Security Engineer Resume
Boston, MA
PROFESSIONAL SUMMARY:
- Overall 8+ years of experience in Installation, Configuration, Deployment, Administration and trouble shooting of middleware applications such as Directory Server IBM Tivoli Directory Server 6.2 fp1/6.3Netegrity/CA SiteMinder 5.5/6.0/12.5, Sun One Directory Server LDAP 5.2/6.0/6.3, Sun Identity Manager 7.x/8.x and maintaining Single Sign On
- Experience in maintenance IBM Tivoli Identity and access management and other components like Policy Server, WebSeal, Application server and LDAP
- Working on Tivoli Identity Manager(TIM), IBM Directory Integrator(IDI), Tivoli Access Manager (TAM), IBM Directory Server (IDS)
- Operational administration and support of Identity Manager and Access Manager
- Support of existing production and test environments
- Installing, configuring and integrating Web servers (plug - in file), SiteMinder Webagents and LDAP user directory with Websphere Application Server 7 fp23.
- Experience in implementation of Security Management tools in enterprise wide applications to achieve Authentication, Authorization and Accountability.
- Experience in installing and configuring ADAM as policy stores to Siteminder. And experience in establishing replication between the ADAM instances.
- Experience in Upgrading SiteMinder Policy Servers from version 5.5 to 6.0 and SiteMinder Web Agents from version 5.5 to 6.x
- Experience with using IdP initiated and SP initiated SAML profiles with different binding methods like POST, Artifact, Redirect to deliver a custom SSO environment as per the requirement.
- Experience in creation the ACI’s entity type and Provisioning to Accounts, Dynamic Role, Service, workflow Design
- Working experience in the development of CA-SiteMinder Single sign-on Services with SiteMinder configurations (setting up policies, realms, rules and responses).
- Good working knowledge and experience in entire features of SiteMinder (Policy Server, WebAgents). Integratedpolicy servers with LDAP for Policy Store.
- Experience in Configuring CA SiteMinder System objects like Agents, Agent Conf Objects, Host Conf Objects, User Directories, Domains, Administrators and Schemas.
- Expertise in working with web servers - Sun One servers, IIS, Apache Web servers and IHS (IBM HTTP Server) in Identity and access management environment..
- Worked on Replication, Chaining, Load Balancing and other Administration tasks.
- Good experience in using Networking Protocols for client server applications like TCP/IP socket programming.
- Experience in Java, JSP, Servlet, HTML, Shell scripting, Perl scripting, ODBC, SQL Server 2008/2005/2000, Oracle 11g/10g/9i, Database Server DB2 9.5/9.7.
- Experience in working with multi cookie domain for single sign-on for mutual authentication using Netegrity products.
- Worked on UNIX, Linux, IBM AIX, Sun Solaris and Windows Platforms.
- Good experience in troubleshooting issues related to SSO, authentication and authorization, as well as troubleshooting Sun One Directory Server issues.
TECHNICAL SKILLS:
Tools: Tivoli Access Manager, Tivoli Identity Manager, Log Analyzer 5.1/6.0CA/Netegrity SiteMinder 5.5/6.0/12.5, SunOne Directory serve LDAP 5.2/6.0/6.3, IBM Directory Server, Sun Identity Manager 7.0/7.1/8.0, Web Agent 4.x/5.x/6.x
Databases: DB2 9.5/9.7 Oracle 8i/9i, SQL Server 2000/2005, MS Access.
Application/Web Servers: IBM Security Identity 6.0.0.10 and Access manager 8.0.1.3IBM Websphere Portal 6.0/6.1, WebSphere 4.x/5.x/6.x, Tomcat 4.x/5.x. SunOne 5.1/6.1, IIS 5.0/6.0/7.0, Apache 2.x,, HIS, JBoss EAP 5.x/6.x, web logic 10.x /11g.
Directory Servers: SunOne 4.x/5.x, Iplanets, MS Active Directory,IBM-Tivoli Directory Server 6.2/6.3
Network Protocols/Services: TCP/IP, HTTP/HTTPS, RMI, SOAP, SSL, SMTP, POP3, NFS, DNS.
Operating Systems: Win 2000, 2003/2008, Solaris 9/10, AIX, Red Hat Linux
Databases: Oracle 9i/8i/7.x, DB2 9.5/9.7 UDB 7.x/6.x, SQL Server 2000/7.0/6.5
Scripts/Languages: Unix Shell programming, PERL, JavaScript, C/C++, HTML, VB Script, Java, MS Excel Macros(Scripting).
