Technology Lead Resume
Los Angeles, CA
SUMMARY
- Around six years of solid experience in design, development, implementation, and administration of Identity and Access management (IAM) solutions using Oracle Identity Manager(Identity manager 9.1, Design Console, JBOSS,, Oracle 10g RDBMS, Oracle Internet Directory, Oracle Directory Manager), Confidential Identity Manager (ITIM), Confidential Tivoli Access Manager (ITAM), LDAP Directory servers (ITDS, MS AD, Sun One), and Confidential Tivoli Directory Integrator (ITDI), Adaptor Development Tool Novell Identity Manager(eDirectory, Designer, iManager, Remote Loader), Hitachi Identity manager.
- A highly - accomplished, deeply-driven, IT Security Specialistwif a successful track record in Information Security and Application Development.
- Proven ability to tackle and succeed in all endeavors from business development to customized software development and implementation. Possess strong architecture and implementation experience in Identity and Access Management.
- Exceeds in fast-paced environments, handles multiple assignments simultaneously and coordinates deliverables wif key stakeholders in cross-functional groups.
- Experienced in development of web centric, Object Oriented, Intranet and Internet applications using JEE technologies.
- Good experience in administration of JEE and portal applications on Confidential Websphere, and Oracle Weblogic application servers.
- Strong systems administration skills in all the flavors of UNIX (AIX, Suse Linux, Red Hat LINUX).
- Good knowledge of UML/Rational Rose for modeling business processes and system functions. Also experienced in development and documentation of RUP Logical Views, RUP Component views, and RUP Process views.
- Extensive experience in Software Development using JEE technologies, including EJB, RMI, Servlets, JSP, JDBC, JNDI, JMS, and MQ Series 5.2.
- Experienced in total development life cycle of software product from application specification and requirement gathering thru design, development, testing and implementation.
- Strong backend programming skills using Confidential DB2 UDB, Oracle as RDBMS.
- Good Knowledge in design patterns like Observer, MVC, Decorator, Singleton, façade, Front Controller, Abstract Factory, and Business Delegate patterns.
- Worked wif Source control tools like Subversion, Serena ChangeMan DS, Rational ClearCase, CVS, PVCS, and Visual SourceSafe.
- Excellent communication and interpersonal skills.
TECHNICAL SKILLS
Tools: Oracle Identity manager 9.1, Oracle 10g, Confidential Tivoli Identity Manager (ITIM v4.6), Confidential Tivoli Directory Integrator IDI 6.0/6.1.1, LDAP - OID, Active Directory Confidential Directory Server TDS, Novell Identity Manager, Designer 3.5, Remote Loader, Hitachi Identity Manager
Operating System: Sun Solaris, AIX, Windows 95/98/XP/2000/NT/7, Windows server 2003, Suse Linux
Languages: PL/SQL, JavaScript, C/C++, VB Script, ASP, Shell Scripts, MS Excel - Functions & reporting.
Scripting Languages: Unix Shell (Korn, C, Bash) Scripts, JavaScript, Perl Script
Web Technologies: HTML, ASP, JSP, CSS, XML
Databases: Oracle 8i/9i/10g, Sybase 12.0/12.5, MS SQLServer 2000
Tools: SQL Reports, Eclipse, Maestro, Harvest, VSS 6.0, CVS, Citrix, Toad, Teradata, Sql-Plus, Remedy User, Putty, WS-FTP, Secure-Shell, Lotus Notes, Exceed etc.
PROFESSIONAL EXPERIENCE
Confidential
Technology Lead
Responsibilities:
- OIM Upgrade from version 9.0.1.3 to 9.1.0.2 for TFS. The upgrade had New Installation approach wif DB migration and Upgrade.
- Worked on Installation of OIM application, Database Upgrade, Customization involved for xlWebApp, Connector configuration and customization.
- TFS code involves customized scheduled tasks and adapters, which are migrated and compiled wif newer version of OIM.
- IT Resources involved Peoplesoft, Seibel, RACF, EAS and AD.
Confidential, Los Angeles, CA
Tivoli Identity Manager Specialist
Responsibilities:
- Have worked on Installing, Configuring, and Customizing Tivoli Identity and Access Management tool. I have been working on the development side for enhancing the features for identity Management. Have completed the training provided by Confidential for various features of Tivoli Identity and Access Management Tools and enhancements.
- Have created batch utilities for batch loading, reconciliation, adoption, termination, creation of user accounts which is scheduled nightly and enhance the utility to take credentials from a common property file. Have deployed the corresponding jars on production servers.
- Have worked Custom Adapter development (ADT) and Directory Integrator for creating customized ldap adaptor wif custom attributes and rules.
