Responsibilities:
- Provided design and implementation of the http://www. Confidential .com e-Commerce Internet portal.