We provide IT Staff Augmentation Services!

Oracle Identity And Access Manager Resume

0/5 (Submit Your Rating)

SUMMARY

  • 13+ Years of Experience in IT Application development, Support and Maintenance.
  • Experience in Client management, Analysis, Design, Development, Support and Maintenance.
  • Experienced Identity Management and Access Professional with expertise in Oracle Identity Manager, SailPoint IIQ, RSA IGL (formerly Aveksa), Tivoli Identity Manager, Tivoli Access Manager, Sun Identity Manager, Oracle Identity Analytics.
  • Experience in Identity & Access Management including Role based access control, access request and access recertification.
  • Experience in SQL and Oracle.
  • Experience in Web logic/Web sphere administration and deployment.
  • Exposure in Unix Administration in flavor of Sun Solaris.
  • Experience in Unix Shell scripting.
  • Java application development and customizations.
  • Knowledge on CyberArk and Varonis.
  • Strong team player with excellent inter - personal, written and oral communication skills.
  • Ability to adopt in demanding, fast-paced environments requiring highly adaptive, flexible and resourceful technical & management skills.
  • Good analytical, debugging and interpersonal skills.

TECHNICAL SKILLS

Hardware / Platforms: Windows, Unix, Linux

Technology: Oracle Identity Manager, SailPoint IIQ, RSA Identity

Governance and Lifecycle: Tivoli Identity Manager, Tivoli Access Manager, Sun Identity Manager, Oracle Identity Analytics

Programming Languages: Java/J2ee

Databases: DB2, Oracle9i

Scripting Languages: UNIX, SQL, JavaScript

PROFESSIONAL EXPERIENCE

Confidential

Oracle Identity and Access Manager

Responsibilities:

  • Troubleshooting on clustered environment with High Availability (HA) of IAM Suite and SOA Suites. fixing issues in OIM application.
  • Support and Maintenance of OIM related servers.
  • Developed SOA Approval workflows.
  • Experience in working with Oracle support and providing the solutions.
  • Experienced in deploying other connectors such as Generic Script Connector, DBAT, Flat File, RACF etc.
  • Checking/Obtaining patches as required for environment and applying.
  • Involved in creating and using sandbox, Self Service UI Deployment for functions of Password Reset, Forgotten Password, etc.
  • Generated various reports using BI publisher.
  • Provide evidence for SOX Audit.
  • Migrate applications to UAT and Production.
  • Worked on development of OIM customizations such as Schedule Jobs, Event Handlers, and Approval Workflows according to business needs.
  • Involved in troubleshooting various issues involving provisioning and entity adapters.
  • Scheduled and facilitated team meetings and managed internal and external resources, including vendor relationships.
  • Worked on creating configuration for criteria-based provisioning, membership rules and Access Policies.
  • Implemented Reconciliation procedures for attribute changes from AD to OIM.
  • Created access policies that automatically assigned certain common groups depending on the company to which the user belonged.
  • Performed extensive unit testing to verify the proper functioning of adapters and access policies.
  • Development of Scheduled Tasks and plugins/adapters.
  • Configured Role based access control and Password policies.
  • Bulk loaded users, roles and accounts.
  • Configured Auto Provisioning for different target systems.
  • Configured and maintained different disconnected target systems.
  • Worked with key business and technical stakeholders to develop requirements, user cases and test cases.
  • Fixed critical defects and helpdesk tickets.

Environment: Oracle Identity Manager (OIM) 11g

Confidential

IAM Business Analyst

Responsibilities:

  • Critically evaluate information gathered from multiple sources and decompose high level information and translate into business documents.
  • Write requirements specifications according to standard templates, using natural language clearly, unambiguously applying analytical skills to determine and document accurate business requirements; presenting these requirements in a manner that is concise, measurable and flexible enough to meet project and stakeholder needs. Translate technical data and concepts and communicate to non-technical personnel and implement enterprise initiatives on a large scale.
  • Analyze and understand existing Non-Human Identity use cases in Client’s IAM, provide solutions to automate their management and integration to privileged access management, provide consultation on management of their ownership and propose options for their certification reviews, risk management and corrective action on associated security risks.
  • Work with development teams to translate business requirements and use cases to support and help with design and implementation.

Environment: SailPoint IIQ

Confidential

Identity Access Management Administration Lead

Responsibilities:

  • Majority of the work done on RSA IGL (formerly Aveksa)
  • Maintenance of the Production Environment as the Administrator.
  • Creating and running reports in RSA IG&L to gather Audit related data.
  • Regular interaction with client to find if all business requirements were met.
  • Troubleshoot and resolve user Identity and access related issues.
  • Perform end to end investigation of production issues working with vendor teams.
  • Gathering requirements and Onboard new application into RSA IGL.
  • Create SOPs, Runbook; provide training to new joiners in team.
  • Troubleshoot issues with change requests created and update the back-end oracle table accordingly to fix the issues.
  • Troubleshoot Change Request workflows.
  • Configure Custom Workflows and load application users.
  • Configure the recertification process.
  • Create and update Request forms.
  • Configure collections and troubleshoot issues with collectors.
  • Configure Custom Reports using SQL queries.
  • Update UNIX Scripts.
  • Perform Data Purging.
  • Troubleshoot issues with RSA IGL Application servers.
  • Database failover in RSA IGL
  • Monitor logs in Splunk.
  • Work on tickets assigned in SNOW meeting SLA.
  • Coordinate and work with multiple teams to identify and resolve issues and document the RCA.
  • Have involved in enterprise-wide smart badge roll out for all users in the organization.
  • Define the process for incident management.
  • Knowledge on Varonis and CyberArk.

