We provide IT Staff Augmentation Services!

Oracle Identity And Access Management / Information Security Analyst Resume

2.00 Rating


  • Provisioning, Access Management, RBAC (Role - Based Access Control), Compliance and auditing Technologies.
  • Non-Personal IDs (NPIDs) Cert, AD SQL Cert, Access Management, Compliance and pre-auditing technologies.
  • Experience managing Active Directory (AD) clean-up efforts to remove disabled user/service accounts, mailboxes and distribution lists.
  • Administration of System, Network and Security solutions; People and Client Management.
  • Certified Scrum Master, CompTIA A+, Network+ and Dell DCSE certified professional with comprehensive training in Cyber Security, PC software, troubleshooting and hardware configuration.
  • An organized, detail-oriented, self-starter, able to strategize and prioritize effectively to accomplish multiple tasks and stay calm under pressure. Ability to successfully build strong working relationships with coworkers and client.
  • Excellent team player with strong technical and communication skills. Proven track record of ensuring projects are completed accurately in a timely fashion.


  • Scrum
  • Waterfall
  • Iterative
  • Agile
  • Sprint Planning
  • Backlog Grooming
  • Sprint Review
  • Sprint Retrospective
  • Estimation
  • Functional Analysis
  • Oracle
  • MS SQL
  • Rapid SQL
  • Sybase
  • Track IT
  • Service-now
  • Windows 10
  • Windows 8
  • Windows 7 and Windows XP
  • Windows Server 2003
  • 2008
  • Unix
  • Linux
  • MS-DOS; RHEL v. 5
  • Microsoft Active Directory
  • CA Governance minder 12.x
  • Norton Antivirus
  • McAfee
  • Host-based Firewalls
  • Microsoft Office Suite 2010 and 2013
  • MS SharePoint
  • Jira
  • Remote Desktop and ITSM
  • Track IT
  • Service-now
  • JavaScript
  • Batch Script
  • Bash Script
  • IBM Cognos 10



Oracle Identity and Access Management / Information Security Analyst

Environment: Oracle Identity & Access Management, Jira, Service-now, AD-Win, AD-Unix, Oracle, Aim Admin, OneCert Admin, X-Matters(AlarmPoint)


  • Streamlined On-boarding/off-boarding JML (Joiner, Mover and Leaver) process, Role Based Access Control.
  • Provide Level 2 and 3 support to Application Owners globally. Worked on ITSM Service now (ticketing system): resolved daily incidents by utilized OneCert Admin, AIM Admin, AD tools, Request system, GMR reporting and MSSQL queries. Coordinate with multiple teams and escalate issues to the Application development/DBA teams.
  • Perform investigation and resolution of feed issues relating to both technical failures and data quality issues. Specific controls monitored include GLM, Non-Profiled Accounts, Feed File Missing, Stale Feed and FFD.
  • Analyzed user access, security roles/levels and generated revocation reports for terminated employees and get users and their entitlements revoked.
  • Involved in Risk Assessments (identified, analyzed, mitigated, monitored and communicated risks); identified threats and vulnerabilities; Incidence Response.
  • Ensured proper approval processes were in place for compliance and audit purposes.
  • Tested system functionality, resolved problems for end-users and implemented corrective solutions.
  • Performed Entitlement Reviews; generated employee access reportsformanagersto sign off on.
  • OIM full user administration, Created, Disabled and deleted user ID’s for employees and external users; unlocked account in OID and performed password resets.
  • Used Oracle Identity Manager (OIM) for a few applications; created users, added users to role, revoked access, reset passwords.
  • Set up ALARMPoint (xMatters) subscriptions and notifications for real time job failures to multiple teams and gave demos to stakeholders.

Confidential, Milwaukee, WI

CA Identity and Access Management / Scrum Developer

Environment: CA Governance Minder/Identity Management, Rapid SQL, AD-Win, AD-Unix, RACF, Sybase, Oracle, Enterprise Directory, RDP


  • Data Analysis - Dealt with “medium” size data. It was too large for manual review, so more sophisticated processing measures were identified and implemented
  • Investigation - Dealt with ambiguity to determine ownership of IDs that did not have a clearly identified owner. Cross referenced a variety of sources to determine the best possible way to identify the owner.
  • Troubleshooting - Helped to overcome challenges due to limitations in 3rd party applications and identified ways to meet the requirements
  • Teamwork - Was appreciated by the team for putting in extra effort to help a fellow teammate
  • Sent Requests form (DMR) to get the data from various platform owners in the environment (Stage, Test, Dev.) as well imported the data from multiple platforms production feed files into Excel.
  • Performed analysis in Excel utilizing Vlookup, massaged the data extracts coming from flat files.
  • Used Governance Minder reports to review the metrics and created daily stats for managers and stake holders
  • Ran basic queries in Rapid SQL after Certification end date to Reviewed and analyze the result of the certification and performed post work.
  • Played a crucial role as part of the team responsible for transition of the project
  • Trained new coworkers on Governance Minder/Identity Governance
  • Created documentation on how to use GM or IG

Confidential, Addison, TX

Identity and Access Management

Environment: Active directory, CA Governance Minder, UNIX, SQL, AD-Windows, Remote Desktop (RDP)


  • Provided level 2 and 3 support: resolved user login issues, granted access to roles/application instances, modified user information such as name and email addresses.
  • Managed full user administration: created/disabled users, approved changes, unlocked accounts and reset passwords.
  • Maintained a user inventory list for auditing purposes.
  • Worked on ITSM (ticketing system): Change Management Requests (which required approval) and daily incident tickets; followed procedures to obtain approvals, met SLA targets.
  • Analyzed user access, security roles/levels and generated revocation reports for terminated employees, revoked user entitlements.
  • Helped the Process team design policy and procedures documents for the help desk to follow.
  • Tested system functionality; workflows, user login (incorrect password attempts), took screenshot of errors.
  • Performed Entitlement Reviews; generated employee access reports for managers to sign off on.
  • Used Resolve IT to process requests in a timely manner (SLA’s); performed quality checks.
  • Escalated issues to the Application Development/DBA teams.
  • Established strong working relationships with key staff members across the organization; Change Management, Application Support, Help Desk, Unix, Database, etc.

We'd love your feedback!