Iam Consultant Resume
MO
SUMMARY
- Over 9 years of professional experience in Information Technology primarily focused on Identity and Access Management using Sailpoint IIQ, RSA, ForgeRock, Cyberark, Saviynt.
- Experience in design, development, testing, integration and implementation expertise inIdentityand Access Management.
- Expertise in development and support for a large - scale IDM/IAM deployment.
- Worked with Active Directory, LDAP/UNIX groups, Networks, Human Resource systems forIdentity Access Management (IDM).
- Experience with ForgeRock Identity Gateway & should be able to configure Routes, filters, Handlers in ForgeRock IG.
- Experience with ForgeRock Access Manager configuration and customization for user authentication.
- Strong Experience in Implement, manage and maintain Access and Identity Management enterprise infrastructure supporting critical business systems.
- Configure security and manageaccess to internal and externally hosted applications utilizing a variety of industry standard protocols such as OAuth 2.0, SAML, and WS-Federation, OpenID Connect, Multi Factor Authentication.
- Strong knowledge of implementing MFA, RSA token Authentication with Good exposure in implementing the OAuth, SAML based Single Sign-on (SSO) and Single Log-Out involving service with third party applications.
- Worked with Application Teams to identify, aggregate and correlate Application/System User Accounts to Identity repository within Saviynt.
- Development and configuration experience of SSM modules like ARS, SOD, Attestation, Admin/Workflows, CPAM.
- Experienced in developing applications using Three tier architectural frameworks such as MVC (Model View Controller) and STRUTS, SPRING framework.
- Experience in AWS Cloud platform and its features which includes EC2, AMI, EBS Cloud watch, AWS Config, Auto-scaling,IAMuser management, and AWS S3.
TECHNICAL SKILLS
Security: NetIQ IDM/IAM, RSA G&L, Sailpoint, CA Site Minder, Oracle Access Manager, ForgeRock, Saviynt.
PROFESSIONAL EXPERIENCE
Confidential, MO
IAM consultant
Responsibilities:
- Designed, developed and documented application integration patterns for the global consumer ForgeRock platform.
- Developed security-related standards for platforms and technologies.
- Providing IAM and CIAM guidance to application teams.
- Manage and maintain software-defined infrastructure environment, configuration, and build scripts production environments.
- Maintained operational stability for global consumer platform; enforce security measures, testing, development, and deployment of NetIQ and infrastructure-related technologies.
- Supported customers in developing an IDM road map and migration from legacy IDM systems to ForgeRock's Open Identity Suite.
- Support the design, development, and implementation of highly-scalable Identity and Access Management solutions using ForgeRock's Open Identity Suite.
- Integrate security tools, standards, and processes into the Secure Software Development Life Cycle (SDLC) for both on-premises & cloud-deployed applications.
- Hands-on experience in design, development, implementation, and support of ForgeRock OpenAM and OpenDJ stack to meet authentication, authorization, and Single-Sign-On (SSO) requirements.
- Design and implement SAML, OIDC/OAuth2 protocol-based solutions, Identity Gateway and Agent-based solutions
- Design, develop and implement OpenAM custom authentication modules
- Hands-on experience in JavaScript, Groovy, and Java to customize ForgeRock tools
- Application migration experience from NetIQ to ForgeRock
- Experience supporting ForgeRock applications and tools (openAM, openIDM, openDS, Amster, SSOAdmin).
- Ability to troubleshoot support request with minimal guidance.
- Experience working in ITSM environment and using related tools (ServiceNow or similar).
- Experience working in Controlled Change Management/Deployment environments (supporting SDLC process).
Environment: ForgeRock, Cyberark, NetIQ, SSO, IDM, Servicenow, Active Directory, Federation, User-Managed Access.
Confidential, TX
IAM System Engineer
Responsibilities:
- Working on providing technology leadership and delivery accountability for solutions for multiple concurrent projects within scope for Identity Management and the IDW toolsets (RSA G&L).
- Expertise in on-boarding applications into RSA G&L for auto provision and de-provision through Service Now and Perform User access reviews.
- Working on Unit testing the applications before on boarding into RSA using SOAP and REST web services.
- Experience on RSA Governance & Life Cycle capability configuration and development based on requirements/team priority.
- Working as a team leader with accountability, setting direction to mature the technology associated with the team. Key aspect of this is “tech debt” removal when possible.
- Identify and implement process enhancement opportunities associated with supporting the application area. Recommend actions to increase ESI and vendor partner knowledge on team.
- Serving as SME for components of the team. Support activities of senior team members and architects to transfer knowledge and set direction for new technology components in the ESI environment.
- Providing technical guidance to projects for components of a technology suite. Lead efforts to develop standard practices, components, guidelines for use of complex technology components.
- Participating in resolving urgent and high production incidents and actions to determine root cause of problems and drive resolution.
Environment: RSA Aveksa, CyberArk, NetIQ, IDM/IAM, Linux, Windows, RACF, TeradataCyberark, Apache, (Ldap) Active Directory, web services
Confidential, South Field, MI
IDM Engineer
Responsibilities:
- Worked on design, development, testing, implementing enterprise-wide security applications using Identity and Access Management, CA Site Minder, LDAP Directory.
- Involved in Collecting the requirements, feasibility analysis and documentation for accomplishing the enterprise Single Sign on (SSO).
- Implemented Managed and maintained Access and Identity Management enterprise infrastructure and supported critical business systems.
- Expertise providing strategies between Enterprise Infrastructure and various other groups including the Helpdesk.
- Worked on Day-to- day incidents with Access Management on resolving the issues.
- Involved in 24/7 On-call support for production and QA environment.
- Expertise working with Designer, iMonitor, LDAP and Sun One Directory Server Installation, configuration and defined LDAP
Environment: NAM 3.x, iManager 2.7, iMonitor, Windows 2003/2008, Apache web server 2.x, Active Directory, Domain Controller, eDirectory 8.X, SAML, SSO, IDP, SP.
Confidential, Chicago
IBM WebSphere Administrator
Responsibilities:
- Designed logical security application architecture integrating Web Sphere Application Server, Sun One Web Server, iPlanet LDAP Directory Server, Integrity Site Minder and implemented Single Sign-On security.
- Experience in implementing LDAP, OID security models using Netscape server.
- Integrated Policy Store with LDAP to use LDAP user repository.
- Exported LDAP databases to LDIF files and imported databases from LDIF files using Admin Console and command line utilities.
- Integrating the app with Enhanced Authentication Services (Site Minder- LDAP) and enabling it with Multifactor Authentication/Authorization Mechanisms.
Environment: CA Site Minder 6.x/ R12 .x, Sun Solaris 9/10, Windows Server 2003, Oracle DSEE 6.x, IIS 6.0, Apache 2.x, Sun One Web Server 6.x, LDAP, Apache.
Confidential
Web Sphere Consultant
Responsibilities:
- Install Configure and Maintain Web Sphere Application Servers on Linux.
- Technical Support involving Incident management, change management, problem management for IBM WebSphere Application server,IBM WebSphereMQ,IBM Web SphereMessage Broker, IBM HTTP Server, Portal on Multiplatform environment
- Installed and configured JDBC drivers and Servlet engines on Linux OS
- Network Administration - involving day-to-day routine checks, Configuration of LAN adapters, Routing, NFS, DNS and Troubleshooting.
- Maintenance of theWeb Sphereservers on different AIX and main frame platforms and setting up the development, testing, staging and production environments for the ongoing application development.
Environment: Linux 6, JDBC, JavaScript, JSP, Servlets, DB2, IBM HTTP Server, Apache Web Server, and Web Sphere Application Server.