We provide IT Staff Augmentation Services!

Iam Sme Resume

3.00/5 (Submit Your Rating)

Dallas, TX

SUMMARY

  • Around 9+years of experience in installation, configuration, development, deployment, migration administration, trouble shooting of CA SiteMinder, PingFederate, PingAccess, ADFS, Forge Rock, Web Servers & Application Servers.
  • Experience in integration of CA SiteMinder with web applications for authentication, authorization, and identity assertion.
  • Experience in analysis and implementation of SiteMinder upgrade and migration.
  • Implemented Federation Services across multiple platforms (SiteMinder, Azure AD, Ping Federation, Active Directory Federation Services, and ForgeRock).
  • Expertise in implementing SAML as both Identity Provider and Service Provider across multiple platforms Using SiteMinder, ADFS, AZURE AD, ForgeRock.
  • Experience in implementing failover and load balancing schemes between Web Agents and Policy Servers and between Policy Servers and LDAP.
  • Experience in integrating SiteMinder for authentication and authorization of native mobile applications.
  • Proficiency in analyzing the Root Cause, implement solutions and document Root Cause Analysis (RCA).
  • Experience in LDAP based directories like Active Directory, Oracle Directory ODSEE, Ping Directory.
  • Fine - tuned and set up High availability with LDAP and SiteMinder. Tested and implemented back up & recovery. Designed and implemented solutions for fail over and capacity planning
  • Experience in working with multiple teams to troubleshoot issues and implement fixes.
  • Experience installing X.509 Certificates on Application Servers and Web Servers using Open SSL and Key tool.
  • Excellent communication and interpersonal skills. Highly motivated, detail oriented and organized with the ability to multi-task projects, maintaining a high degree of proficiency.

TECHNICAL SKILLS

Identity Management Tools: CA SiteMinder, CA SiteMinder Webagent with Option Packs, SAML, Ping Federate, Ping Access, Ping One MFA, Azure MFA, ADFS, Azure AD, ForgeRock AM, ForgeRock IDM, ForgeRock IG, ForgeRock DS

Technologies: Web Services, JAVA, HTML.

Operating Systems: Linux and Windows.

Web Servers: Apache, IIS.

Application Server: Oracle WebLogic, IBM Web Sphere.

Database: Oracle Directory (ODSEE), ADLDS, AD, Ping Directory, Sun One Directory.

Programming and Scripting: Java, C, HTML, XML, Unix Shell scripting.

PROFESSIONAL EXPERIENCE

Confidential, Dallas, TX

IAM SME

Responsibilities:

  • Working with business stakeholders and technical teams to gather requirements to design a migration plan and to integrate applications with ForgeRock for Single Sign On in both Non-Production and Production.
  • Designing a high-level and low-level architectures
  • New ForgeRock Infrastructure build in Dev, UAT and Production
  • Building a plan to migrate legacy application to new AM solution.
  • Documented all design, development, and upgrade efforts in testing, staging and production environments.
  • Developed a custom java code and Implemented coexistence between ForgeRock and SiteMinder which enables SSO between two different SSO platforms.
  • Developed Auto scripts to start and stop the ForgeRock services.

Environment: CA SiteMinder R12.8, PingFederate, ForgeRock AM-7.1, ForgeRock IDM-7.1, ForgeRock IG-7.1, ForgeRock DS, Active Directory, JBoss EAP, Apache web server 2.0/2.4.

Confidential, Gilbert, AZ

Sr. Solution Delivery Lead

Responsibilities:

  • Working with application’s business and technical teams to gather requirement to integrate application with PingFederate/PingAccess/PingID for Single Sign On. Designing and implementing applications integration with PingFederate/ PingAccess/PingID in both Non-Production and Production.
  • SiteMinder Upgrade from R12.7 to 12.8.
  • PingFederate Upgrade from 10.2 to 10.3
  • Implemented 3 new IDP adapters provide feature rich APIs that are integrated into ping federate providing authentication flows and better fraud controls by passing all authentication and tractions through the EFL (Enterprise Fraud Layer) for risk profiling.
  • Implementing PingOne MFA platform into production providing a full set of PI to allow developers to make call directly PingOne MFA for set-up authentication (OTP, Biometrics, FIDO etc. to enroll new users, register new devices etc. in addition to allowing for customized branding and screens to meet enterprise requirements of our business lines.
  • Implemented Ping Data Sync-Pipe framework to connect to our Voyager customer database. This will result in reduced customer friction while migrating users’ credentials to Ping Directory.
  • Providing 24x7 support for SiteMinder/Ping Infrastructurein production and Non prod environments

