We provide IT Staff Augmentation Services!

Cyberark/idm Engineer Resume

4.00/5 (Submit Your Rating)

OH

SUMMARY

  • Over six years of experience in Installation, Configuration, Deployment, Administration and Support of CA/Netegrity SiteMinder 5.5/6.0, r12.51, Sun One Directory Server LDAP 5.2/6.0/6.3, Sun Identity Manager 7.x/8.x and maintaining Single Sign on (SSO) solutions for middleware applications.
  • Experience in Installation, Configuration, Deployment and Maintenance of SiteMinder Components like Policy Server, Web Agent, Policy Store and Key Store.
  • Experience in Enterprise Security Domain. In - depth knowledge of Identity and Access management products - CA Siteminder Access Manager,, .
  • Experience in LDAP based directories like iPlanet/Sun ONE Directory Server and Active Directory.
  • Worked on Provisioning, Remediation and Resource Adapter using Sun IDM.
  • Experience in Information Security management with good experience in Netegrity tools.
  • Involved in the Upgrading of SiteMinder Policy Servers from version 5.5 to 6.0 and SiteMinder Web Agents from version 5.5 to 6.x
  • Experience in Performance Tuning of SiteMinder Policy Server and the Operating system to boost the overall throughput.
  • Worked on SiteMinder intelligent rules and dynamically included data in the authorization decision process without custom development.
  • Worked extensively on UNIX, Linux, IBM AIX, Sun Solaris and Windows Platforms.
  • Excellent knowledge using Databases like Oracle 8i/9i/10g, Microsoft SQL, IBM DB2, SYBASE.
  • Good knowledge and expertise in using IBM Tivoli Directory Server, Sun One Directory Server, Apache Directory Server & Microsoft Active Directory Server.
  • Experience in programming using Java, JSP, Servlets, XML and HTML and UNIX shell Scripting.
  • Generated and modified plug-ins for Sun One Web Server, IBM HTTP Server and IIS to communicate with Weblogic/WebSphere application servers and Siteminder Policy Servers.
  • Involved in Design, implementation and deployment of LDAP components which include replication, data synchronization, and caching and index setup for faster search of users in order to improve performance.
  • Migrated Sun Identity Manager versions from 7.0 to 8.0.
  • Developing and implementing LDAP strategies like Authentication and Authorization of stores, migration and transformation of directory data.
  • Experience in setting up SSO environments. Integrated SSO products such as Netegrity SiteMinder and Sun One LDAP with existing enterprise applications and middleware applications.
  • 24/7 administration in a web hosting organization providing server and application support (Netscape/iPlanet/SunOne Web, Messaging, Admin, Directory, Proxy, Application)
  • Experience in Replication, Chaining, Load Balancing and other Administration tasks.
  • Fine-tuned and set up High availability with LDAP and SiteMinder. Tested and implemented back up & recovery. Designed and implemented solutions for fail over and capacity planning.
  • Good expertise in troubleshooting issues related to SSO, authentication and authorization, as well as troubleshooting Sun One Directory Server issues.

TECHNICAL SKILLS

IDM tools: SiteMinder (4.x/5.x/r6.x/r12.51), Identity Manager 5.6, Transaction Minder 6.x

Products: CA SiteMinder Access Manager, CyberArk

Databases: Oracle 11g/10g/9i, SQL Server 2008/2005/2000/7.0, MS My SQL 5.0, Access 7.0

Web-server: SunOne 5.1/6.1, IIS 5.0/6.0, Apache 2.x, Domino, IHS.

Application Server: IBM Websphere Portal 6.0/6.1, WebSphere 4.x/5.x/6.x, Tomcat 6.x/7. x./8.5. x.

Directory Server: IPlanet/SunOne directory server 5.x, Sun DSEE 6.3/6.3.1, Microsoft Active Directory, IBM-Tivoli Directory Server.

