We provide IT Staff Augmentation Services!

Identity Access Management/security Analyst Resume

Plano, TX


Experienced professional with proven success as a security analyst with a focus on Identity Access Management and Endpoint Protection. Strong ability to manage projects from concept to completion ensuring their on - time, on-budget, and on-quality delivery. Military veteran with demonstrated skills in working with both business owners and information technology experts to provide optimal business results. Well-versed in system security.


  • Project Management
  • Business Intelligence
  • Strategy and Execution
  • Wireless Solutions
  • Training and Mentoring
  • Firewall Policies and Procedures
  • Network Monitoring
  • Agile/Scrum SDLC Methodologies
  • Process Redesign
  • Client Relations
  • End-User Training
  • Microsoft Office


Confidential, Plano, TX

Identity Access Management/Security Analyst


  • Manage identity access management process for the creation, modification, and removal of user-level access across key systems
  • Responsible for access controls and integration on Active Directory, Office365, AS400 iSeries, and legacy applications
  • Write and use Powershell scripts to create and maintain user accounts
  • Responsible for the management of Confidential and endpoint security of workstations and servers
  • Increased customer satisfaction for on-boarding process by reducing time between request and completion
  • Responsible for security compliance of endpoint protection of over 1200 mobile workstations
  • Achieved and maintained 97% reduction in daily threats from 1,151 to 36 through threat detection and trend analysis to spot machines with malware
  • Manage Fortigate firewalls, configuring policies, security profiles, virtual private networks, web filtering, upgrading firmware, and managing users
  • Investigate intrusion alerts through network traffic analysis using FortiAnalyzer, Meraki Dashboard
  • Business Intelligence/Business Analyst III
  • Responsible for the creation of project scopes based on business-defined requirements
  • Define and document Confidential Controls for more than 120 remote centers
  • Collaborate with team members to design stories and develop workable scenarios
  • Prioritize stories based on dependencies, logical flow, and value
  • Engineer processes to most effectively include software modules, user practices, and business needs
  • Produce BI reports, dashboards, and data models
  • Research BI and report results to senior leadership. Liaise with multiple business groups to improve BI reporting and analytics.
  • Write and implement Confidential processes

Confidential, Houston, TX

Contract Software Trainer


  • Develop and lead training for end-users, help desk staff and other trainers for on-line ordering and tracking application
  • Manage all aspects of training including announcements, invitations, scheduling, confirmations, teleconferencing service set up and on-line hosting, instructions to join on-line meeting and teleconference, and follow-ups
  • Create PowerPoint presentation to teach on-line e-business application.
  • Utilized on-line hosting vendors to present PowerPoint slide show and live demonstration
  • Partner with leadership and programmers to include alterations recommended by end-users during training sessions
  • Work under deadline to develop training, review and delivery and other department reporting requirements.

Hire Now