Environment: CA SiteMinder R12.7, R12.8, Ping Access, PingFederate, PingOne MFA, Ping Directory Windows 2008/R2, IIS 7.0, Apache web server 2.0/2.4.

Confidential

Responsibilities:

  • Implemented SSO across multiple domains and Line of business.
  • Installed and configured various web agents on Apache and IIS 7.
  • ConfiguredPing Federation EnvironmentforSAML Federated Authenticationsfor users coming from partner sites by configuring ID Provider/Consumer using SAML 2.0 POST binding.
  • Designing and implementing applications with PingFederate/ PingAccess/PingID in both Non-Production and Production for Single Sign On.
  • Configure Ping ID MFA in ping Federate for providing two factor authentication methods.
  • Identify security gaps through Ping; if there is any, then will develop roadmap/solutions that fit with company/customer systems architecture standards.
  • Applied patches to SiteMinder infrastructure to meet business needs.
  • Participated in reviewing and approving changes to application and enterprise roles as part of the Role Governance Working Group.
  • Documented all design, development and upgrade efforts in testing, staging and production environments.
  • Provided24x7 support for SiteMinder/Ping Infrastructurein production environments
  • Experience in Troubleshooting urgent priority tickets with minimum response time.

Environment: CA SiteMinder R12.5, Ping products (PingFederate, Ping Access, Ping Directory), Windows 2008/R2, IIS 7.0, Apache web server 2.0/2.4, Active Directory.

Confidential, Atlanta, GA

Network & Computer System Administrator

Responsibilities:

  • Worked on the projects to design, develop and enforce the Single sign on multi-domain infrastructure.
  • Worked on a project to add additional infrastructure capacity to increase the load handling capability in the Production environment by adding 4 new servers in the Production environment.
  • Designed and built the access management solution using CA SiteMinder Policy Server r12.52, Admin UI, Secure Proxy Server r12.52 along with Directory services (ODSEE 11g).
  • Implemented OAUTH 2.0, Open ID authentication.
  • Worked on SiteMinder Upgrade from R12.52 to R12.7& 12.8.
  • Install and configure CA secure proxy server R12.52 and setup SiteMinder Federation services using SPS.
  • Assisted the team to upgrade SiteMinder policy servers, policy stores and web agents on multiple platforms as part of the SiteMinder upgrade project.
  • Co-ordinate the changes for an optimized plan to minimize downtime across the DEV, TEST, STAGE and PRODUCTION environment.
  • Hands-on experience on Radiant Logic, Oracle Directory Services and RSA implementation engagements.
  • Worked on writing Shell script and Linux script for command line interpretation of Operating system. Implement Policy-based Security using Web Agents, User Directories, and Realms. Authentication, Schemes, User Sessions, Rules, and Responses to protect, manage, authenticate and authorize access to enterprise resources. Creating security permissions for resources in policy server.
  • Worked on day-to-day tasks including creation of SiteMinder configuration objects and working with application teams to resolve issues.
  • Worked on creating policy objects as required by the application teams to implement secure SSO solutions.
  • Configured Multi factor authentication for SiteMinder protected Applications
  • Integrated LDAP with SiteMinder to access user stores and policies.
  • Experienced in installing, configuring SiteMinder policy server Web agents, ASA agents, Domino Agents, Active Directory server (LDAP) and various Web & Application servers.
  • Worked on integrating new applications with SiteMinder by creating the required realms, rules, and policies as required. Completed the protection and provided support as needed
  • Worked on multiple projects to provide SSO with SiteMinder federation setup with 3rd party vendors using the SAML protocol.
  • Responsibilities included attending the preliminary discussions and further work with the technical teams to gather requirements and attend multiple calls to complete the integrations.
  • Worked on a large corporate project from initial stages to design and build the SSO solution to support the project until it was pushed live.
  • Worked on a project with the CA core team to discuss and design health check suggestions to improve the health and performance of the SiteMinder environment within the infrastructure.

