We provide IT Staff Augmentation Services!

Sr. Identity & Access Management Consultant Resume

4.00/5 (Submit Your Rating)

New York, NY

PROFESSIONAL SUMMARY:

  • Extensive 8+ years of experience in Identity and Access Management, including IT enterprise architecture, solution design, management and delivery of large complex enterprise programs and projects with multi - million dollar budgets in: Information Security, IDM/IAM/ICAM, SOA, ERP, COTS,CRM, integration, infrastructure, and application development using a wide array of
  • Setup, configured, and tested CA IDM for SAP R3, UNIX, and Active Directory endpoint role requests, workflow approvals, email notifications, and provisioning.
  • Expertise in Installation, Configuration, Deployment and Maintenance of SiteMinder Components like the Policy Server, Web Agent, Policy Store and Key Store.
  • Comprehensive blend of business and technical expertise, with full SDLC experience in CMM environment. Experienced as a critical liaison between business and technical sides, serving as a trusted consultant with relationship responsibilities.
  • Implementation solution components include: CA CloudMinder / CA Identity Manager and CA GovernanceMinder / RCM.
  • Installed, configured and maintained CA SiteMinder Policy Server 5.x/6.x, CA IDM r12.6SP4 and Sun ONE Directory Server 5.2 on Solaris, Windows platforms.
  • Strong experience in Enterprise Security Domain. In-depth knowledge of Identity and Access management products - CA Identity Manager, CA Siteminder Access Manager.
  • Involved migration of IdM platform from Sun IdM to CA IDM R12.5 (CA Identity Manager and CA Access Manager) while maintaining Sun One as the enterprise directory.
  • Installed, Configured, Administered and Monitored Netegrity SiteMinder Policy Server (5.5/6.0), CA IDM r8.1 and Sun One Directory Server 5.2/6.x/7.0 on UNIX, Linux, Windows and Solaris platforms.

TECHNICAL SKILLS:

IAM Products: CA IDM R6/R12/R12.5, CA SiteMinder R6.0/R12.0/R12.5, PingFederate6.0/7.0, Webagent R6/R12/R12.5

Directory Server: Oracle Directory Server (ODSE) 11g/10/9, Sun One Directory Server 5/6, Active Directory, CA Directory Server

Web Technologies: J2EE, HTML, JavaScript

Programming Languages: Java (core), C++, C, C# dot net

RDBMS: Oracle 8i, SQL Server 2000, MySQL 5.0

Web Servers: IIS, Apache, Tomcat, IBM WAS, Oracle Weblogic, JBoss

Monitoring and analysis Tools: CA Wily, Tivoli Monitoring, Dynatrace, Splunk, wireshark.

Incident management Tools: HP service manager, Global Event Management.

PROFESSIONAL EXPERIENCE:

Confidential, New York, NY

Sr. Identity & Access Management Consultant

Responsibilities:

  • Implementation of complete end-to-end Identity and Access Management solution from concept to operations.
  • Collaborate with all stakeholders including business and system owners, enterprise IT architecture, enterprise IT operations, IdM tool vendor, Program Management office, and end users to ensure successful implementation.
  • Hands-on implementation of CA Identity Manager R12.5 SP7 and integration services - work included environment build, configuration, troubleshooting, performance testing, tuning, and rollout of full spectrum of CA IDM functionality enterprise-wide. Provisioning endpoints include Active Directory, legacy directory services, ERP (SAP) systems, and helpdesk applications. CA IDM components: CA Identity Manager (R12.5 SP7), Policy Xpress, CA Directory (R12.0 SP7), CA Provisioning Server / Manager (R12.5 SP7). Infrastructure components: Oracle DB, Web sphere, Windows 2008, AIX.
  • Evaluate current state Identity & Access Management environment to identify gaps in areas of compliance, business strategy, enterprise architecture, process efficiency, and growth.
  • Develop comprehensive global enterprise Identity & Access Management target state based on best practices and enterprise business imperatives.
  • Develop overall enterprise Identity & Access Management architecture, strategy, and roadmap based on risk-based phased approach.
  • Author business case, business requirements, technical requirements, RFP, vendor selection criteria, and assistance with enterprise decision on IDM/IAM solution suite.
  • Tailor transition state and target state architectures to match solution suite selected.
  • Develop implementation approach, strategy, plan, and implementation schedule.
  • Assist with infrastructure design and setup, collaborating with enterprise and vendor teams.
  • Implementation solution components include: CA CloudMinder / CA Identity Manager and CA GovernanceMinder / RCM.
  • Phase-1 integration components include: Ping Identity, SAP HR, Active Directory (multiple forests with trusts), Office 365, and SAP (multiple systems across the globe).
  • In-scope areas include workforce lifecycle (joiners, movers, & leavers), Authentication & Authorization models, federation, RBAC/ABAC, BYOD, cloud-based applications/SaaS, integration of third-parties (business partners and collaborators), audit and compliance (SOx, GxP), governance, policies, and other related areas.

