Iam Engineer Resume
0/5 (Submit Your Rating)
Dallas, TX
SUMMARY
- Around 5.5 years of proven experience in Identity and Access Management suite.
- Design and Implementation experience with Identity and Access Management tools like SailPoint IIQ, Okta and Java technologies.
- Experience inmigratingApplications for SSO from legacy tools to cloud based SSO tools (Okta).
- Experiencemigratingapplications between identity systems and implementing them using authentication standards such as SAML, OIDC, OAuth.
- Experience with self - registration, Access provisioning and Lifecycle management of users onto Okta.
- Experience in Okta Integration with SAML, OAuth, SCIM, WS-Fed based applications.
- Worked on planning, development, testing, Maintenance and Analysis phases of software development Life Cycle.
- Strong involvement in onboarding and merging different applications into SailPoint IdentityIQ counting Active Directory, Delimited files, JDBC applications, Oracle Direct.
- Strong understanding of internal technical of SailPoint IIQ, Role Based Access Control (RBAC), Governance such as Policy modeling and Access Certification.
PROFESSIONAL EXPERIENCE
Confidential, Dallas, TX
IAM Engineer
Responsibilities:
- Designed and Implemented Okta suite from scratch in co-existence mode along with Ping Federate
- Have integrated Okta Internal and Customer applications with Okta B2E and B2B tenants
- Deployed multiple Okta tenants for Normal Users. ADM accounts, service accounts and craft workers based on business requirements
- Have leveraged Okta API Access Management for securing application APIs and defining custom access policies for managing tokens lifetime
- Installed and Implemented Okta Access Gateway for securing access to on-prem apps and protect organizations Hybrid cloud infrastructure
- Integrated Okta SSO for more than 170 applications with MFA enabled at Okta level and app level
- Integrated Okta provisioning for salesforce, BOX, workday, AD, Okta Org20rg and SAP Success Factors
- Worked on configuration and development of SailPoint Life Cycle Events (LCM).
- Developed and arranged Roles with access policies in LDAP Group.
- Executed Access management and reporting using Compliance Manager and assisting the client in their Role Based Access Control and Separation of Duties (SOD) policies initiatives.
- SupportedOktaplatform deployments within IAM Cloud solution.
- Used Okta for Single Sign On (SSO), Multi Factor Authentication (MFA), Password management, provisioning/ de-provisioning.
- Build and configure SailPoint in-built tasks like aggregation, ID, refresh, Schedule tasks, Correlation etc.
- Involved in Planning and executingOktaapplication onboarding with cross-functional teams.
- Proficient in IAM lifecycle Manager, Compliance Manager and Access Governance modules.
- Worked on SailPoint provisioning via both out of the box SailPoint connectors and custom written Java code connecting to a variety of systems via mechanisms such as SOAP and REST web services, JDBC, custom API’s etc.
- Created documentation on account creation, authentication and authorization.
- Worked on designing, implementation and testing for onboarding applications to Oktausing SAML 2.0, OAuth and OpenID.
- Developed custom approval workflows for provisioning Role Based Access Control (RBAC) entitlements to applications using Java.
Confidential, Westlake, TX
IAM Consultant
Responsibilities:
- Involved in installation, integration and deployment of SailPoint Identity IQ in the client environments.
- Customized user onboarding process as per customer requirements and have also on-boarded applications into Identity IQ.
- Involved in upgradation of SailPoint IIQ to 7.3 version including connector gateways and password interceptor agents.
- Migratedapplications from existing IAM system toOktaCloud solution.
- Performed and completed theOktaconfiguration.
- Configured Single Sign On (SSO), Multi-factor Authentication (MFA) and Password Reset using Okta.
- Provided the solution for IAM issues and design/develop IIQ based solutions to solve the domain specific issues.
- Worked with IAM team to identify and implement newOktaprocesses and procedures as the environment changes.
- Implemented SailPoint custom tasks for certifications events under access review platform governance and also invoking custom web service calls for IIQ.
- Developed custom workflow for provisioning LCM workflow for dynamic approvers and multiple levels.
- Use of rest API for multiple accounts on-boarding, reviewing workflow items, reviewing certification events, custom connector provisioning modules and creating provisioning plans and customs rules for provisioning (pre and post iteration rules
- Develop and customize workflows in the SailPoint Identity IQ for Role Creation, Identity Events, Identity Refresh and Policy Violations.
- Worked on implementing and supporting SAML-based Federation technologies and Active Directory Federated.
- Enabled SAML to allow Okta to create, update and disable user.
Confidential, Germantown, MD
IAM Developer
Responsibilities:
- Responsible for installation, integration and deployment of SailPoint Identity IQ.
- Implementation of various type of User Entitlement Reviews for applications and databases in a timely manner.
- Worked with Populations and Work groups in IdentityIQ. Also Worked on business role Assignment based on identity Attribute by creating Assignment Logic.
- Worked with different reports in IIQ like Identity Reports, Orphan Account reports, reports, Role composition report and Application attribute reports etc.
- Coordinating with existing Provisioning Team for the application to get the existing User Access Management model to make it fit in to IIQ.
- Worked on out of the box SailPoint connectors and custom written Java code connecting to a variety of systems using SOAP and REST web services, JDBC, custom API's etc.
- Implementation of new IIQ based roles for the application on to IdentityIQ.
- Worked on completion of various certification types like manger, application owner, entitlement owner and other Advanced Certification.
- Worked on Creating, Deleting, disabling, and enabling user access for the onboarded applications by provisioning application request.
- Created policies for user access by creating certain combination of roles which gives higher risk in the system, where Combination of such roles or entitlements gives Error message.
- Identifying the risks and its root cause to mitigate the existing risk in our process.
Confidential
IAM Administrator
Responsibilities:
- Worked on different phases of Application such as planning design, implementation (development), debug and Support of the Application.
- Worked on Backend programming which required java.
- Proficient with Git, deep knowledge on pulling and pushing codes in GitHub.
- Fair experience on using SQL for database purpose.
- Good communication skills with the team, our team used to work together as a group for each task we are assigned either it is testing or development phase.