We provide IT Staff Augmentation Services!

Sr. Consultant  Resume

5.00/5 (Submit Your Rating)

Boston, MA

PROFESSIONAL SUMMARY

  • 6 years of experience in design and web based applications with strong Object Oriented Designing skills and Identity and Access Management Professional
  • Experience with Implementation and Administration of Confidential for large population of users. •
  • Participate in all Confidential deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration.
  • Delivery Focused: Worked closely with stakeholders and client technical leads to deliver quality on time deliverables.
  • Expertise in configuring workflows and Integration for life cycle events. 
  • Designed and developed different rules for Confidential Identity IQ product. 
  • Expertise in Analysis, Design, Development and Deployment of Confidential
  • Direct provisioning using direct connectors for integration of target applications 
  • Developed Custom java classes in IIQ. 
  • Performed Integration with multiple applications such as AD, Exchange, RDBMS, and Flat File.
  • Experienced in using XML skills such as SAX, DOM, XSLT, DTD, and XSD. Specialized in using IDEs like Eclipse and WSAD for Java programming.
  • Hands on experience with implementation of Sun Identity Management 7.0 for various users' account
  • Business Domains: Worked in projects for small and large Enterprises - HealthCare, Retail, and Technology
  • Technology Domains: Worked in IDM, IAM, Directory Services
  • Developed projects for design, and implementation of Confidential, including coordinating with vendor leadership, technical services leadership, and end user customers
  • Strategized venture checking and details reports to plainly convey the task guide Configuration and development of Confidential Life Cycle Events (LCM)
  • Experienced with all facets of SDLC (Requirements, Design, Development, Testing, Implementation, installation, documentation and Maintenance) using UML, MS Visio, Rational Rose
  • Communicated to clients and partners aspects of both the product and the implementation at the technical and functional levels appropriate for the situation
  • Responsible for post-sales requirements gathering, analysis and documentation
  • Installed, integrated and deployed enterprise software in client environments
  • Developed product customizations in Java and Bean shell to meet customer requirements
  • Worked with clients post implementation for user testing, debugging, support and maintenance
  • Managed project scope, schedule, status and documentation
  • Developed and delivered technical training designed to enable/educate implementation partners.
SKILLS
  • Identity and Access Management:
  • Confidential, IdentityIQ, Oracle Identity Management, Oracle Access Manager, Oracle Identity Analytics, Sun Identity Manager. Sun Access manager.
  • Build Tools:
  • Eclipse, NetBeans
  • Databases:
  • Oracle, (PL\SQL), SQL Server, MySQL, MS Access 2010
  • Programming Languages:
  • C, Java script, CSS, XML, HTML, JAVA, J2EE, JSP,
  • Servlet, JDBC, SOAP, LDAP, PHP.
  • Operating Systems:
  • LINUX, Mac OSX, Windows
  • Software Modeling Tools:
  • Microsoft Office Suite, MS Project

PROFESSIONAL EXPERIENCE

Sr. consultant 

Confidential

Responsibilities:

  • Confidential IIQ Installation and configuration as required by design solution.
  • Create various reports in IdentityIQ like Orphan Account reports, Account Discrepancy reports, Role composition report, Identity Reports and Application attribute reports.
  • Analyze the application before on boarding to get extract of application with the user unique ID, access levels and permission and do deep dive sessions.
  • Implementation of Self-service feature, Password feature, Provisioning feature and policies in Confidential .
  • To maintain user account workflows using form Joiner, Mover and Leaver.
  • Evaluate Confidential -IIQ by Life Cycle Management, Access Review/Certifications, Policy Management, Role-Based Access Control and Connector modules.
  • Involved with existing Provisioning Team for the application in order to make it fit in to IIQ and to get the existing User Access Management (UAM) model.
  • Manage Confidential installation, integration, provisioning and connectors like AD, PeopleSoft HRMS. Recognize the risks and root cause to mitigate the existing risk in our progress.
  • Create/Amend/Delete user access for the on boarded applications using Provisioning application’s requests in IIQ.
  • Implement and Schedule various type of User Entitlement Reviews for applications and databases in a timely manner to all the business areas across the organization.
  • To implement Change Requests in IIQ, Drawing Scheduling of Events and Shape of the weekend for Business check Outs.
  • Developing Work groups and Populations in IIQ.
  • Develop Role Model Templates based on the applications on boarding by getting engaged with various business people and TS also.
  • Specify and upload application data feed on to IIQ application.
  • Build new IIQ based roles for the application on to IIQ..