Environment: CA SiteMinder r12/6 sp5, Ping Federate 8.2.2, PingAccess v4, CA Directory 12.0.16,CA IDM r12.5, ODSEE 11Gr2, Sun One directory server 6.3, Apache 2.4, IIS 6/7.5/8, Solaris 8 and 10, Linux.

Confidential, Dallas, TX

Sr. Identity and Access Management Consultant

Responsibilities:

  • Setup CA IDM R12.5 SP7 in High Availability (cluster) production environment. Installed and configured CA Directory, CA Provisioning Server, CA Provisioning Manager, CA Connector Server (Java and C++), and CA Connector Xpress. Configured AD failover in High Availability environment including acquiring, exploring, and correlating multiple endpoints.
  • Trouble-shooting functionality issues including business logic, workflows, roles and groups, account templates, policies (in Policy Xpress), review of logs, etc.
  • Microsoft Active Directory user store, auto-provisioning to Microsoft Exchange, Lotus Notes, and SAP, ServiceNow authoritative source. Developed strategy and plan for Treasury-wide rollout of Identity and Access Management modernization program.
  • Provided guidance to the PMO on deployment strategy, rollout plan, transition management plan, operations and management plan for enterprise-wide program rollout.
  • Work involved migration of IdM platform from Sun IdM to CA IDM R12.5 (CA Identity Manager and CA Access Manager) while maintaining Sun One as the enterprise directory.
  • Gathered requirements and developed designs for custom workflows for CA IDM R12.5 Identity Manager environment
  • Participated in requirements gathering and design development for auto-provisioning to federal enterprise systems (including HP USAccess web services and PeopleSoft HR) in the CA IDM R12.5environment.
  • Provided guidance on flexible integration model for multiple bureau IdM systems with centralized CA IDM R12.5environment.
  • Contributed to long-term future state federated model designs of PACS/LACS in the CA IDM R12.5environment based on best practices and guidance forums including FICAM, NIST and Jericho.

Environment: CA (netegrity) SiteMinder r12,52, webagents r12.52 qmr5, CA IDM r12.5, IIS Web server 8.5, CA Directory Server r12.16, Apache 2.x. PingFederate 8.2.2, PingAccess V4.0.

Confidential, Miami Florida

Identity and Access Management Consultant

Responsibilities:

  • Hands-on implementation of CA Identity Manager R12.5 SP9, consulting and integration services work includes SAP and AD endpoint integration, setup, configuration, screen design/customizations, troubleshooting, testing, and rollout of CA IDM functionality enterprise-wide.
  • Evaluate current state Identity and Access Management environment and identify business drivers, needs, and requirements.
  • Develop Identity and Access Management target state based on best practices, business drivers, needs, and enterprise growth strategy.
  • Develop enterprise Identity and Access Management strategy and phased roadmap, design the foundation solutions and directory structure (Active Directory) to facilitate Identity and Access Management implementation enterprise-wide.
  • Participated in requirements gathering and design development for auto-provisioning to federal enterprise systems (including HP USAccess web services and PeopleSoft HR) in the CA IDM R12.5environment.
  • Setup, configured, and tested CA IDM for SAP R3, UNIX, and Active Directory endpoint role requests, workflow approvals, email notifications, and provisioning.
  • Microsoft Active Directory user store, auto-provisioning to Microsoft Exchanges and SAP R3 accounts, HR system authoritative source.

Environment: CA SiteMinder, LDAP Sun One Directory Server, Sun On web server 6, IIS, LDAP, Oracle, Sql, Java, Unix Shell Scripting, Perl, Solaris, Linux.