Environment: RSA Identity Governance and Lifecycle, Sun Identity Manager, Oracle Identity Analytics.

Confidential

Web logic Administrator

Responsibilities:

  • Install BEA Weblogic Platform and subcomponents on supported platforms.
  • Configuring, maintaining and monitoring the Development/Testing and Production servers.
  • Configuring Webservers in iPlanet.
  • Creating BEA domain templates using the Domain Configuration Wizard.
  • Adding Weblogic Server instances to a cluster.
  • Implementing JDBC and database connectivity on a single server and a cluster
  • Deploy and monitor J2EE, Weblogic, EJB Modules, Enterprise Application applications, and web services to clusters, servers.
  • Creating and managing Users and Groups.
  • Configuring and monitoring, both the applications and servers during the production UAT.
  • Testing the application flows during the production UAT & Implementation.
  • Troubleshooting the application issues in Dev/Test and Production environments.
  • Handling and streamlining the monthly production implementation.
  • Generating reports for applications and platforms such as Midrange and Vantive.
  • Producing daily, weekly reports for platforms and applications availability to the customers.

Environment: Windows XP & 2k3, UNIX, Oracle 8i/9i, WebLogic 8.1 SP6/ 9.2 MP2, Web-Sphere, Java, HTML, Scripting in UNIX.

Confidential

Technical Support and Designer

Responsibilities:

  • Maintaining Unix servers.
  • Monitoring System - processes, Disk space, log files.
  • Using Cron facility for automating process. Shell Scripting.
  • Install/Upgrade patches.
  • Performing Backups & Restore, granting privileges, Setting permissions on files.
  • Maintain users and groups.
  • Troubleshooting the application issues in Dev/Test and Production environments.
  • Performing deployments with Oracle TOAD.
  • Compiling Invalid Objects and Triggers.
  • Replicating the data from one environment to another environment using TOAD.
  • Deploying in Kenan.
  • Monitoring and troubleshooting Kenan processes.
  • Performing EAR deployments in Web logic/Web-Sphere.
  • Restarting of servers and clusters in Weblogic/Web-Sphere.
  • Monitoring logs and Troubleshooting issues in the Unix environment.

Environment: UNIX, Web logic, Web sphere, Oracle

Confidential

Responsibilities:

  • TIM 4.6 External User Interface Developments using Java and JavaScript.
  • Performing day-to-day Production Support activities.
  • Installing and Configuring Tivoli Directory Integrator.

Environment: AIX 5.2, Java, JSP, JavaScript, Web Sphere Application Server 5.1, IBM HTTP Server, IBM Directory Server, IBM DB2, Active Directory, Tivoli Directory Integrator 6.1

Confidential

Responsibilities:

  • Involved in customization and creation of workflows, provisioning policies, roles, groups, ACIs.
  • Involved in creating Operations and Lifecycle rules in all environments.
  • Involved in the complete configuration of the Tivoli Identity Manager 5.1.
  • Worked on creating services for all the resources in Confidential and done reconciliation.
  • Involved in Data migration to all environments and written Java code to make modifications to the data.
  • Involved in converting FESI extension to IBMJS in TIM 5.1.
  • Have written Unix script to automatically clean the old logs and placed a cronjob entry for this.
  • Installing, Configuring and Testing TDI 7.1 in all environments.
  • Involved greatly in server administration and maintenance activities.
  • Involved in Production support activities.

Environment: AIX 5.2, Java, JSP, JavaScript, Web Sphere Application Server 5.1, IBM HTTP Server, IBM Directory Server, IBM DB2, Active Directory, Tivoli Directory Integrator 6.1

Confidential

Responsibilities:

  • Involved in configuring ITIM to enable management of user accounts in Red Hat Directory Server
  • Involved in changing authentication mechanism for Linux servers in the CDE to utilize the new Red Hat Directory Server as the primary authentication repository.
  • Involved in customization and creation of workflows, provisioning policies, roles, groups, ACIs, lifecycle rules.
  • Has worked with JAVA API's and ITIM APIs in the Implementation.
  • Involved in testing.

Environment: Java, JavaScript, Web Sphere Application Server 7.0, IBM HTTP Server, IBM DB2, Active Directory, IBM Tivoli Identity Manager 5.0.0.3.

Confidential

Identity Manager

Responsibilities:

  • Handling daily support related activities.
  • TIM, Working with provisioning policies, services, roles, groups, accounts, reconciliation.
  • TAM, Working with Junctions, ACLS, web seal, Policy Server, Authorization server.
  • Support in IBM Tivoli Directory Integrator
  • Enterprise Access Manager and Red hat Directory server support and maintenance.
  • Writing Java code and Unix scripts to simplify maintenance activities.
  • Working with Unix and SQL commands.
  • Provide 24X7 Support of Applications.

Environment: Java, JavaScript, Web Sphere Application Server 7.0, IBM HTTP Server, IBM DB2, Active Directory, IBM Tivoli Identity Manager 5.0.0.3, IBM Tivoli Access Manager 6.1 and ITDI 7.1.

Confidential

Web Access Management Developer

Responsibilities:

  • Requirement Analysis
  • Creating Technical Requirements Document, Requirement Traceability Metrics, Detailed Level Design.
  • Coding to meet the above requirements.
  • Fixing the application defects.
  • Production support of the applications.
  • Role as a Business Continuity Plan coordinator.
  • Work on Citrix
  • Unit testing.

Environment: Java, J2ee, Spring v3, Java Script, Web Sphere Application Server 7.0.

We'd love your feedback!