We provide IT Staff Augmentation Services!

Iam Analyst Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Experienced IT Manager and Senior Enterprise Architect with 20+ years of good performance; successfully leading enterprise customer engagements focused on Management and Enterprise Architecture. Worked with clients to identify business needs and collaboratively developed and implemented appropriate state - of-the-art technology solutions. Excel at building strong and lasting business and executive relationships.
  • Led team in design, development and implementation of Enterprise Identity and Access Management capabilities utilizing IBM Identity and Access Management technology
  • Led team in development of architecture and establishing standard for integrating Identity and Access Management capabilities across Legacy Systems, Cloud, Mobility, and CyberSecurity
  • Developed and maintained IAM strategy and roadmap, both tactical and strategic
  • Managed strategy, planning, architecture, and technology evaluations to drive the building and maturing of Enterprise IAM capabilities
  • Performed requirements elicitation, translated requirements to functional and technical requirements, and led solution design
  • Led solution design and implementation of Privileged Identity and Access Management solution (Cyberark)
  • Researched available IAM technologies, evaluated products and made recommendations for product acquisition.
  • Partnered with project managers in the development and implementation of IAM solutions
  • Knowledgeable in regulatory compliance
  • Familiar with Active Directory, LDAP, SAML, SSO, RBAC, PKI, and Cloud delivery models.

PROFESSIONAL EXPERIENCE:

Confidential

IAM Analyst

Responsibilities:

  • IAM Analyst supporting an IAM Cloud based IAM solution.
  • Perform day to day administrative tasks.
  • Assess IAM processes and identify areas for improvement.

Confidential

Security Analyst

Responsibilities:

  • Security Analyst supporting assessment of security architecture, access controls and design of business systems for financial industry.

Confidential

Business Analyst

Responsibilities:

  • Performed analysis of existing user entitlements for business systems
  • Partnered with Project Manager, Technical and Business Managers is assessing entitlements, verified information, and presented to IAM team for development of needed connectors

Confidential

IAM Architect

Responsibilities:

  • Developed RBAC framework, deployment plan and implementation plan for large healthcare provider organization

Confidential

Principle Consultant

Responsibilities:

  • Partnered with team members and business customers in defining project requirements
  • Developed infrastructure architecture in support of customer projects
  • Assessed requirements, developed use cases and defined data requirements
  • Developed product security architecture

Confidential, Rosemead, California

Senior Enterprise IAM Architect

Responsibilities:

  • Led or participated in process flow development
  • Partnered with Regulatory Compliance team to align IAM solutions with compliance needs
  • Created or led creation of high and mid-level IAM solution design
  • Led IAM strategy development and maintained IAM tactical and strategic roadmap
  • Collected, analyzed and clarified IAM business requirements in collaboration with business clients
  • Prioritized efforts and coordinated with stakeholders and project managers on project scheduling
  • Conducted in-depth research on IAM technologies to aid in proper effort prioritization
  • Maintained knowledge of current and emerging technologies and trends
  • Led technology evaluation, selection and acquisition justification
  • Assessed existing environment, identified gaps and provided recommendations to senior management on approach and solutions to address identified gaps
  • Conducted requirement analysis and functional & detail design reviews
  • Developed and presented business cases to Executives for project approval
  • Developed strategy and architectural direction for the Identity and Access Management and related initiatives
  • As a member of the Enterprise Architecture Review Board, performed and participated in architectural and technical design reviews of planned business systems
  • Presented Identity and Access Management strategy and direction to management and executives
  • Led solution design efforts integrating Identity and Access Management services into Legacy, Mobility and Cloud business solutions
  • Led user provisioning, RBAC, entitlement management, Single sign on, federation and privileged access management solution design and deployment
  • Developed and maintained Identity and Access Management Strategic Roadmap
  • Attained approval and funding for Cybersecurity and Identity and Access Management projects
  • Participated in creation of RFPs and review of RFP responses
  • Partnered with Project Managers, development teams, IAM administrators and application owners in development IAM solution implementation
  • Assessed scope changes and schedule/budget impacts
  • Mentored teammates in IAM advanced capabilities and alignment with Cybersecurity
  • Led PKI technology evaluation, product selection, solution design and implementation of an enterprise certificate management system utilizing Entrust technology

Senior Enterprise Architect

Confidential

Responsibilities:

  • Partnered with business and technical leadership to identify technology and solution needs
  • Partnered with Security and Compliance teams to ensure regulatory compliance mandates are met
  • Analyzed and clarified business requirements
  • Conducted requirement analysis and functional & detail design document reviews
  • Performed technology evaluations, defined strategic direction and initiated activity to meet objectives
  • Led solution design and oversaw solution delivery
  • Developed project documentation addressing scope, deliverable, risks and processes
  • Developed and maintained strategic technology and IT capability roadmap
  • Managed relationships with key product stakeholders
  • Developed and Presented strategic technology directions and plans to business executives and senior management
  • Evaluated emerging technologies and presented technology trends and maturity to the leadership team
  • Developed and maintained strategy to integrate Identity and Access Management services into corporate Mobility, Cloud solutions and Information Security.
  • Experienced in SaaS, Cloud, High Availability, Disaster Recovery, Converged Systems
  • Led or participated in development of process flows
  • Led or participated in project development
  • Led or participated in development of project justifications, scope and implementation plans
  • Led or participated in presenting project justifications to leadership team for approval
  • Developed Enterprise Architecture principles, standards, guidelines and governance to direct selection and implementation of Information Technology solutions within the Enterprise.
  • Participated in creation of RFPs and review of RFP responses
  • Evaluated COTS packages and determined ability to meet business needs
  • Mentored Solution Engineers, Enterprise Architects and Technology specialists to ensure alignment between business solutions and alignment with Enterprise Architecture standards
  • Managed vendor relations and engagements
  • Led Security strategy development and maintained Security roadmap
  • Experienced in TOGAF and Zachman Enterprise Architecture frameworks

Manager

Confidential

Responsibilities:

  • Managed computing infrastructure administration team across two data centers
  • Performed technology evaluations, defined strategic direction and initiated activity to meet objectives
  • Successfully managed project to replace aging mainframe and computing infrastructure
  • Managed vendor activity and coordinated with internal technical team
  • Managed a multi-million dollar budget
  • Performed problem analysis and led resolution
  • Developed and maintained computing infrastructure capacity plans
  • Evaluated and successfully implemented the server virtualization technology for Windows, Linux and UNIX servers.
  • Managed disaster recovery and high availability of computing infrastructure

We'd love your feedback!