Web Technologies: JSP, ASP, Servlets, .NET, XML, AJAX, FLEX, Web services.
PROFESSIONAL EXPERIENCE:
Confidential, Boston, MA
Security Engineer
Responsibilities:
- Maintain and support the IAM applications.
- Experience gathering business requirements and translating those into system requirements
- Manage the current users by provisioning and resolve user registration, password reset, and authentication issues including SSO authentication.
- Responsible for provisioning of user account for newly created user
- Responsible for the operational management and support of MassITs Identity and Access Management (IAM) processes, and infrastructure.
- Experience with evaluation, integration, testing and performance monitoring Access Management application support
- Responsible for creating Adoption, Identity, password and Provisioning Policies on Testing and Production Environment
- Experience in Password Management and User provisioning System integration for authentication and authorization for Internal and External applications worked field using Identity Manager, PKI, Access/Authentication Manager
- Support and configuration of multiple instances of ITIM ITAM, ISIM ISAM ( Dev, QA, Prod )
- Responsible for resolving user identity administration exceptions, as well as working with the Commonwealths account management teams for maintenance of user security roles and profiles.
- Configuration of ITIM creating new users and managing the existing users.
- Responsible for continuous uptime support for the web access management systems, including collaboration and coordination for IAM incident management processes for Commonwealth agencies.
- Support IAM business operations processes, the current systems that support them and their functional capabilities.
- Experience with Single Sign On, various authentication mechanisms and authorization schemas
- Working in recertification of ITIM accounts and define recertification policy for ITIM service and trigger the role approval in ITIM/ISIM accounts.
- Troubleshoot customer issues and engage other Mass IT departments to ensure customer issues are resolved.
- Experience with administering the ISAM/Security Access Manager /WebSEALtool for both prod and non-prod environments
- Provided trouble-shooting and configuration of Web SEAL and all components with-in the TAM/Identity Management space.
- Accurately evaluate the type, complexity and magnitude of each issue reported so that it can be categorized correctly and escalated effectively.
- Design or customize workflows and set up password Synchronization and Check status of Reconciliation on daily basis
- Perform operational checklists and tasks such as log reviews, report scheduling and running, issue analysis and resolution, escalation and follow up activities.
- Create provisioning and de-provisioning policies in TIM and design the custom workflows.
- Working on policy server, TIM, DB2 and LDAP Set up reconciliation and design custom workflow.
- Updating ITIM data base of reconciliation and Continues monitoring on all the servers.
- Customizing Manage Provisioning Policies and automating manage access request workflow.
- Provide Tivoli Access Manager Support for an average of 80,000 users, 100+ junctions.
- Working in IBM Tivoli Identity and Access Management (TIM and TAM)
- Provision the users in to TIM from Active Directory and append the users from the Active Directory.
- Upgrading ITIM and ITAM 5.1 to ISIM and ISAM (version 6)
- Monitor ongoing operations and performance with management tools set to anticipate problems and act on issues when flagged.
- Escalation point for customer Help Desk for Identity Manager and Access Manager issues
- Priority access to the Identity Manager and Access Manager subject matter experts
- Proactive monitoring and maintenance of Identity Manager and Access Manager
- Responsible for provisioning of user accounts for newly created user, Provision the current users to different targets.
- Involved in operations like Add, Delete, Modify, Restore, Suspend and Change Password in ITIM.
Environment: CA SiteMinder 6.0, CA SiteMinder 12.5, IBM Security Identity Manager 6.0.0.10 Access manager 8.0.1.3 IBM Tivoli Identity Manager (ITIM v 4.5.1/4.6/5.0 ), IBM Tivoli Access Manager (TAM v5.1/6.0/6.1), IBM Directory Integrator IDI 5.1/6.0/6.1, DB2 DataBase 9.5/9.7, Windows 2007. SAML 1.1 and 2.0, WebAgents 5.x, 6.x, WebLogic 10, WebSphere 5.x, 6.0, Apache 2.x, SUSE Linux 10, LDAP 6.x, 7.0, Oracle 11g LDAP 5.2m, SOAP, UDDI, webMethods
Confidential, Chicago, IL
SITEMINDER/IDM ADMINISTRATOR
Responsibilities:
- Administered existing Single Sign On(SSO) and SAML applications implemented through SiteMinder 6.0,12.0 and 12.5
- Involved in upgrade plan for SiteMinder environment from SiteMinder 6.0 to SiteMinder R12.5
- Administered all the Policy Servers and Login Servers on UNIX boxes in both the data centers.
