Senior Iam Consultant Resume
3.00/5 (Submit Your Rating)
OBJECTIVE:
To seek a challenging position in an organization, that best utilizes my technical and managerial skills.
SUMMARY:
- Certified Confidential Identity Management Administrator, LDAP, Confidential IDM, NDS/eDirectory, Linux,PKI, 2Factor Safenet Authentication, Active Directory, Nagios Monitoring and Windows servers.
- Excellent Troubleshooting and RCA skills
- Over 6 years of experience as Security Analyst
- Dexterity in resolving audit and security related issues and vulnerabilities
- Very good at automation of maintenance, monitoring and configuration processes.
- Skillful in coming up with cost - cutting strategies for existing processes
- Deftness in Project Management, making architectural decisions and proposing workarounds.
- Expertise in Confidential Identity Manager Configuration/Implementation/Administration.
- Excellent at 24/7 production support and handling War room situations.
- Strong Communication and interpersonal Skills.
- Experience in working under pressure and reaching the targets.
TECHNICAL SKILLS:
LDAP: Confidential eDirectory, Active Directory, SunOne Directory Server, OpenLDAP, LDAP Softerra Browser,Apache Directory Studio
IDM/IAM: Confidential Identity Manager
Scripting: UNIX SHELL,PERL
Operating Systems: MAC OS X, MS-DOS, WINDOWS (9x/XP), UNIXLINUX, WINDOWS (NT/2000), SOLARIS, AIX
Web/Application Servers: TOMCAT, JBOSS
Web Servers: APACHE
EXPERIENCE:
Senior IAM Consultant
Confidential
Responsibilities:
- Provide development and support for a large scale Confidential IDM deployment, implementations and upgrades of Confidential Components.
- Helping business in Understanding the LDAP bind service accounts, Unix/Linux accounts for authentication and application binding.
- Creation of roles and automated provisioning of users based on business requirement.
- LDIF scripts for bulk user data modification and creation.
- Experienced at automated scripts based on requirement like Bulk Password policies etc.,
- Schema extension which includes creation of new customized Object Classes and attributes significantly used for SAML applications.
- Responsible for leading and creating Identity & Access Management (IAM) technical delivery of IAM components (i.e. Confidential ).
- Develop custom IDM SOAP, JDBC drivers to integrate the new billing system for Confidential Customers.
- Worked on the remedy upgrade projects which helps in automatic synchronization of roles, users to Remedy and helped users to request roles via requests and automatic assignment of roles without IAM team’s help which also gets approved by set of role approvers and IAM manager approvals.
- Road map to upgrade the New IDM Engine from 4.0.2 to 4.6 with all the latest patches and migrate the drivers to the new IDM version and verify the connectivity with different test cases.
- Coordinating migration validation tests with the app owners once application servers are migrated and assigned to a new Active Directory Site.
- Support of system outages, fixes and enhancements.
- Liaison across business and users to resolve support issues.
- Problem escalation and ownership to resolution.
- Incident and Change Management skills on Remedy.
Senior IDM Engineer
Confidential
Responsibilities:
- Provide development and support for a large scale Confidential IDM deployment, implementations and upgrades of Confidential Components (RBPM, EAS).
- Develop custom IDM connectors to integrate the new environment into the current User Provisioning infrastructure.
- Develop Workflows for User Creations, Role Assignments, Unix Account creations and Modifications with automatic Password generation with email notifications.
- RBPM migration from UA 4.0 to UA 4.5
- Develop Workflows to Create, Modify Users for external applications integrated with IDV to automate and reduce efforts for IDM team members.
- Developed and integrated AD, De-limited text driver to sync users from IDV to AD based on the requirements.
- Validated new reviews to check for accuracy and correct user and access content.
- Followed up with users and managers to provide assistance and ensure reviews are completed.
- Followed up with application administrators to ensure any revoked user access was removed and escalated any past due requests to their management.
- Provided evidence for Audit requests.
- Define operational control requirement for IAM operational and engineering team
- Define control objective and measurement for the corresponding IAM controls
- Report and resolve control issues with IAM teams and other stakeholders
- Define, measure and test IAM controls effectiveness
- Operate the Audit Management framework for IAM related audit
- Provide response to all internal, external, regulatory, SOX, and any audit related Request for Information (RFI)
- Identify and communicate all audit issues/trends and audit related risks to stakeholders
- Prepare stakeholder for audit readiness.
