We provide IT Staff Augmentation Services!

Sr. Cyber Security Consultant Resume

SUMMARY:

  • Around 8 years of experience in Information Technology, which involves in Design, Implementation and Hands on experience on LDAP, Identity &Access Management and Single Sign - on products.
  • Experience in providing Single Sign-On across enterprise application using PingFederate improving technical efficiencies in Identity & Access Management and SingleSign-On space involved in designing and implementation of end-to-end security solutions.
  • Worked on Pingfederate Upgrade from 7.0 to 8.3 and 8.3 to 9.0 on Linux and Window's platforms.
  • Worked on PingAccess Gateway to take the Application traffic directly using Virtual Hosts and redirect back to the application with PingAccess Token.
  • Worked on Enterprise Users Single Sign On through browser and through services with third party application hosted in enterprise or cloud using Ping Federate, Ping One.
  • Experience in configuring PingOne to enable PingID.
  • Engaged in the implementation of new Authentication methodologies like PingID.
  • Integrated PingAccess with Pingfederate System to get authenticated by Pingfederate and Authorized by PingAccess Servers using the Access Control Lists.
  • Experience in Pingfederate using SAML and integrated with SiteMinder authentication.
  • Integrated both IDP and SP initiated SSO using Pingfederate and with external partners.
  • Experience in deploying SAML based highly available solutions using Pingfederate and other security products, can create and process the SAML to get tokens which can be processed by other Web Access Management Products.
  • Integrated PingAccess and Pingfederate using OAuth. Worked on Implementing OAuth Configuration with the Clients to get the Access Token to access the web API’s.
  • Experience in designing and implementing enterprise directory services which includes but not limited to DIT, Schema Design, and multi-master replication on Oracle Internet Directory (OID), MS Active Directory.
  • Integrated OAuth with PingAccess to protect Restful API’s.
  • Customized the Password Management plugin in Oracle Access Manager.
  • Installed and configured connectors for MS Active Directory, MS Active Directory Password Synchronization, and Oracle E-Business suite.
  • Worked on ID Token to get the user information from user info endpoint and send to OAuth client in the form of scope.
  • Experience in doing Web service federation (WS) between two web services using SAML and by creating connection between the two SOAP Service clients.
  • Worked on Token Generator and Token Processor to establish a connection between two web services from different Enterprises and PingAccess and JWT tokens to authenticate the user using Pingfederate.
  • Worked on PingAccess Integration with Pingfederate to Protect the applicationsusing PingAccess Tokens.
  • Extensive experience in installing, configuring and administering MSActive Directory, Internet InformativeServices(IIS), Apache Tomcat, SunOne/iPlanetWebserver.
  • Installation/configuration/troubleshooting of issues in Oracle Identity Management suite (Oracle Internet Directory, Oracle Access Manager(OAM), Oracle Identity Manager(OIM).
  • Implemented Active Directory Federation Services (ADFS v2.0) to enable transparent Single Sign-On capabilities for access to Workday applications. Active Directory migration and management for multiple offices.
  • Experience in debugging of authentication / authorization related issues and creating Rules, Responses, Realms and Policies in SiteMinder.
  • Upgraded SiteMinder from R12 to R12.52.
  • Using Pingfederate, PingOne worked on enterprise users Single Sign On through browser and through services with third party applications hosted in enterprise or cloud.
  • Expertise in Installation, configuration, deployment and maintenance of the SiteMinder components like Policy Server, Web Agent, Policy Store and Key Store.
  • Maintained Active Directory content. Creates user accounts and sets up necessary user workstation application software.
  • Integrated Open LDAP to work with Pingfederate Server as Data store to authenticate the user and to bind the Attributes of the user into SAML.
  • Improved SiteMinder and LDAP performance, High Availability. Designed and implemented solutions for Load Balancing, fail-over and monitoring the growth capacity planning.
  • Experienced in supporting LDAP and SiteMinder in production environment.
  • Worked on Unbound User directory to replace the Existing Oracle Directory Server ODSEE.
  • Excellent communication and interpersonal skills and ability to learn fast has helped me grow faster in the Industry.

TECHNICAL SKILLS:

Single Sign-On: Ping Access 3.0/4.0, PingFederate 7.0/8.0/9.0, SiteMinder R12 SP2, SP3 / R6 SP1, SP2, SP4, SP5, SP6 /5.5 Webagent 4.x,5.x,6.x,12.x, APS 4.0, SAP Agents 5.6/12 and Session Linker r12

Operating System: Solaris 8/9/10, Unix, RedHat Enterprise Linux AS 2.1/3.0, SUSE Linux 10, Windows Server 2000/2003/2008.

Directory Server: Netscape Directory Servers 4.x, SunOne/iPlanet server 5.x,6.x MS Active Directory, Oracle Directory Server 11g, OUD 11g and iPlanet meta Directory Server 5.x.

