Ping Identity Engineer Resume
Camp Lejeune, NC
SUMMARY
- Experience working as project lead in many IAM projects in large organizations
- Extensive experience in designing and implementing IAM infrastructure
- Work experience in world’s leading companies
- Deep knowledge of Identity & Access Management and Directory technologies
- Experience in installing and maintaining Pingfederate 8.x and 9.x across different environments
- Experience working as Ping Architect in PingFederate deployment with IWA integration for NTLM Authentication, as well as PingAccess deployment
- Experience working with Ping Directory, Ping One and Ping ID
- In - depth understanding of SAML, OAuth, Kerberos, LDAP, ADFS and other related Identity and Access Management concepts
- Good knowledge about Identity and Access Management standards, principles and practices
- Worked on designing, implementing large directory deployments supporting millions of record bases
- Experience working on other IAM technologies like Radiant Logic VDS, SiteMinder, etc.
- Experience working as project lead in many Siteminder deployment and integration projects
- Excellent communication and interpersonal skills
TECHNICAL SKILLS
Platforms: Linux/UNIX, Solaris, Windows Server 2008, 2012
Technologies worked on: PingFederate, Ping Access, Ping Directory, Ping One, Ping ID, Radiant Logic VDS, CA Siteminder, CA IDM, CA Directory, Sunone LDAP, ODSEE, CyberArk, Splunk Enterprise, Sailpoint, Chef, Vmware, AWS, PHP, Python, Java, Azure, Openstack, Nagios, Grafana, Sensu, WebSphere, iPlanet Enterprise Server, PIX firewall, SIEM Tools, Cacheflow/Blue Coat proxy servers, LDAP, Accrue CRM Log Manager, Macromedia, Jrun, Resonate, Interwoven Teamsite, Empirix Monitors, Oracle- PL/SQL
PROFESSIONAL EXPERIENCE
Confidential, Camp Lejeune, NC
Ping Identity Engineer
Responsibilities:
- Migration of data and policies from legacy solutions to Ping deployment
- Integration of Oauth, OpenID Connect with IAM systems on both Windows and Unix/Linux platforms
- Integration of Ping products like Pingfederate, Ping ID and Ping One
- Installing Ping Access in clustered and high-availability mode
- Configuring SSO with Ping Access using authentication schemes such as form based, certificate based etc
- Defining and enforcing Pingfederate policies
- Configuring Pingfederate in service provider and identity provider configurations
- Pingfederate integration with SAML,WS-Federation, OAuth, OpenID Connect, and WS-Trust
- Performance tuning for Pingfederate for high-transaction volume deployments
Confidential, Galveston, TX
Ping Identity SME
Responsibilities:
- Maintenance of Pingfederate deployment including performing upgrades, patches, and ensuring availability.
- Define and configure policies for Pingfederate
- Clustering with Pingfederate for high availability and high performance
- Configuring provisioning failover and configuration synchronization
- Integration of Ping with OpenID Connect, SAML, SOAP, WS-Security and OAuth
- Coordinating application onboarding to Ping deployment
- Work with vendors on troubleshooting and platform upgrade activities
Confidential, New Carrollton, MD
IAM Engineer
Responsibilities:
- Work with application teams to gather SSO requirements and build out a solution
- Worked on multiple projects designing and integrating VDS solutions
- Designed and implemented RadiantOne 5.2 infrastructure to interface with the backend treasury application suite.
- Worked on Radiantone VDS and Siteminder integration project
- Worked on implementation of Multi Factor Authentication using CA AuthMinder
- Worked on implementing tools like Wily and Splunk to log and analyze Siteminder performance and unauthorized access to networks
Confidential, Auburn Hills, MI
Identity and Access Management SME
Responsibilities:
- Worked as Subject Matter Expert in the Enterprise Identity Management engineering team.
- Designed and implemented RadiantOne infrastructure to interface with the backend application suites.
- Performed day to day administration, patch upgrade and application integration for the Radiantone infrastructure.
- Worked on the Siteminder policy server from 5.5 to 6.0 migration project.
- Hands on involvement from the early design phase through to planning and testing phase of the 6.0 migration project.
- Involved in policy design, migration and administration of the Identity Management Corporate Infrastructure using SunOne LDAP user store, Netegrity Siteminder 6.X, SunONE LDAP policy store, Oblix and Novell Edirectory
Confidential, Pittsfield, MA
Identity and Access Management SME
Responsibilities:
- Worked as Subject Matter Expert for Netegrity Siteminder and Radiantlogic virtual directory technologies
- Worked on the design, migration and administration of the Radiant Logic virtual directory, SunOne LDAP and Netegrity Siteminder 5.5 deployments
- Worked on migration of web applications from legacy systems to Radiantone infrastructure
- Worked with application teams to deploy Siteminder and LDAP.
- Worked on designing LDAP and Siteminder 5.5 security infrastructure.
- Hands on installation of the infrastructure using SunOne LDAP policy store and key store