We provide IT Staff Augmentation Services!

Iam Consultant Resume

4.00/5 (Submit Your Rating)

MO

SUMMARY

  • Over 9 years of professional experience in Information Technology primarily focused on Identity and Access Management using Sailpoint IIQ, RSA, ForgeRock, Cyberark, Saviynt.
  • Experience in design, development, testing, integration and implementation expertise inIdentityand Access Management.
  • Expertise in development and support for a large - scale IDM/IAM deployment.
  • Worked with Active Directory, LDAP/UNIX groups, Networks, Human Resource systems forIdentity Access Management (IDM).
  • Experience with ForgeRock Identity Gateway & should be able to configure Routes, filters, Handlers in ForgeRock IG.
  • Experience with ForgeRock Access Manager configuration and customization for user authentication.
  • Strong Experience in Implement, manage and maintain Access and Identity Management enterprise infrastructure supporting critical business systems.
  • Configure security and manageaccess to internal and externally hosted applications utilizing a variety of industry standard protocols such as OAuth 2.0, SAML, and WS-Federation, OpenID Connect, Multi Factor Authentication.
  • Strong knowledge of implementing MFA, RSA token Authentication with Good exposure in implementing the OAuth, SAML based Single Sign-on (SSO) and Single Log-Out involving service with third party applications.
  • Worked with Application Teams to identify, aggregate and correlate Application/System User Accounts to Identity repository within Saviynt.
  • Development and configuration experience of SSM modules like ARS, SOD, Attestation, Admin/Workflows, CPAM.
  • Experienced in developing applications using Three tier architectural frameworks such as MVC (Model View Controller) and STRUTS, SPRING framework.
  • Experience in AWS Cloud platform and its features which includes EC2, AMI, EBS Cloud watch, AWS Config, Auto-scaling,IAMuser management, and AWS S3.

TECHNICAL SKILLS

Security: NetIQ IDM/IAM, RSA G&L, Sailpoint, CA Site Minder, Oracle Access Manager, ForgeRock, Saviynt.

PROFESSIONAL EXPERIENCE

Confidential, MO

IAM consultant

Responsibilities:

  • Designed, developed and documented application integration patterns for the global consumer ForgeRock platform.
  • Developed security-related standards for platforms and technologies.
  • Providing IAM and CIAM guidance to application teams.
  • Manage and maintain software-defined infrastructure environment, configuration, and build scripts production environments.
  • Maintained operational stability for global consumer platform; enforce security measures, testing, development, and deployment of NetIQ and infrastructure-related technologies.
  • Supported customers in developing an IDM road map and migration from legacy IDM systems to ForgeRock's Open Identity Suite.
  • Support the design, development, and implementation of highly-scalable Identity and Access Management solutions using ForgeRock's Open Identity Suite.
  • Integrate security tools, standards, and processes into the Secure Software Development Life Cycle (SDLC) for both on-premises & cloud-deployed applications.
  • Hands-on experience in design, development, implementation, and support of ForgeRock OpenAM and OpenDJ stack to meet authentication, authorization, and Single-Sign-On (SSO) requirements.
  • Design and implement SAML, OIDC/OAuth2 protocol-based solutions, Identity Gateway and Agent-based solutions
  • Design, develop and implement OpenAM custom authentication modules
  • Hands-on experience in JavaScript, Groovy, and Java to customize ForgeRock tools
  • Application migration experience from NetIQ to ForgeRock
  • Experience supporting ForgeRock applications and tools (openAM, openIDM, openDS, Amster, SSOAdmin).
  • Ability to troubleshoot support request with minimal guidance.
  • Experience working in ITSM environment and using related tools (ServiceNow or similar).
  • Experience working in Controlled Change Management/Deployment environments (supporting SDLC process).

Environment: ForgeRock, Cyberark, NetIQ, SSO, IDM, Servicenow, Active Directory, Federation, User-Managed Access.