Servers: IBM WebSphere, SunOne/iPlanet Webserver, BEA WebLogic, JBoss, SunOneapplication server, IIS, Apache and Apache tomcat

Tools: Wily Monitoring tool, Big Brother Monitoring, HP OpenView, OneView Monitor, CA Business Intelligence

Databases: Oracle 8/9i/10g/11g, MySQL and MS SQL Server 2005,2008

PROFESSIONAL EXPERIENCE:

Confidential

Sr. Cyber Security Consultant

Responsibilities:

  • Valuable experience in analyzing IAM logs, IAM application server logs, provisioning server logs to troubleshoot various authentication/endpoint related issues.
  • Co-ordination with Server hosting team if any hardware related issues.
  • Co-ordination with Ping Federate vendor if any software related issues.
  • Maintained both Test and Production servers for Ping Federate along with the cluster management and timely replications to deploy changes to servers.
  • Experience in collaborating with teams to determine systems requirements and functionalities needed in LDAP.
  • Upgraded Ping Federate from lower to higher version both for Console and Engine server (From 7.3 to 8.2 and 8.2 to 9.0).
  • Integrated Ping Access with Ping Federate System to get authenticated by Ping Federate and Authorized by Ping Access Servers using the Access Control Lists.
  • Integrated both IDP and SP initiated SSO using Ping Federate and with external partners.
  • Experience in deploying SAML based highly available solutions using Ping Federate and other security products, can create and process the SAML to get tokens which can be processed by other Web Access Management Products.
  • Worked on Token Generator and Token Processor to establish a connection between two web services from different Enterprises, JWT tokens to authenticate the user using Ping Federation.
  • Extensive experience in Client interaction and support maintenance engagement in Web Authentication and implemented Web Access Management Solutions using Ping.
  • Experience in Ping Federation using SAML and integrated with CAS authentication.

Environment: Oracle LDAP Directory Server 11.0g, IBM WebSphere, SQL Server, HTML, SQL, MS Visual, Pingfederate 8.3, 9.0, SAML 2.0, SAML1.1, WS-FED, OAuth2.0.

Confidential, IL

Sr. IT Security Consultant

Responsibilities:

  • Upgraded ping Infrastructure from 7.1 to 8.3.
  • Migrated SiteMinder to ping access by providing the solution.
  • Created the Single sign on for third party applications using ping federate.
  • Created connection between the Identity provider and service provider for external partners using the ping federate.
  • Developed shell scripts for backing up current setup and upgrading between different Ping Federate versions.
  • Developed custom Ping Agent using Ping SDK.
  • Working on OAuth Integration with Clients to get the Access Token to access protected API’s and on Ping Access Installation and Configured with Ping Federate to Authenticate and Authorize the users for both web and API based applications.
  • Experienced in doing WS-Trust federation between two web services’ using SAML.
  • Working on CoreBlox adapter to create SAML from SMSession and on Open Token Adapter to create OpenID Token for the native applications.
  • Deployed PingOne in Cloud and integrated with PingFederate on premise
  • Designed, deployed and supported highly available and scalable Ping Federate infrastructure inAWS and On-premise that provides single-sign- on (SSO) and federation solutions for internalaccesses.
  • Implemented OAuth & OpenID Solutions using Ping Federate.
  • Deployed Policy Agents across different HTTP and application servers: Apache, JBoss, Jetty,Tomcat.
  • Worked on Upgrading SiteMinder Policy servers from 12.0 sp3 cr11 to 12.52 sp1 CR04 and implemented Scripts onall Policy Servers to recycle.
  • Experience in Azure infrastructure management (Azure Storage, Azure AD and Office365).
  • Experience in working with Windows Server 2008, 2012 R2, 2016 Active Directory and Administration.
  • Planning and implementing Disaster Recovery solutions, capacity planning, data archiving, backup/recovery strategies, Performance Analysis and optimization
  • Worked on Upgrading Web Agent from 12.0 cr01 to 12.52 cr01 on IIS, Apache servers.
  • Successfully completed version upgrades from CA SiteMinder R6 to R12, involved in the Sun Onedirectory server upgrades to11g.
  • Installed and configured webagents on IIS Web Server which is using IIS7, IIS7.5 and Linux server with Apache 2.2,2.3.
  • Upgraded agents from R6qmr3 to R12sp3 and registered them to talk to R12 Policy Servers.
  • Upgrade some of our environments Policy Server from R12 to R12.5sp1 to use federation services.
  • Assessment, Architecture, Design and implementation of identity and access management solutions in large enterprise environments.
  • Integration of identity and access management solutions into customers' infrastructure and applications.

Environment: Oracle LDAP Directory Server 11.0g, IBM WebSphere, SQL Server, HTML, SQL, MS Visual, Pingfederate 8.3, SAML 2.0, SAML1.1, WS-FED, OAuth2.0, Active Directory, Oracle DSEE 11g, Web Agents,Active Directory, SAP, JBoss 5.2, Apache 1.x/2.x, IIS 6,7,7.5,8.0 JDK 1.6, J2EE, EJB, JSP.

