We provide IT Staff Augmentation Services!

Iam Engineer Resume

0/5 (Submit Your Rating)

Dallas, TX

SUMMARY

  • Around 5.5 years of proven experience in Identity and Access Management suite.
  • Design and Implementation experience with Identity and Access Management tools like SailPoint IIQ, Okta and Java technologies.
  • Experience inmigratingApplications for SSO from legacy tools to cloud based SSO tools (Okta).
  • Experiencemigratingapplications between identity systems and implementing them using authentication standards such as SAML, OIDC, OAuth.
  • Experience with self - registration, Access provisioning and Lifecycle management of users onto Okta.
  • Experience in Okta Integration with SAML, OAuth, SCIM, WS-Fed based applications.
  • Worked on planning, development, testing, Maintenance and Analysis phases of software development Life Cycle.
  • Strong involvement in onboarding and merging different applications into SailPoint IdentityIQ counting Active Directory, Delimited files, JDBC applications, Oracle Direct.
  • Strong understanding of internal technical of SailPoint IIQ, Role Based Access Control (RBAC), Governance such as Policy modeling and Access Certification.

PROFESSIONAL EXPERIENCE

Confidential, Dallas, TX

IAM Engineer

Responsibilities:

  • Designed and Implemented Okta suite from scratch in co-existence mode along with Ping Federate
  • Have integrated Okta Internal and Customer applications with Okta B2E and B2B tenants
  • Deployed multiple Okta tenants for Normal Users. ADM accounts, service accounts and craft workers based on business requirements
  • Have leveraged Okta API Access Management for securing application APIs and defining custom access policies for managing tokens lifetime
  • Installed and Implemented Okta Access Gateway for securing access to on-prem apps and protect organizations Hybrid cloud infrastructure
  • Integrated Okta SSO for more than 170 applications with MFA enabled at Okta level and app level
  • Integrated Okta provisioning for salesforce, BOX, workday, AD, Okta Org20rg and SAP Success Factors
  • Worked on configuration and development of SailPoint Life Cycle Events (LCM).
  • Developed and arranged Roles with access policies in LDAP Group.
  • Executed Access management and reporting using Compliance Manager and assisting the client in their Role Based Access Control and Separation of Duties (SOD) policies initiatives.
  • SupportedOktaplatform deployments within IAM Cloud solution.
  • Used Okta for Single Sign On (SSO), Multi Factor Authentication (MFA), Password management, provisioning/ de-provisioning.
  • Build and configure SailPoint in-built tasks like aggregation, ID, refresh, Schedule tasks, Correlation etc.
  • Involved in Planning and executingOktaapplication onboarding with cross-functional teams.
  • Proficient in IAM lifecycle Manager, Compliance Manager and Access Governance modules.
  • Worked on SailPoint provisioning via both out of the box SailPoint connectors and custom written Java code connecting to a variety of systems via mechanisms such as SOAP and REST web services, JDBC, custom API’s etc.
  • Created documentation on account creation, authentication and authorization.
  • Worked on designing, implementation and testing for onboarding applications to Oktausing SAML 2.0, OAuth and OpenID.
  • Developed custom approval workflows for provisioning Role Based Access Control (RBAC) entitlements to applications using Java.

Confidential, Westlake, TX

IAM Consultant

Responsibilities:

  • Involved in installation, integration and deployment of SailPoint Identity IQ in the client environments.
  • Customized user onboarding process as per customer requirements and have also on-boarded applications into Identity IQ.
  • Involved in upgradation of SailPoint IIQ to 7.3 version including connector gateways and password interceptor agents.
  • Migratedapplications from existing IAM system toOktaCloud solution.
  • Performed and completed theOktaconfiguration.
  • Configured Single Sign On (SSO), Multi-factor Authentication (MFA) and Password Reset using Okta.
  • Provided the solution for IAM issues and design/develop IIQ based solutions to solve the domain specific issues.
  • Worked with IAM team to identify and implement newOktaprocesses and procedures as the environment changes.
  • Implemented SailPoint custom tasks for certifications events under access review platform governance and also invoking custom web service calls for IIQ.
  • Developed custom workflow for provisioning LCM workflow for dynamic approvers and multiple levels.
  • Use of rest API for multiple accounts on-boarding, reviewing workflow items, reviewing certification events, custom connector provisioning modules and creating provisioning plans and customs rules for provisioning (pre and post iteration rules
  • Develop and customize workflows in the SailPoint Identity IQ for Role Creation, Identity Events, Identity Refresh and Policy Violations.
  • Worked on implementing and supporting SAML-based Federation technologies and Active Directory Federated.
  • Enabled SAML to allow Okta to create, update and disable user.

Confidential, Germantown, MD

IAM Developer

Responsibilities:

  • Responsible for installation, integration and deployment of SailPoint Identity IQ.
  • Implementation of various type of User Entitlement Reviews for applications and databases in a timely manner.
  • Worked with Populations and Work groups in IdentityIQ. Also Worked on business role Assignment based on identity Attribute by creating Assignment Logic.
  • Worked with different reports in IIQ like Identity Reports, Orphan Account reports, reports, Role composition report and Application attribute reports etc.
  • Coordinating with existing Provisioning Team for the application to get the existing User Access Management model to make it fit in to IIQ.
  • Worked on out of the box SailPoint connectors and custom written Java code connecting to a variety of systems using SOAP and REST web services, JDBC, custom API's etc.
  • Implementation of new IIQ based roles for the application on to IdentityIQ.
  • Worked on completion of various certification types like manger, application owner, entitlement owner and other Advanced Certification.
  • Worked on Creating, Deleting, disabling, and enabling user access for the onboarded applications by provisioning application request.
  • Created policies for user access by creating certain combination of roles which gives higher risk in the system, where Combination of such roles or entitlements gives Error message.
  • Identifying the risks and its root cause to mitigate the existing risk in our process.

Confidential

IAM Administrator

Responsibilities:

  • Worked on different phases of Application such as planning design, implementation (development), debug and Support of the Application.
  • Worked on Backend programming which required java.
  • Proficient with Git, deep knowledge on pulling and pushing codes in GitHub.
  • Fair experience on using SQL for database purpose.
  • Good communication skills with the team, our team used to work together as a group for each task we are assigned either it is testing or development phase.

We'd love your feedback!