- Track status of IAM issues.
- Responsible for updating/modifying BULK user data with the help of LDIF’s.
- Responsible for generating client delivery documentation such as technical requirement design documents, Visio diagrams, and technical component presentations.
- Assisted with management of end user accounts, user access groups and entitlements using applicable tools and applications.
- Created new user accounts and respond to user transfer and termination events.
- Assisted with management of changes to accounts, user access groups and entitlements and ownerships based on requests.
- Drafted comprehensive reports to document bugs and design flaws.
- Executed day-to-day Identity and Access Management control activities using the Confidential IAM system. These controls activities included Access Provisioning, Joiners/Movers/Leavers lifecycle events, Access review and Certifications, Segregation of Duties, Account correlation.
- Primary support for the IDM team to resolve account propagation and sync error issues for users across the globe.
- Troubleshoot profiles for new and current end-users in various platforms such as Active Directory, SAP Database, Salesforce, Apache LDAP, GPASS (IDM Password System), Confidential IDM(iManager) systems, CyberArk, eDirectory, Outlook, Citrix applications and other Web-based applications.
- Troubleshooting escalated Incidents, ServiceNow ticket requests, other system access issues.
- Utilized Excel for pulling reports, auditing, metrics, graphing, surveys and automated user access uploads
- Assesses risks of various solutions and different options for one or more application areas
- Provisioned regular user accounts and Admin ID's in eDirectory environment, Apache LDAP, Identity Vault technologies
- Provisioned accounts in IDA Systems.
- Provided Audit reports in multiple systems and applications including but not limited to IDM, Active Directory.
- Developed working relationships with other work groups
- Implemented documented security standards, procedures, processes, guideline and policies, such as user authentication rules using Identity Management software called Confidential iManager.
- Well verse in troubleshooting multi-systems and multi-platforms regarding end user's common and in-depth technical issues
- Implement and test code via Confidential Designer 4.x.
- Utilize Confidential 's Designer for IDM to develop design and validate functionality, imported design into DEV environment and presented solution to client.
- Responsible for all Confidential IDM install, support and upgrades.
- Provide Weekly and Monthly Status Reports to client facilities include Confidential Suppliers.
- Verify SLA's are met by providing detailed Uptime and MS Security patch reports.
- Incident, Problem and Change management via SNOW.
- Provide team leadership, sponsorship and mentoring for team members and colleagues.
- Provide global second and third level support for all IAS systems.
- Training global associates on processes and second level support.
IDM Engineer
Confidential
Responsibilities:
- Confidential Identity Management Architecture, Development and Production Support.
- Implementations and upgrades of Confidential Product.
- Design and Propose Software implementations
- Maintain and Control Staging and Production Environment.
- Subversion Implementation for version control integrated with IDM environment
- Implement Backup and Restore procedures for IDM implementations.
- Design and develop connectors to automate the synchronization of users, Developed and Integrated Fan-Out driver for AIX/RHEL integration to automate provisioning on 800+ Servers.
- Critique developed business processes and use cases, translating them to technical requirements, and designing provisioning/de-provisioning workflows, data mappings to automate the users provisioning with Password synchronization.
- Responsible for generating client delivery documentation such as technical requirement design documents, Visio diagrams, and technical component presentations.
- Enhancing and integrating existing access request and provisioning technologies to a variety of IAM solutions.
- Integrate role-based access control, user provisioning, and reconciliation services with existing applications, systems, and network devices.
- Installing/configuring/Implementing Identity Manager Components eDirectory 9.0.1, iManager 3.0.1,IDM 4.5.4,EAS,RBPM and Access Manager AG,IDP and Admin Console.
- Installing the service packs, updating patches and bug fixes.
- Manages the authentication and authorization infrastructure in IDM.
- Created a Build-Book for the whole component infrastructure.
IDM Security Analyst
Confidential
Responsibilities:
- Responsible for leading and creating Identity & Access Management (IAM) technical delivery of IAM components (i.e. Confidential ).
- Design and implement connectors and technical components for authentication, authorization, identity provisioning, physical security, and audit & monitoring solutions.
- Resolving LDAP related issues
- Helping/advising with configuration of various Confidential objects.
- Creating replication environments
- KEDB Documenting procedures for the client
- Integration &Configuration of PeopleSoft systems, Active Directory, SAP and Exchange related applications.