Confidential, CA

IT Security Consultant

Responsibilities:

  • Upgraded ping Infrastructure from 6.1 to 7.1
  • CA single Sign On is migrated to Ping Federate 7.1 based on the SAML
  • Implemented OpenID and OAuth solutions using Ping Federate.
  • Implemented JWT token instead of traditional http headers.
  • Established both IDP and SP connections with third party applications to allow users to SSO usingPing Federate.
  • Worked on different Ping Adapters to accept the credentials, cookie, RSA token and generate the SAML.
  • Integrated various LDAP’s as user store to Ping Federate to authenticate the user.
  • Migrated SAML Based SSO partners from CA Single Sign-On federation to Ping Federate 7.
  • Hands on CA SiteMinder primary Security Operations.
  • Used Ping API to deploy and create SAML changes.
  • Implemented Design Security Network on CA Single Sign On.
  • Created Custom Adapter replacing SiteMinder 3.0 Ping Federate Identity Provider adapter.
  • Created the LDAP scripts which monitors the LDAP connectivity and alerts the Admin Group if connection is closed.
  • Performed dib clone operations to recover the LDAP data, and added servers into replication treeand created new tree into the environment.
  • Developed shell scripts for backing up current setup and upgrading between different Ping federate versions
  • Implemented OAuth & OpenID Solutions using Ping Federate.
  • Configured and supported SAML based Identity & Service Provider connections with several SaaS Partners.
  • Designed and deployed migration of SAML partner connections from Oracle Identity Federation & Simple SAML systems to Ping federate.
  • Performed POC for Ping Access Authentication Solutions.
  • Designed, deployed and supported CA (Layer7) Mobile API Gateway (MAG) in AWS and On-premise.
  • Enabling Single Sign On (SSO) feature for existing application integrating with Azure Active Directory.
  • Responsible for preparing documentation for each application and providing the Run Book to the Operations team to troubleshoot issues.

Environment: IBM WebSphere, SQL Server, CA SiteMinder, HTML, SQL, MS Visual, Pingfederate 7.1, SAML 2.0, OAuth2.0, AD, Java, PowerShell, Oracle ODSEE 11g, Web Agents, Policy Servers Oracle LDAP Directory Server 11.0g.

Confidential, TX

IT Security Consultant

Responsibilities:

  • Integrated applications to enable Single Sign-On (SSO) / Federation login in by coordinating with application development and business team
  • Developed Custom adapter IDP and SP Adapters, created adapters to prevent the DOS attack
  • Worked on different Ping Adapters to accept the credentials,cookie, RSA token and generate the SAML.
  • Implemented SSO solution in multiple OS environments using Cookie Provider.
  • Implemented Ping Federate solution with Services like AWS, Service-Now, Salesforce, Oracle Fusion.
  • Involved in Requirements gathering, development if required, integrating and testing for enabling SSO for the application.
  • Designed common framework for Single Sign-On implementation for partners using Ping Federate.
  • Ping Federate Performance tuning for supporting support heavy traffic. Responsible for successfully completing POC.
  • Involved in Requirements gathering, development if required, integrating and testing for enabling SSO for the application
  • Architecture and implementation of Identity and Access Management (IAM) solution using Ping Federate, Risk-based 2-Factor Authentication (using RSA Adaptive Authentication) and OAuth 2.0.
  • Worked on Ping Access POC to migrate applications from CA Site minder to Ping Access.
  • Integrated Ping Access with Ping Federate servers to Authenticate using custom Adapters.
  • Deployed several Ping federate integration kits for Apache, Java, PHP, Agentless etc., to establish the “first- and last-mile” implementation of a federated-identity.

Environment: Pingfederate 6.1, SAML1.1, WS-FED, Active Directory, Java, C#, PowerShell.

Confidential

IT Security Consultant

Responsibilities:

  • Sun one LDAP Directory and CA SiteMinder is installed, configured, administered on Sun Solaris 2.8 and Windows 2000,2003 Server. Single Sign on is implemented across the multiple domain.
  • Under the Single-sign on environment created the policies, rules, realms to protect the applications we are working with
  • Upgraded Sun One Directory server from 5.1 to 5.2. Provided level 3 support for LDAP/SiteMinder issues.
  • Implemented load balancing and failover mechanism for SiteMinder Policy Server, Sun One LDAP Directory Server.
  • Implemented SSO across multiple domains, and created two level of authentication for additional security.
  • Migrated large amount of LDAP data across the environment to create a identical production environment to support load testing.
  • Implemented new techniques to support priority syncing for replication of important object.
  • Migrated large amount of LDAP data across the environment to create a identical productionenvironment to support load testing.
  • Installed Option pack for Policy server and Web agent for configuring the Federated SecurityServices and User Identity between partner sites.
  • Performed dib clone operations to recover the LDAP data, and added servers into replication treeand created new tree into the environment.

Environment: Windows 2000,2003, Netegrity SiteMinder 5.5, 6.0, Web Agents 4.x,5.x,6.x, Sun One directory server 5.1,5.2, IIS, IPlanet Web Server5.0, IBM HTTP Web Server,Sun Solaris 2.8.

Hire Now