Environment: Sail Point IIQ, Java 1.8, Apache Tomcat, Office 365, Eclipse, GIT

Confidential

Responsibilities:

  • Worked on Identity Access Management, and used it effectively in the design and implementation of Confidential .
  • Actively involved in the implementation of Confidential 's IdentityIQ,
  • Design complex exclusion rules, correlation and data loading tasks in IdentityIQ.
  • Designed Graphical User Interface (GUI) using Master Pages, HTML, JavaScript and CSS classes
  • Used jQuery and AJAX to make the User Interface more responsive
  • Responsible for designing and developing the database objects like Tables, Views, and Complex T-SQL Store Procedures involving Joins and using Temporary Tables, UDF(User Defined Functions)
  • Familiar with Access Governance and Compliance, with knowledge of engineering SODS.
  • Managed client requirements and configure Confidential connectors for various applications.
  • Work closely with Confidential architect and engineers for design and solution architecture
  • Involved in design and implementation of IdentityIQ solution in FDIC, configuring Active Directory, and Shared Folders.
  • Established measures, metrics, and goals to drive performance as per business, security, and IT needs.
  • On boarded various applications like delimited file, AD etc.
  • Developed Build Map rules, Pre-Iterate rules and Customization rules
  • Developed Delegation rules, customized certifications to send email notifications as per client needs.
  • Writing unit tests using N-Unit and Involved in Test Plans and wrote Test Scripts for Manual and Automation Testing.
  • Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs.
  • Involved in creating custom reports, certifications in order to cater various data feeds.
  • Implemented Forms Authentication using database for Usernames/Passwords.
  • Validation controls were used to accept or reject input before additional processing.
  • Client form validations are done using HTML, Java Script.
  • Used Entity Framework Code First Approach in implementing data access layer in the project.
  • Developed custom certifications to cater client needs.

Environment: Sail Point IIQ 6.4, Apache, Java, SVN, ASP.NET

Confidential

Deveoper, BOSTON MA 

Responsibilities:

  • Design and Implementation of Confidential IIQ
  • Confidential IIQ Installation and Configuration as required by the design solution
  • Implementation of Self Service feature, Password features (PTA, Forgot password, Change Password), provisioning feature, configuring various roles and policies in Confidential
  • Set up Confidential IIQ policy server on 4 environments (Dev, QA, UAT & Production)
  • Developed build map rule, creation rule and customization rule to create Employee and Contractor user accounts into Confidential from their current application’s exported feed file.
  • Developed a custom form in the Confidential UI so that various admins can create Employee/Contractor user accounts manually through UI and provision users
  • Developed a creation rule to run update, terminate and rehire transactions on specified Employee and Contractor user accounts based on the feed file data.
  • Developed a scheduler using Java that will periodically run to terminate contractors on their specified contract end date
  • Developed a code that will send expiration notification to Contractors
  • Developed a scheduler that would periodically check for Name change requests in the feed file data and will change the name of respective Employee account
  • Developed a java code that will consolidate role details of user accounts into a CSV file and send to HR or Application Admin. The admin can then act upon the access of users accordingly.
  • Built Joiner, Mover and Leaver workflows to maintain user accounts
  • Developed custom workflows with approvals and also modified OOTB workflows as per client requirement
  • Created and Implemented static/dynamic roles. Configured entitlements and policies.
  • Analysis of the specifications provided by the client and help Project Manager to estimate the effort required
  • Requirement analysis and preparing Requirement Documents and Design Documents

Environment: Sail Point IIQ, Java 1.6, SVN

Confidential deveoper| CITI GROUP| DALLAS TX| aug 2012 - Nov2013

Responsibilities:

  • Involved in designing, development and implementing of IdentityIQ.
  • Involved in onboarding client specific Applications.
  • Worked on identifying central source of data feed in order to onboard Identities into Confidential .
  • Developed Audit Detail Report, SOX Report and Remediation Report as per client needs.
  • Involved in designing and implementing Custom AD connectivity in order to pull data from AD.
  • Designed integration configuration for Remedy ticketing system with Confidential IIQ as to cater existing client specific ticketing system.
  • Developed BuildMap rules, Pre-Iterate rules and Customization rules
  • Developed Delegation rules, customized certifications to send email notifications as per client needs.
  • Developed custom certifications to cater client needs.
  • Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs.
  • Worked on various Certifications, developed custom task and reports. 
  • Worked on Scopes in Confidential, to manage users in different geo locations. 
  • Worked on custom and out of box workflows in Confidential . 

Environment: Confidential IIQ, J2EE, xHTML, CSS, JavaScript, JQuery, MySQL, SVN, HTML, Web Sphere Application server 6.0.

SOFTWARE ENGINEER| Corvys info tech | Aug 2010 -July 2012

Responsibilities:

  • Design, develop, test, support and deploy the desktop application for Supply Chain Management in J2EE, Oracle web logic.
  • Gather the requirements and create the technical design documents.
  • Research and evaluate software related technologies and products related to J2EE architectural designs.
  • Design and develop testing and maintenance procedures and activities.
  • Develop and write the coding that meets the customer requirements.
  • Create the necessary new documentation and update the existing documentation.
  • Assist and support other team members on multiple projects.
  • Ensure compliance with the documented software processes and procedures throughout the lifecycle.

Environment: Java 1.4,J2EE 4.0,Agile methodology, JSP, EJB, JMS, Oracle 10g, HTML, XML, WS,IBM Web Sphere Application Server

We'd love your feedback!