- Ensures technical strategy alignment of standard client SDLC (System Development Life Cycles).
- Working with Confidential ( Confidential ) IDM product suite and Installing and Upgrading Confidential eDirectory (8.8.6.5) and IDM (4.0.2) suite.
- Analyzing threat advisories and making sure client Environment is safe from vulnerabilities.
- Troubleshooting Password sync from AD to LDAP and downstream applications.
- Coordinating migration validation tests with the app owners once application servers are migrated and assigned to a new Active Directory Site
- Support of system outages, fixes and enhancements.
- Liaison across business and users to resolve support issues.
- Problem escalation and ownership to resolution.
- Change and Release Management.
- Compliance to audit, regulatory and GIS Standards requirements.
- Process and Procedure, knowledge base maintenance.
- Ongoing team training and cross-training.
- Helping end users with desk side/browser based problems related to web.
- Training the Admins onsite with new Site setup
- Writing monitoring and reporting Scripts
- Managing SuSe Linux Enterprise Servers (SLES 11 SP3 and SP2) which include: Patch Management.
- Managed delegated administration, Password Policies, Authorization process, Complex approval process.
- Creation/modification of Access Policies based provisioning as per business needs, email templates for email notifications.
- Build resource adapters, access policies, integrate role-based access control, end-user provisioning, and synchronization services with existing applications and systems.
- Incident and Problem management via BMC Remedy Ticketing
- 24/7 Support
- Build IDM Directories and Environments with optimal role definitions
- Enabling debugging in IDM
- Tuning efforts to stabilize the whole environment.
- APAC point of escalation for the team
- Review, plan and implement change requests for Infra-weekend events.
- Successfully performed DR test on PROD applications.
- Review various Confidential (Global Change Management System), which have a global effect on our servers/ services and approves/rejects them.
- Working with Confidential ( Confidential ) IDM product suite and Installing and Upgrading Confidential eDirectory (8.8.6.5) and IDM (4.0.2) suite.
- Provide various trainings to New Joiners/team members and Service desk.
- Access rights review and user account management
- Adding/removing/altering user roles in IDM
- Taking regular backup of IDM environments and directories.
- Fixing IDM related issues like Password Sync failures, Data mismatch from PeopleSoft (source) to respective target systems (AD, SAP, Application and Web servers etc.).
- Monitoring LDAP services - NDS/ Confidential eDirectory by performing health checks and checking the data and time replication errors in the replica ring.
- Bulk uploads of external users into LDAP using LIDF, Groups creation and Administration.
- Creation of Application accounts for integrating applications to LDAP either for Authentication purpose or accessing attributes/data from LDAP to their application.
- Renewal of SSL certificates and implementation of certificates on all Servers periodically.
- Implementation and Maintaining Managed PKI infrastructure in client’s environment which uses Digital Certificates for providing Authentication and Authorization services to end users.
- Fixing End Users issues related to Password reset, Email Sync, Data Sync, Email Encryption and VPN related Issues, using ticketing system like BMC, DELL Remedy tools.
- Installation and configuration of Nagios Monitoring service to monitor all drivers configured across various servers.
- Annual OS and Managed PKI Software Patch Upgrades on all Red Hat Linux PKI and LDAP servers for 100% availability and productivity.
- Writing the deployment scripts and deploying the applications.
- Automating the backup process of application, configuration files and scripts.
- Monitoring LDAP,IDM Servers.
- Monitoring the health of Applications, resources utilization, Memory Usage
- Worked as Level 3 administrator in assisting remote connection issues.
- Assisted in Enrolling Symantec PKI certificates for VPN and enabling in email encryption.
- Managing Remedy queue, ensuring that all critical and VIP requests are resolved promptly and efficiently.
- Perform Shift Technical Lead duties such as training of Tier 1/2 staff, preparing daily maintenance and outage reports, assigning daily duties to other team members, and coordinating backup support during staff resource shortages.
- Identifying and implementing process improvements.
- Perform maintenance and communication of existing, new and evolving mobility/ remote practices, knowledge base articles and documentation. Ensuring mobility/ remote implementations are in line with security policies and government standard.
- Searching for the core dumps and heap dumps if exits analyze them to identify the cause of a problem.
- Troubleshooting database issues like connections to database and networking issues
- Testing the complete request lifecycle to isolate the problem and identifying the origin area of problem.
- Complete application support and troubleshooting application related issues and co-ordination with the client and development team.