Environment: CA SiteMinderr12.52, CA Secure Proxy Server R12.5,CA Webagent Option Pack, Oracle Directory, IIS 6.0/7.x, Apache 2.x, JBOSS app servers, Windows Server 2012/2008, and RHEL 5.

Confidential, Dallas TX

Sr. System’s Engineer/IAM Engineer

Responsibilities:

  • Installed & Upgraded CA SiteMinder R12.52 to R12.6& 12.7SP01
  • Designed the new parallel Environment for SiteMinder R12.52 Policy Servers, which allows the Single Sign-On between the old and new environments with the agents talking to new Policy Servers.
  • Design, develop and implement Single Sign On solutions for externally hosted vendor (3rd party) applications using SAML, OAuth and WS-Fed (specifically on ADFS and CA SSO's CA Federation).
  • Implemented enterprise-grade threat protection and access control for APIs using API Gateway.
  • Manage and support for both individual developers and partners using API Developer Portal.
  • Have configured multi-factor authentication for SiteMinder enterprise applications.
  • Installed and configured SiteMinder user directory and policy store on LDAP.
  • Replicated policy store and configured fail over scenarios.
  • Worked on CA Secure Proxy Server to intercept the request and redirect to policy server.
  • Configuring User Authentication Stores and Policy Authorization Stores on LDAP.
  • Coordinate with the neighboring teams and analyze the data that is flowing to LDAP.
  • Developed a Perl script to manage the LDAP schema.
  • Installed, configured proxy servers with LDAP as the primary backend and provide transparent seamless authentication to users.
  • Configured Open LDAP with UNIX pam, and enabled users to authenticate against LDAP.
  • Created custom agent using SiteMinder SDK to decode the cookie so that we don't need use all the existing functionality of the SiteMinder which makes a lighter agent version.
  • Installed and configured web agents on IIS Web Server and also Linux server with Apache 2.2.

Environment: CA SiteMinderr12.52, r12.7 Sp1, r12.8, CA Secure Proxy Server r12.5, R12.7, Windows Server 2008/2012, MS SQL 2008, Active Directory, ODSEE, JBoss 5.2, Apache2.2, Apache 2.4, IIS 6,7, JDK 1.6.

Confidential

Single Sign-On Engineer/Programmer Analyst

Responsibilities:

  • Installed, configured, upgraded CA SiteMinder from 6.X to R12.51
  • Acting as single point of contact for 6.x SiteMinder web agent upgrade and provide the required consultation to application teams as required.
  • Deployment and support of SiteMinder Federation using SAML 2.0.
  • Key member of the team that helped SSO department to achieve 100% compliance in the recently concluded audit.
  • Actively working with CA to raise the issues and bugs found with SiteMinder and raising the enhancement requests as needed.
  • Installing SiteMinder policy server on non-prod and prod servers and involved in fine tuning the services.
  • Leading the initiative to confirm that all team members are following the processes that are compliant with the set standards.
  • Involved in the UAT analysis for new applications before they are moved to production environment.
  • Coordinating with applications teams to finalize the requirements for SiteMinder setup.
  • Implementation of various changes as required to integrate SiteMinder with new applications and new application modules.
  • Actively involved in the change management and incident management as per the requirements and need of hour.
  • Monitoring the various alerts and taking the corrective action to restore the normalcy of the environment.
  • Configured SAML affiliate agents on the web servers designated for affiliate customers.
  • Created strategies for backup and recovery of SiteMinder environment.
  • Performance tuning for SiteMinder to provide better response time, low latency, high availability, and maximum throughput.
  • Monitor user activity through one view monitor, error, and other exception reports to ensure security is being maintained.

Environment: CA SiteMinder, iPlanet/SunOne Directory, IIS web server, Apache 2.x, Windows 2000/2003.

We'd love your feedback!