Sr. Consultant Resume
Boston, MA
PROFESSIONAL SUMMARY
- 6 years of experience in design and web based applications with strong Object Oriented Designing skills and Identity and Access Management Professional
- Experience with Implementation and Administration of Confidential for large population of users. •
- Participate in all Confidential deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration.
- Delivery Focused: Worked closely with stakeholders and client technical leads to deliver quality on time deliverables.
- Expertise in configuring workflows and Integration for life cycle events.
- Designed and developed different rules for Confidential Identity IQ product.
- Expertise in Analysis, Design, Development and Deployment of Confidential
- Direct provisioning using direct connectors for integration of target applications
- Developed Custom java classes in IIQ.
- Performed Integration with multiple applications such as AD, Exchange, RDBMS, and Flat File.
- Experienced in using XML skills such as SAX, DOM, XSLT, DTD, and XSD. Specialized in using IDEs like Eclipse and WSAD for Java programming.
- Hands on experience with implementation of Sun Identity Management 7.0 for various users' account
- Business Domains: Worked in projects for small and large Enterprises - HealthCare, Retail, and Technology
- Technology Domains: Worked in IDM, IAM, Directory Services
- Developed projects for design, and implementation of Confidential, including coordinating with vendor leadership, technical services leadership, and end user customers
- Strategized venture checking and details reports to plainly convey the task guide Configuration and development of Confidential Life Cycle Events (LCM)
- Experienced with all facets of SDLC (Requirements, Design, Development, Testing, Implementation, installation, documentation and Maintenance) using UML, MS Visio, Rational Rose
- Communicated to clients and partners aspects of both the product and the implementation at the technical and functional levels appropriate for the situation
- Responsible for post-sales requirements gathering, analysis and documentation
- Installed, integrated and deployed enterprise software in client environments
- Developed product customizations in Java and Bean shell to meet customer requirements
- Worked with clients post implementation for user testing, debugging, support and maintenance
- Managed project scope, schedule, status and documentation
- Developed and delivered technical training designed to enable/educate implementation partners.
- Identity and Access Management:
- Confidential, IdentityIQ, Oracle Identity Management, Oracle Access Manager, Oracle Identity Analytics, Sun Identity Manager. Sun Access manager.
- Build Tools:
- Eclipse, NetBeans
- Databases:
- Oracle, (PL\SQL), SQL Server, MySQL, MS Access 2010
- Programming Languages:
- C, Java script, CSS, XML, HTML, JAVA, J2EE, JSP,
- Servlet, JDBC, SOAP, LDAP, PHP.
- Operating Systems:
- LINUX, Mac OSX, Windows
- Software Modeling Tools:
- Microsoft Office Suite, MS Project
PROFESSIONAL EXPERIENCE
Sr. consultant
Confidential
Responsibilities:
- Confidential IIQ Installation and configuration as required by design solution.
- Create various reports in IdentityIQ like Orphan Account reports, Account Discrepancy reports, Role composition report, Identity Reports and Application attribute reports.
- Analyze the application before on boarding to get extract of application with the user unique ID, access levels and permission and do deep dive sessions.
- Implementation of Self-service feature, Password feature, Provisioning feature and policies in Confidential .
- To maintain user account workflows using form Joiner, Mover and Leaver.
- Evaluate Confidential -IIQ by Life Cycle Management, Access Review/Certifications, Policy Management, Role-Based Access Control and Connector modules.
- Involved with existing Provisioning Team for the application in order to make it fit in to IIQ and to get the existing User Access Management (UAM) model.
- Manage Confidential installation, integration, provisioning and connectors like AD, PeopleSoft HRMS. Recognize the risks and root cause to mitigate the existing risk in our progress.
- Create/Amend/Delete user access for the on boarded applications using Provisioning application’s requests in IIQ.
- Implement and Schedule various type of User Entitlement Reviews for applications and databases in a timely manner to all the business areas across the organization.
- To implement Change Requests in IIQ, Drawing Scheduling of Events and Shape of the weekend for Business check Outs.
- Developing Work groups and Populations in IIQ.
- Develop Role Model Templates based on the applications on boarding by getting engaged with various business people and TS also.
- Specify and upload application data feed on to IIQ application.
- Build new IIQ based roles for the application on to IIQ..
Environment: Sail Point IIQ, Java 1.8, Apache Tomcat, Office 365, Eclipse, GIT
Confidential
Responsibilities:
- Worked on Identity Access Management, and used it effectively in the design and implementation of Confidential .
- Actively involved in the implementation of Confidential 's IdentityIQ,
- Design complex exclusion rules, correlation and data loading tasks in IdentityIQ.