Languages & Technologies: Java (JDK), J2EE - Java Beans, JSP, Applets, ASP, JNDI, RMI, Java Mail, C, C#, SQL, PL/SQL, Perl, JDBC/ODBC

Packages & Utilities: Site Minder 5.x/6.x one view monitor, Tivoli Access Manager,TPV, LogAnalyzer,Thread Analyser, Unified Modeling Language(UML) 1.0, Rational Rose, Rational Clear Case, Rational Requisite, MS Visio, ERWIN

Identity Management Tools: CA Identity Manager r12/r8.1 r12.6SP4, Sun Identity Manager 8.0/7.1/6.0

PROFESSIONAL EXPERIENCE

CyberArk/IDM Engineer

Confidential, OH

Responsibilities:

  • Configured SiteMinder for SAML Federated Authentications by configuring ID Provider/Consumer using SAML 2.0 POST binding.
  • Installed Web Agent Option Pack and createdPartnerships, DocumentedVisio for SAML, AuthSchem andDay-to-day maintenance ofSiteMinderpolicy servers and troubleshooting production issues
  • Coordinated with the Service providers and identity providers during the SAML Certificate upgrade and architectural changes
  • Active Directory server (LDAP) and various Web & Applicationservers. OnSolaris, Windows platforms and Red hat Linux Operating systems.
  • Expertise in Active Directory design and support (GPO s, AD Schema, OUs, LDAP, Sites, Replication, etc.)Experience in managingActive Directory Domain Controllers,DNSandDHCPServers
  • Developed and documented to assist IBM on how to create functional / system accounts and the administration of the CyberArk application to vault system accounts for privileged access. The CyberArk application is a privileged account security solution.
  • Developed and deployed JDBC and JNDI custom connectors using Connector Xpress as per the requirements for LDAP endpoint and used role definition generators to deploy to IDM.
  • Privileged Access Management (PAM) project which includes implementingCyberArkPassword Vault, Web Access, Central Password Manager and Privileged Session Management.
  • Leveraged CyberArk Auto Detect (DNA) to perform auto detection of privileged administrative accounts from Active Directory for multiple platforms including UNIX, Linux, I Series and Windows.In charge of operation, security and maintenance of the CyberArk stack.
  • UpgradedCASiteMinderto R12 from 6and installed the Admin UI and configured the FSS Admin GUI, involved in developing REST services to integrate AEM applications,Configuring User Authentication Stores, Policy Stores and Key Stores on VDS and maintained replicated environment for load balancing and failover
  • Installed and Configured SiteMinder 5.5 Policy Servers, Web Agents, Sun ONE 5.2 and Active Directory Servers.Copy the Existing Group policies form one domain to another domain with in the Active Directory forest.
  • Configuring CASiteminderSystem objects like Agents, Agent Conf Objects (ACO)Host
  • Conf Objects (HCO), User Directories, Domains, Administrators and Schemas.
  • Administered theRSA/ACE serversfor issuing the Soft tokens for the VPN purpose as well as the applications which uses RSA Token authentication,Installed and configuredSiteminderWeb agents with IIS, Apache and IBM HTTP Servers for the web interface
  • Migration of SiteMinder 5.5 to 6.0 for advanced Load balancing, failover configurations and for facilitation of userimpersonation. Installedand configuredWeb agentson Webservers like IIS 5.0/6.0, Apache 2.x, and SunOne Webserver 6.1/7.0and upgradingCA Siteminder version 6.0 to R12, Ping Identity Federated Services in both Production and Non-Production environments.
  • Experience in installingPingAccessin clustered and high-availabilitymode,Haveknowledge in Upgrade and maintenance of Ping Access and Federation product tools.
  • Experience in implementing Password Policies and reading the password blob using SM agent APICreated policies, realms, rules and responses to implement the single and dual factor authentication
  • Integration Custom Authentication Scheme in AEM site as per the Business requirements
  • Coordinated with IAM team in creating new SiteID, implemented password policies for all the applications usingSiteminderPolicy Server.Configured APS, FPS, Rules, and Help Desk FunctionalityReplacement,iInvolvedin configuring RSA Authentication
  • Experience in installation and configuration of PingFederate 6.6/6.10/7.0. Involved in the migration of PingFederate from 6.6 to 6.10.Documented all the Siteminder related on JERA Digital Confluence

