Ldap Admin Resume
Austin, TexaS
SUMMARY
- Relevant experience in administering and supporting Enterprise Directory services on SunOne Directory server, Privileged Access Management, Ping Access Management, Password Vault, CyberARK, Oracle Directory Server Enterprise Edition, Oracle Unified Directory, Unboundid/Ping Directory Systems, J2EE Web Technologies, web servers, application servers, LDAP, monitoring tools on different platforms Solaris 9.0, experienced in full life cycle development including analysis, development deployment, testing, documentation, implementation & maintenance of application software in web - based environments.
- Expertise in Middleware technologies on administrating directory services, web, application servers
- Strong experience in Enterprise Security Domain. In-depth knowledge of LDAP and Identity & Access management products.
- Implemented multi master replication.
- Hands on Experience in configuring LDAP and SSL.
- Experience in problem tracing, log management, scripting to invocate problem-determination actions involving diagnostic traces.
- Deployed Applications (WAR, JAR, SAR and EAR) in Clustered environment
- Provided support for development, Test and production environments and in activities such as load testing, troubleshooting and performance tuning
- Ability to initiate to implement new concepts and applications
- Efficient in working in tighter schedules and meeting deadlines.
- Provided 24x7 production support, best practice trouble shooting, monitoring, capacity planning, performance tuning.
TECHNICAL SKILLS
Tools: Policy Server, Web-Agent, Affiliate agents), LDAPOpenDJ, Tivoli Directory server, OUD,ODSEE, Novel e-Directory, Splunk, App Dynamics, OP5, Radiant Logic.
Application/Web Servers: WebLogic Application Server, WebLogic Portal, JBOSS 5.x, Apache-Tomcat, IBM HTTP Server, Netscape Enterprise Server 3.5
ETLTools: SLAMD, UNIX Shell scripting, MS Power shell, Tomcat Web server.
Languages: Java (JDK), J2EE-Java Beans, C++, PL/SQL, SQL*PLUS 8.x/9.x, Java script, Shell Scripting, Unix scripting.
Training and Certifications: Oracle Unified Directory Server OUD, Oracle Virtual Directory Server, Tivoli Directory Server, Sun One Directory Server, ODSEE, C advanced, C++ basic and advanced, UNIX administration.
Data Modeling: Erwin 4.1, SQL Developer, SQL Explorer, TOAD 11.5, SQL Server Management studio.
Databases: Oracle 9i/10g,11g, MS SQL Server 2000, SQL Server 2005, SQL Server 2008, DB2
Operating System: LINUX (RHEL, SLES, RHAS), HP-UX (11/11i), Solaris (7/8/9/10), Windows NT/2000/2003/XP
PROFESSIONAL EXPERIENCE
LDAP ADMIN
Confidential, Austin, Texas
Responsibilities:
- Experience troubleshooting system and application accounts in a diverse systems and application architecture.
- Familiar working on password rotations, password malfunctions, account creations, account changes, accounts integrations, maintaining/creating new safes, and CyberArk policies.
- Experience building and maintaining EPV (Enterprise Password Vault) wif respect to information systems security (LDAP) and identity access management (Ping Access management).
- Managed CyberArk for Service Accounts and Privileged users profiles and access’s.
- Experience managing PAM solutions wif multiple platforms including Windows, Linux, Database Platforms.
- Installed and configured OPAM (Oracle Privileged Access Management) in multiple Cloud based (AZURE) systems.
- Installing and deploying a consolidated Ping Directory (formerly Unbound ID) -based architecture in multiple Production Environments
- Creating and installing teh monitoring agents in multiple environments includes Splunk, AppDynamics and XYMON.
- Responsible for communication between departments, application vendors and business partners as a central repository.
- Responsible for validating and testing customized scripts on installation of Ping Directory server, Ping Synchronization server, Ping Metrics server and Ping Proxy server.
- Providing Break-fix and maintenance in Production LDAP servers, Ping -Unboundid and NetIQ eDirectory.
- Integrating and deploying multiple, independent NetIQ eDirectory-based and Ping Directory LDAP client authentication systems.
- Responsible for monitoring and administration OS level and Application level outages in virtual environment (VM).
- Supporting On-going applications though service now and JIRA ticketing system
- Support and work on LDIF files and extraction of Data, providing LDAP based data to required clients.
- Working on LDAP schema extensions including OUD extend plugins supporting for all UNIX, AIX and Solaris based LDAP clients.
- Configure load balancing and failover mechanisms for various ping Directory components in different environments
- Providing 24/7 on-Call support and ensuring maximum uptime and system availability to teh business
Identity Engineer
Confidential, Chicago- IL
Responsibilities:
- Experience installing and developing Oracle Unified Directory (OUD) over different environments.
- Installed and implemented radiant logic VDS servers over multiple environments including teh Data source migration of OID, Authenticator LDAP and AD.
- Expertise working on OUD Multi-master replication Gateway and replication servers.
- Worked on Oracle fusion Middleware kit, Installing ODSM - Oracle Directory Server Manager and Application development framework.
- Experience working on different WebLogic platforms, Installed and configured WebLogic agents including one-off patches.
- Worked on LDAP scheme extensions including OUD extend plugins supporting for all UNIX, AIX and Solaris based LDAP clients.
- Migrated Unix authentication profiles from internal Linux S4 authentication to Enterprise LDAP authentications.
- Worked closely wif F5 BIG-IP load balancer teams in sever default routings including X-forward-For and other LB LDAP health Monitoring’s.
- Installed and configures OEM Oracle Enterprise manager agents across all teh environments for LDAP server stats and monitoring daily reports.
- Built custom developed Bash-shell scripts for automation jobs on OUD and VDS servers.
- Supported On-going applications though service now and JIRA ticketing system.
- Experience working on different types of Password policies accepting on OUD and Radiant Logic Virtual directory server.
- Provide On-call support for OUD and Radiant Logic VDS servers (Multi-master, supplier-consumer) in Linux and Solaris environments.
Environment: Oracle Unified Directory, Radiant logic - Virtual Directory, Oracle Enterprise Manager-OEM
Infrastructure Engineer - LDAP
Confidential
Responsibilities:
- Experience in configuring multiple LDAP instances and defined LDAP Schemas.
- Defined and maintained Sun and Active Directory (LDAP) security models
- Administered policy and user stores using teh Sun ONE Directory servers while also providing Redundancy and availability.
- Involved in Configuring SSL for high security of web application.
- On-call Support (24x7) for both Testing and Production Environments.
- Installed and configured various web agents in accordance wif teh web servers involved.
- Configured load balancing and failover mechanisms for various SiteMinder components in different environments.
- Configured multi-master replication setup in teh production environment across multiple data centers.
- Implemented Policy Stores to utilize Sun ONE Directory Server (LDAP) as teh user and policy repository on Linux.
- Configuring User Authentication Stores and Policy Authorization Stores on LDAP.