- Designed Graphical User Interface (GUI) using Master Pages, HTML, JavaScript and CSS classes
- Used jQuery and AJAX to make the User Interface more responsive
- Responsible for designing and developing the database objects like Tables, Views, and Complex T-SQL Store Procedures involving Joins and using Temporary Tables, UDF(User Defined Functions)
- Familiar with Access Governance and Compliance, with knowledge of engineering SODS.
- Managed client requirements and configure Confidential connectors for various applications.
- Work closely with Confidential architect and engineers for design and solution architecture
- Involved in design and implementation of IdentityIQ solution in FDIC, configuring Active Directory, and Shared Folders.
- Established measures, metrics, and goals to drive performance as per business, security, and IT needs.
- On boarded various applications like delimited file, AD etc.
- Developed Build Map rules, Pre-Iterate rules and Customization rules
- Developed Delegation rules, customized certifications to send email notifications as per client needs.
- Writing unit tests using N-Unit and Involved in Test Plans and wrote Test Scripts for Manual and Automation Testing.
- Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs.
- Involved in creating custom reports, certifications in order to cater various data feeds.
- Implemented Forms Authentication using database for Usernames/Passwords.
- Validation controls were used to accept or reject input before additional processing.
- Client form validations are done using HTML, Java Script.
- Used Entity Framework Code First Approach in implementing data access layer in the project.
- Developed custom certifications to cater client needs.
Environment: Sail Point IIQ 6.4, Apache, Java, SVN, ASP.NET
Confidential
Deveoper, BOSTON MA
Responsibilities:
- Design and Implementation of Confidential IIQ
- Confidential IIQ Installation and Configuration as required by the design solution
- Implementation of Self Service feature, Password features (PTA, Forgot password, Change Password), provisioning feature, configuring various roles and policies in Confidential
- Set up Confidential IIQ policy server on 4 environments (Dev, QA, UAT & Production)
- Developed build map rule, creation rule and customization rule to create Employee and Contractor user accounts into Confidential from their current application’s exported feed file.
- Developed a custom form in the Confidential UI so that various admins can create Employee/Contractor user accounts manually through UI and provision users
- Developed a creation rule to run update, terminate and rehire transactions on specified Employee and Contractor user accounts based on the feed file data.
- Developed a scheduler using Java that will periodically run to terminate contractors on their specified contract end date
- Developed a code that will send expiration notification to Contractors
- Developed a scheduler that would periodically check for Name change requests in the feed file data and will change the name of respective Employee account
- Developed a java code that will consolidate role details of user accounts into a CSV file and send to HR or Application Admin. The admin can then act upon the access of users accordingly.
- Built Joiner, Mover and Leaver workflows to maintain user accounts
- Developed custom workflows with approvals and also modified OOTB workflows as per client requirement
- Created and Implemented static/dynamic roles. Configured entitlements and policies.
- Analysis of the specifications provided by the client and help Project Manager to estimate the effort required
- Requirement analysis and preparing Requirement Documents and Design Documents
Environment: Sail Point IIQ, Java 1.6, SVN
Confidential deveoper| CITI GROUP| DALLAS TX| aug 2012 - Nov2013
Responsibilities:
- Involved in designing, development and implementing of IdentityIQ.
- Involved in onboarding client specific Applications.
- Worked on identifying central source of data feed in order to onboard Identities into Confidential .
- Developed Audit Detail Report, SOX Report and Remediation Report as per client needs.
- Involved in designing and implementing Custom AD connectivity in order to pull data from AD.
- Designed integration configuration for Remedy ticketing system with Confidential IIQ as to cater existing client specific ticketing system.
- Developed BuildMap rules, Pre-Iterate rules and Customization rules
- Developed Delegation rules, customized certifications to send email notifications as per client needs.
- Developed custom certifications to cater client needs.
- Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs.
- Worked on various Certifications, developed custom task and reports.
- Worked on Scopes in Confidential, to manage users in different geo locations.
- Worked on custom and out of box workflows in Confidential .
Environment: Confidential IIQ, J2EE, xHTML, CSS, JavaScript, JQuery, MySQL, SVN, HTML, Web Sphere Application server 6.0.
SOFTWARE ENGINEER| Corvys info tech | Aug 2010 -July 2012
Responsibilities:
- Design, develop, test, support and deploy the desktop application for Supply Chain Management in J2EE, Oracle web logic.
- Gather the requirements and create the technical design documents.
- Research and evaluate software related technologies and products related to J2EE architectural designs.
- Design and develop testing and maintenance procedures and activities.
- Develop and write the coding that meets the customer requirements.
- Create the necessary new documentation and update the existing documentation.
- Assist and support other team members on multiple projects.
- Ensure compliance with the documented software processes and procedures throughout the lifecycle.
Environment: Java 1.4,J2EE 4.0,Agile methodology, JSP, EJB, JMS, Oracle 10g, HTML, XML, WS,IBM Web Sphere Application Server