ENVIRONMENT:CA SiteMinder R12 SP2, Identity Manager 6.0, CyberArk,Active Directory, Web agents 5.x/6x,Active Directory,IBM WebSphere Application Server 5.x/6.x/7.x/8.x, CA Wily 8.x, J2EE, JDBC, XML, JBOSS 7, SAML 2.0, Sun ONE Directory Server 5.X/6.X, CA Identity Manager r8/r12,Apache 2.x,Ping FederateIIS 5.0/6.0,Solaris 8/9/10, Red hat Linux 5.x, Oracle 10g/11g, SQL Server 2005, DB2 8.X.

IDM Engineer

Confidential, PA

Responsibilities:

  • Understand and analyze functional specific requirements.
  • Manage the day to day operations of CyberArk solutions including adding and deleting accts.
  • Creating and assigning Safes, reconciling accounts, rotating passwords.
  • Create AD users and groups for safe delegation and updates.
  • Conduct workshops with application and infrastructure teams about on-boarding privileged accounts.
  • Integrate Active Directory and RSA with vault components for secure authentication
  • Works with Unix / Directory Support and Network team
  • Perform application and Job designs with the existing and current requirements.
  • Design build and support processes on Windows Servers and Cyber Ark Security Platform. Providing support to Server owners on the security Servers.
  • Coordinate with CyberArk support teams for escalation and resolution issues
  • Ensure that all Identity and access management services are secure, available, efficient and meet defined corporate services levels
  • Support on Windows servers, LDAP, Remedy Administration and Vshares
  • Support on RSA Authentication services.
  • Co-ordination with the offshore support teams to address technical or business requirements related queries.
  • Involved in configuration of WebSphere Application Server resources like JDBC Data Sources, JDBC Providers and Connection Pooling to connect to the DB2.
  • Testing the application in different browsers like Internet Explorer, Chrome.
  • Understanding of version control systems. Involved in both Sever System analyze and Security support on CyberArk as well as Support on Security on Windows servers.
  • Monitoring logs, analyzing logs and Troubleshooting issues with the server and the environment.

ENVIRONMENT:CA SiteMinder R12 SP2, Identity Manager 6.0, CyberArk,Active Directory, Web agents 5.x/6x,Active Directory,IBM WebSphere Application Server 5.x/6.x/7.x/8.x, CA Wily 8.x, J2EE, JDBC, XML, JBOSS 7, SAML 2.0, Sun ONE Directory Server 5.X/6.X, CA Identity Manager r8/r12,Apache 2.x,Ping FederateIIS 5.0/6.0,Solaris 8/9/10, Red hat Linux 5.x, Oracle 10g/11g, SQL Server 2005, DB2 8.X.

Siteminder/LDAP Engineer

Confidential

Responsibilities:

  • The objectives primarily deal with the Implementation and Integration of CPI Max Portal driven by IBM WebSphere Portal 6.0 with the CA Siteminder 6.0 along with SUN-One Ldap for accomplishing the task of Authentication, Authorization, and Accountability.
  • Installation of SiteMinder WebAgents plug-in for Apache Web Server based IBM HTTP Server.
  • Installed and configured the LDAP Sun ONE Directory Server. Configured the multi master replication in Sun ONE Directory server.
  • Installed and configured Redhat directory server to centralize application settings, user profiles, group data, policies, added multiple Redhat directory
  • Master/Slave replication servers and access control information.
  • Maintained Redhat Directory server central repository for an Identity Management infrastructure, user management, eliminating data redundancy and automating data maintenance.
  • Expertise in configuring, administering and deploying components like iPlanet, Netscape, WebSphere application server, Tomcat, Java web server, Directory server (iPlanet directory server (LDAP 5.x), Netegrity Siteminder and Netscape administration server.
  • Worked on writing Shell script and Linux script for command line interpretation of Operating system.
  • Performed ongoing SiteMinder infrastructure load testing, tuning to support business growth.
  • Installation of eTrust SiteMinder Agent r6.0 for IBM WebSphere.
  • Installation of Siteminder Policy Server Optional Pack and Web Agent Optional Pack for Federation
  • Installation of Servlet Exec 5.0 for aff webservices of CA Siteminder Optional Pack, Analysis and identifying the components of the CA SiteMinder 6.0 to integrate with IBM WebSphere Portal.
  • Responsible for installation of various components involved in the setup of a standalone security setup using LDAP and SiteMinder.
  • Good Working knowledge of Importing and Exporting LDIF data.
  • Installation and configuration of Sun ONE Directory Server 5.2 and SiteMinder SP 5.0.
  • Designed logical security application architecture integrating WebSphere Application Server, SunOne Web Server, iPlanet LDAP Directory Server, Netegrity Siteminder and implemented Single Sign-On security.
  • Developed and deployed JDBC and JNDI custom connectors using Connector Xpress as per the requirements for LDAP endpoint and used role definition generators to deploy to IDM.
  • Installation and trouble shoot in implementation of SiteMinder Trust Authentication Interceptor (TAI) for IBM Websphere 6.0.
  • Created a standardized SiteMinder rule set and response set in preparation for migration to take advantage of global rules and global responses offered in SiteMinder 6.0 version, Sun one, iPlanet, Java LDAP server administration .

Environment:CA SiteMinder Policy Server v6.0, Web Agent 5QMR7, 6. Sun Identity Minder 5.1, 5.2, Sun one Directory Server (LDAP), Sun ONE Web Server 6, Apache Web Server 2, BEA Web logic 8.1 SP2, Web Sphere 6, Oracle RDMS, Korn shell scripting, Perl, XML, UNIX, Windows Active Directory

SiteMinder engineer

Confidential, CA

Responsibilities:

  • Installed, Configured and Maintained SiteMinder, Policy Servers, Sun One Directory Server and configured multi master replication in Directory server.
  • Enabled Single Sign-On across Web servers in a single cookie domain or across multiple cookie domains without requiring users to re-authenticate.
  • Used Configuration wizard and builder extensively to create and manage Web Logic.
  • Worked on Creating for security policies for the SiteMinder.
  • Configured and setup Secure Sockets Layers (SSL) for data encryption and client authentication.
  • Deployed the web applications and maintained on multiple Web Logic Servers.
  • Configured WebSphere resources like JDBC providers, JDBC data sources, connection pooling and Java Mail sessions.
  • Created Data sources, Queue and Topic connection factories, Virtual hosts etc.
  • Involved in Configuring and updating IBM Http Server Plug-in to work with WebSphere Application servers on routine basis.
  • Wrote wsadmin scripts to automate application deployments, to update configuration changes.
  • Developed Crontab scripts for timely running jobs and provide server status.
  • Created Queue Managers, Channels and Clusters in WMQ 5.0.x.
  • Involved in integration testing for third party API integration.
  • Provided Support to internal teams in solving Test Environment and Production issues.
  • Responsible for Support and reliable maintenance of the applications on different platforms for on-going application development.
  • Configured Workload Management (WLM) using server groups in WAS 4.x and Server clusters in WAS 5.x.
  • Performed routine management of WebSphere Environment like monitoring Disk Space, CPU Utilization.
  • Provided operational and on-call pager support for assigned applications

Environment: Netegrity SiteMinder 5.x, Web Logic Server, Solaris 9, UNIX, Windows 2000, DB2, Sun One, Web Server 5.0, XML, Web Logic Portal 7.x/ 8.x, LDAP, Tivoli, JDK 1.4, JRockit, JSP, Servlets, EJB, JDBC, XML, iPlanet, Apache, Wily Introscope, HIS, Sybase, AIX, Linux.

We'd love your feedback!