Confidential, TX

IAM System Engineer

Responsibilities:

  • Working on providing technology leadership and delivery accountability for solutions for multiple concurrent projects within scope for Identity Management and the IDW toolsets (RSA G&L).
  • Expertise in on-boarding applications into RSA G&L for auto provision and de-provision through Service Now and Perform User access reviews.
  • Working on Unit testing the applications before on boarding into RSA using SOAP and REST web services.
  • Experience on RSA Governance & Life Cycle capability configuration and development based on requirements/team priority.
  • Working as a team leader with accountability, setting direction to mature the technology associated with the team. Key aspect of this is “tech debt” removal when possible.
  • Identify and implement process enhancement opportunities associated with supporting the application area. Recommend actions to increase ESI and vendor partner knowledge on team.
  • Serving as SME for components of the team. Support activities of senior team members and architects to transfer knowledge and set direction for new technology components in the ESI environment.
  • Providing technical guidance to projects for components of a technology suite. Lead efforts to develop standard practices, components, guidelines for use of complex technology components.
  • Participating in resolving urgent and high production incidents and actions to determine root cause of problems and drive resolution.

Environment: RSA Aveksa, CyberArk, NetIQ, IDM/IAM, Linux, Windows, RACF, TeradataCyberark, Apache, (Ldap) Active Directory, web services

Confidential, South Field, MI

IDM Engineer

Responsibilities:

  • Worked on design, development, testing, implementing enterprise-wide security applications using Identity and Access Management, CA Site Minder, LDAP Directory.
  • Involved in Collecting the requirements, feasibility analysis and documentation for accomplishing the enterprise Single Sign on (SSO).
  • Implemented Managed and maintained Access and Identity Management enterprise infrastructure and supported critical business systems.
  • Expertise providing strategies between Enterprise Infrastructure and various other groups including the Helpdesk.
  • Worked on Day-to- day incidents with Access Management on resolving the issues.
  • Involved in 24/7 On-call support for production and QA environment.
  • Expertise working with Designer, iMonitor, LDAP and Sun One Directory Server Installation, configuration and defined LDAP

Environment: NAM 3.x, iManager 2.7, iMonitor, Windows 2003/2008, Apache web server 2.x, Active Directory, Domain Controller, eDirectory 8.X, SAML, SSO, IDP, SP.

Confidential, Chicago

IBM WebSphere Administrator

Responsibilities:

  • Designed logical security application architecture integrating Web Sphere Application Server, Sun One Web Server, iPlanet LDAP Directory Server, Integrity Site Minder and implemented Single Sign-On security.
  • Experience in implementing LDAP, OID security models using Netscape server.
  • Integrated Policy Store with LDAP to use LDAP user repository.
  • Exported LDAP databases to LDIF files and imported databases from LDIF files using Admin Console and command line utilities.
  • Integrating the app with Enhanced Authentication Services (Site Minder- LDAP) and enabling it with Multifactor Authentication/Authorization Mechanisms.

Environment: CA Site Minder 6.x/ R12 .x, Sun Solaris 9/10, Windows Server 2003, Oracle DSEE 6.x, IIS 6.0, Apache 2.x, Sun One Web Server 6.x, LDAP, Apache.

Confidential

Web Sphere Consultant

Responsibilities:

  • Install Configure and Maintain Web Sphere Application Servers on Linux.
  • Technical Support involving Incident management, change management, problem management for IBM WebSphere Application server,IBM WebSphereMQ,IBM Web SphereMessage Broker, IBM HTTP Server, Portal on Multiplatform environment
  • Installed and configured JDBC drivers and Servlet engines on Linux OS
  • Network Administration - involving day-to-day routine checks, Configuration of LAN adapters, Routing, NFS, DNS and Troubleshooting.
  • Maintenance of theWeb Sphereservers on different AIX and main frame platforms and setting up the development, testing, staging and production environments for the ongoing application development.

Environment: Linux 6, JDBC, JavaScript, JSP, Servlets, DB2, IBM HTTP Server, Apache Web Server, and Web Sphere Application Server.

We'd love your feedback!