- Involved in installing, configuring and maintaining WebSphere Application Server, Tivoli Access Manager and Tivoli federated Identity Manager in both test and production environments.
- Installing new WebAgents on Unix Apache servers and Windows IIS servers for implementing SSO for new applications.
- Upgraded the SiteMinder environment from 6.0 to 12.5 and also the WebAgents
- Administering, installing and maintain TAI and IA agents on WebSphere and Weblogic application servers on UNIX boxes.
- Maintaining existing Domains, Realms, Rules, Responses and Policies. And adding new one’s depending on requirement.
- Worked on SOA architecture of B2B projects, which includes multi factor authentication for External Business Partners like Tririga
- Configuring all the applications to the centralized login page (SSO page) which come from the Login Servers and troubleshooting the login issues related to that.
- Monitoring Policy Server logs and WebAgent logs on a regular basis and when needed for troubleshooting, checking disk space and CPU utilization.
- Responsible for initial role analysis and PKI
- Involved in SAML 2.0 integration for new applications by being an IDP.
- Monitored applications and WAS performance through Tivoli performance viewer and tuned the systems- caching, queuing, JVM parameters, DB2 connection pooling.
- Troubleshooting the issues for the applications integrated with SAML for federated Single Sign On.
- Involved in the performance testing conducted by application teams with respect to SiteMinder Policy Server CPU utilization.
- Configuring SSO for different applications in different domains with Cookie Provider and troubleshooting issues related to them.
- Working with Apache webhosting, Loadbalancer and LDAP teams to set up SSO for the intranet and internet applications.
- Enabling and analyzing trace logs for single user login issues.
- Maintaining all the webagents, logs, SSO applications and SiteMinder team’s file system on all the WebFarmapache servers in both the data centers.
- Provided 24/7 on call production support and troubleshooting problems related to WebSphere Application servers and Tivoli Access manager
Environment: CA SiteMinder 6.0, CA SiteMinder 12.5, Tivoli Access Manager (TAM v5.1/6.0/6.1), IIS 6.0, 7.0, 7.5 on Windows 2000, 2003, 2008. SAML 1.1 and 2.0, WebAgents 5.x, 6.x, WebLogic 10, WebSphere 5.x, 6.0, Apache 2.x, SUSE Linux 10, LDAP 6.x,7.0, Oracle 11g LDAP 5.2m, SOAP, UDDI, webMethods
Confidential, GA
IAM/ Siteminder Admin
Responsibilities:
- Administered the existing complex SiteMinder Policy Server 5.5/6.0 environment for multiple internal and external applications.
- Involved in installing ADAM and moving the existing SiteMinder Policy Store instances from LDAP to ADAM and setup replication between the ADAM instances.
- Installed the Affiliate Agent, Affiliate Server for SAML 1.0 and 2.0.
- Performed user provisioning in Identity Provider site (IdP) and Service Provider site (SP) using SAML for SSO.
- Involved in Configuring the Domains, User directories, Rules, Realms and Policies.
- Configured Key Stores and Policy Stores depending on the environment’s internal and external server setup.
- Maintained and updated SiteMinder server objects Agents, Domains, Rules, Realms, Policies, and Responses.
- Installed and configured web agents on Web Servers like IIS 6.x, 7.0 and Apache 2.x.
- Worked on various types of Authentication Schemes like Form based and PKI certificates
- Experience in troubleshooting the issues in SiteMinder environment using policy server log files and agent log files.
- Involved in adding Web Servers, Policy Servers and Web Agents for maintaining SiteMinder SSO environment.
- Worked on SiteMinder architecture and taken care of changes that are needed based on capacity planning.
Environment: Netegrity SiteMinder 5.x/6.x, Sun Java System Directory Server LDAP 5.x/6.x/7.0, Identity Manager 6.0,IIS 6.0/7.0, Apache 2.x, Web agents 5.x/6.x, SAML, JDK 1.5/1.4, J2EE, JSP, Servlets, EJB, JDBC, XML, Solaris, Oracle9i.