- Configure and administrate ITIM and ITAM - design org tree structure, create provisioning and de-provisioning policies, implement id policies, password policies, ACL, reconciliation, service definition, create work-flows, configuring remote services etc.
- Actively participated in installing and configuration of WebSphere Portal Server 5.0 on AIX and Windows machines
- Implemented sub-forms for listing peers, other group users, and dynamic addition/removal from groups.
- Involved in development of IDI custom agents (assembly line) for end points
- Proactively communicated wif the application groups for gathering user-provisioning requirements at all the end points
- Write the failover recovery scripts using wscp and ksh for WebSphere applications
- Write Shell Scripts using wscp/tcl to automate the processes.
Confidential, Marysville, OH
IDM Developer
Responsibilities:
- ID-Synch for Confidential is a complete user provisioning solution to automate the tasks of managing users across multiple target systems. Have experience in Integrating, Installing and migration of tool to newer version. Have been working on the development side for enhancing the features for identity Management. Evaluate new projects and applications particularly as they relate to data security architecture and design.
- Have written Perl code for complete e-provisioning process for identity management which includes reconciliation, provisioning and termination reducing the manual efforts of system administration. Have written Perl scripts for reporting and manipulation purpose.
- Review and analysis of business risks and creation of security requirements and controls
- Recommend and implement security product requirements, policy and procedure and develop a security roadmap for current and future services and systems.
- Extensively used the Command line tools for administration and maintenance of the applications.
- Assisted wif implementation of security best practices and methodologies
Confidential
IDM Developer
Responsibilities:
- ID-Synch for Confidential is a complete user provisioning solution to automate the tasks of managing users across multiple target systems.
- Project involved complete identity management planning process, collecting enterprise requirement, designing identity management deployment model as per organization policies and requirement, designing Organaisation Tree, Enterprise model of HA, Security and Scalability.
- Installation and configuration of Oracle Identity Manager (which include Resource Object Definitions, process definition, workflows for approval and emails, policy enforcement, Entitlements, provisioning policies, identity policies enforcement, Reconciliation.).
- Redesigned the user interface to meet the client needs, GUI customization, forms and view customization as per User rights and Access.
- Installation and configuration of End point Agents for all the target systems (AD - Active Directory, DB2 UDB 8.1, Oracle, email, ldap, SAP servers etc.)
- Have experience in Integrating, Installing and migration of tool to newer version (planning).
- Have work on experience wif development side for enhancing the features of identity Management Adapters (custom adapters and attribute ma
Confidential
Software Analyst
Responsibilities:
- ID-Synch for DCP is a complete user provisioning solution to automate the tasks of managing users across multiple target systems. Have experience in Integrating, Installing and migration of tool to newer version.
- Was working on middleware for complete automation from HR data feed to user account creation, thereby reducing efforts from system administrators. Middleware is a code in C#.net which interacts wif HR database and contains the code to create the user.
- Have worked on middleware for automation of provisioning and created various utilities to pull data from web pages and create a log. Have been working on the development side for enhancing the features for identity Management
- Provide architecture review for client’s applications, documents and install processes.
- Provide clients wif recommendation and systems best practices documents.
- Provided security and assisted wif implementation of Security Best Practices and Methodologies.
- Technology: Hitachi Identity Management Tool, C#.net, MSSQL, Apache Web Server
Confidential
Developer
Responsibilities:
- Have created Power ID Management Tool utility to allow help desk reps the ability to reset Confidential ID’s which enhances information security by not giving helpdesk direct access to AD.
- dis utility sends email to Confidential security group informing them that an ID TEMPhas been enabled or disabled and a log regarding the same should be created. dis was an automation tool using ASP.NET
- Analyze the design and process flow of existing order listing module, and as a first phase, provide friendly messages to the user when the transaction times out or database connection is lost while the user is doing order listing.
- Developed Sequence, Use Case Diagrams, and Architecture Diagrams using MS Visio.
- Did the Detailed Design for Order Listing Paging and reviewed it wif the team.
- Some of the data which was retrieved from database for each order was cached and reused to improve performance.
- Involved in unit and integration testing of the system
Confidential
Information Security Analyst
Responsibilities:
- Have work on experience wif Installing Novell Identity and Access Management tool. Have completed the training provided by Novell for various features of Novell installation, configuration and Customization.
- Have worked on maintenance of the identity management tool like change in design console, cascading style sheets, upgrading data on user console.
- Maintenance of Identity Management tools
- Updating and Enhancing the Identity Management Tools
- Creating workflows
- Reporting performance related data
- Proposing New Security Solution to the clients based on various requirements
- Report generation using VB Scripting(ADO)
- Planning and implementation of Organization security using GPO
- Working wif client for creating and integrating the 3rd Party Applications wif Windows Environment
- Reporting for various IT Security Audits