Confidential, South Plainfield NJ

Siteminder /LDAP Admin

Responsibilities:

  • Experience in configuring multiple Site Minder Instances with Siteminder Federation/Option Pack.(Ping Federate Equal )
  • Installed, Configured and Managed Netegrity SiteMinder 6.0.
  • Migration of policy server from SiteMinder 5.5 to 6.0 for Load balancing, and failover configuration of the Policy store.
  • Involved in Virtualization / Decommission of Siteminder policy servers and sunoneldap servers across multiple data centers.
  • Migration of Dev/UAT/PROD from 6.5 to 12.0 with 1000+ webagents
  • Involved in detailed setup for troubleshooting and implementation of support procedure.
  • Experience in configuring multiple LDAP instances and defined LDAP Schemas.
  • Experience in configuring Netegrity Siteminder 6.5/12 with Weblogic 6.0/8.1/9.2 and WebSphere Portal 6.0.
  • Defined and maintained Sun and Active Directory (LDAP) security models.
  • Administered policy and user stores using the Sun ONE Directory servers while also providing redundancy and availability.
  • Involved in Configuring SSL for high security of web application.
  • On-call Support (24x7) for both Testing and Production Environments.
  • Defined monitoring, maintenance and capacity planning for Siteminder policy servers.
  • Designed processes for enterprise Active Directory user, group, printer, file share and password policy.
  • Delivered new global enterprise SSO and LDAP architectures for development, staging and Production Environments.
  • Upgrade project plan and direction for SiteMinder version 6.0.
  • Performed the upgrade from SiteMinder version 6.5 to 12.0 in development, staging and production environments’. This included all web server agents, policy servers and Active Directory policy stores involving 2000 Plus applications.
  • Adding the LDAP certificates through ikeyman.
  • Monitored Applications and WAS performance through Tivoli Performance Viewer and tuned the system caching, queuing, JVM parameters, DB Connection Pooling.
  • Created IBM Problem Management Records (PMR) to report WebSphere Application Server problems. Analyzed log files to solve problems using debugging tools like Log Analyzer, First Failure Data Capture Tool and Collector Tool.
  • Written extensive Korn/Jacl/Jython scripts for automatic portal deployment in the lower environment.

Environment: CA SiteMinder, LDAP Sun One Directory Server, Sun On web server 6, IIS, LDAP, Oracle, Sql, Java, Unix Shell Scripting, Perl, Solaris, Linux.

Confidential

Siteminder/LDAP Admin

Responsibilities:

  • Experience in configuring multiple Site Minder Instances with Siteminder Federation/Option Pack.(Ping Federate Equal ).
  • Upgrade SiteMinder Policy Server from R6.0sp5 to R12.0sp3.
  • Installed, Configured Siteminder webagents R6.0/R12.0 on IIS and Apache.
  • Migration of policy server from SiteMinder 5.5 to 6.0 for Load balancing, and failover Configuration of the Policy store.
  • Involved in Virtualization / Decommission of Siteminder policy servers and sunone ldap servers across multiple data centers.
  • Migration of Dev/UAT/PROD from 6.5 to 12.0 with 1000+ webagents.
  • Involved in detailed setup for troubleshooting and implementation of support procedure.
  • Experience in configuring multiple LDAP instances and defined LDAP Schemas.
  • Experience in configuring NetegritySiteminder 6.5/12 with Weblogic 6.0/8.1/9.2 and WebSphere Portal 6.0.
  • Defined and maintained Sun and Active Directory (LDAP) security models.
  • Administered policy and user stores using the Sun ONE Directory servers while also providing redundancy and availability.
  • Involved in Configuring SSL for high security of web application.
  • On-call Support (24x7) for both Testing and Production Environments.
  • Defined monitoring, maintenance and capacity planning for Siteminder policy servers.
  • Designed processes for enterprise Active Directory user, group, printer, file share and password policy.
  • Delivered new global enterprise SSO and LDAP architectures for development, staging and Production Environments.
  • Upgrade project plan and direction for SiteMinder version 6.0.
  • Performed the upgrade from SiteMinder version 6.5 to 12.0 in development, staging and production environments’. This included all web server agents, policy servers and Active
  • Directory policy stores involving 2000 Plus applications.
  • Adding the LDAP certificates through ikeyman.

Environment: Siteminder, Identity Manger, NetegritySiteminder, LDAP, Active Directory, PingFederate, Active Directory.

We'd love your feedback!