Confidential, Orlando, FL
SiteMinder and LDAP Admin
Responsibilities:
- Installed, configured and administered SiteMinder Policy Server 5.5/6.0, Sun one LDAP Directory 5.2/6.x/7.0and Sun Identity Manager 7.x/8.x for multiple high profile projects.
- Installed, configured and integrated Web servers (plug-in file), SiteMinder agents and LDAP user directory with WebSphere Application Server on Solaris and Windows Platforms.
- Experienced in SiteMinder policy server log files for troubleshooting SiteMinder environment.
- Used Siteminder for authenticating the user passwords for the web application.
- Installing and configuring Webagents on Webservers like IIS 5.0/6.0, Apache 2.x, SunOne Webserver 6.1/7.0.
- Worked on installation, configuration and maintenance of Sun Identity Manager 7.0/8.0 under UNIX.
- Involved in IntegratingPolicy Store with LDAP to store SiteMinder policies.
- Configured the integration of SiteMinder 5.5/6.0 policies to work with roles defined in Identity Manager.
- Involved in Installation/configuring and troubleshooting the LDAPS’s(CA-Directory, SunOne-iplanet and RedHat Directory Server 7.1).
- Installation, configuring, deploying, upgrading, monitoring, performance tuning and maintaining of Web Logic Application and Portal Servers 7.x/ 8.x/ 9.x/ 10.x on multi Servers and Cluster environment.
- Involved in adding Web Servers, Policy Servers and Web Agents for maintaining SiteMinder SSO environment.
- Experience in implementing failover and load balancing schemes between WebAgents and Policy Servers and also between PolicyServers and LDAP
- Good knowledge on Sun IDM in provisioning and deprovisioning user accounts across multiple systems
- Worked on SiteMinder SMSession, Persistent and Secure Cookies.
- Maintained and gained Sound knowledge about the SiteMinder environment databases like Policy Store, Accounting Logs, Key Store, Token Data and Session Server
- Worked on tuning of SiteMinder, Agents, DIT’s &LDAP configuration parameters for better Throughput & response time.
- Developed logical security application architecture integrating Web Sphere Server, iPlanet LDAP Directory Server, CA SiteMinder and implemented Single Sign-On security.
- Experience in LDAP and Policy Server Performance Testing.
- Problem determination using local error logs and by running user traces and service traces
Environment: Netegrity SiteMinder 5.5/6.0, Sun Identity Manager 7.x/8.x, Sun Java System Directory Server LDAP 5.x/6.x/7.0, WebSphere Application Server 4.0/5.x/6.0,IBM Tivoli Directory Server, SSL, SNMP, UNIX, LINUX, Solaris, IBM AIX, Windows
Confidential
Siteminder Admin/ Java Developer
Responsibilities:
- Configuring Optimal Performance, Tuning Operating Systems and Directory Servers (kernel parameters, TCP/IP stack parameters, system cache, search algorithms, operational size limits, indexes, and import, database, entry cache).
- Worked with the Middleware team to move to the newly defined Web Portal.
- Performed Analysis and Planning for LDAP implementation. Mapping LDAP-enabled and non LDAP enabled applications and data sources to the default or supported schema. Extending the existing schema when necessary by creating custom object classes and custom attributes using the proper existing object classes and attributes.
- Expertise in coordinating with testing teams to resolve defects and provide 24/7 support for UAT and Production.
- All the custom Java based applications were made to participate in SSO
- Installation and Configuration of WebSphere Application Server
- Troubleshooting the UAT, & Production Issues using the ticket manager
- Involved in Installing and Configuring Sun Java and Apache Web Servers, WebSphere Application Server and configured with Webserver on Windows Platforms
- Worked closely with software developers on feature specifications and design.
- Worked and Involved in testing and developing server side helper classes and servlets.
- Contributed to J2EE development by writing Servlets, JSP, participated in navigation and functionality testing and validating using java script.
- Developed EJBs (Service Beans, Entity Beans), JSP Tags
- Involved in Creating Server Groups and Clusters in WebSphere Application Server
- Involved in Backing up Configuration and Log files
- Good Knowledge in Shell Scripts for backing up Unix Systems monthly and yearly
- Involved in documentation of design and testing plans
Environment: LDAP SunOne Directory Server, Siteminder, Sun ONE Web Server, LDAP, Oracle, Java, J2EE, UNIX shell scripting, Perl, SQL, Sun Solaris