We provide IT Staff Augmentation Services!

Information Security Architect Resume

PROFESSIONAL SUMMARY:

  • Around 14 years of experience working in Information technology - security practice, specifically in the area of Identity and access management ( Confidential ).
  • Worked in various roles, as a developer, Technical lead and with a short experience as an architect.
  • Have experience scoping business requirements, define and document design specifications, hands on implementation and managing deliverables.
  • Currently working on an implementation based on IBM Tivoli Identity Manager (ISIM) and SailPoint IIQ for past 1 year, yet extensive part of the experience involves Oracle (OIM, OAM, OES, OVD) and Sun Identity & Access Management products and LDAP technologies.
  • Experienced working with presales teams to prepare RFP/RFI response and working on the proof of concepts to demonstrate solution feasibility. Deriving effort estimates.
  • Designed and implemented various projects on Identity and Access Management solutions comprising Oracle Identity Manager (OIM), Oracle Access Manager (OAM), Oracle Entitlement Server (OES), Oracle Virtual Directory (OVD), Federation (OIF), Sun Identity Manager ( Oracle Waveset ), Enterprise Directory Servers and MS Active Directory
  • Hands on experience deploying out of box connectors, developing custom connectors, configuring authentication and authorization schemes and Confidential workflows/processes to integrate with wide variety of business systems. As a developer worked extensively on JAVA technologies and patterns.
  • Good Understanding of compliance and regulatory standards such as Sarbanes-Oxley Act (SOX).), PCI DSS (Payment Card Industry Data Security Confidential ) PII (personally identifiable information)
  • Worked in different project execution modes that followed typical waterfall or agile models involving methods based on DevOps, automation and cloud.

TECHNICAL COMPETENCIES:

Oracle Confidential and I&AM suites 11g and 10g, OIM-Oracle Identity Manager, OES-Oracle Entitlements Server, OAM-Oracle Access Manager, OVD-Oracle Virtual Directory, Oracle Waveset (SUN Confidential ), Java. SailPoint IIQ and Tivoli Identity Manager(ISIM).

EXPERIENCE:

Information Security Architect

Confidential

Responsibilities:

  • The core and critical project involves revalidation of the whole Identity and Access Management platform as per the Confidential quality guidelines.
  • Coordinate with quality and validation teams to provide required technical support to implement validation plan.
  • Capture shortfalls of the system with respect to Confidential standards, define technical change specifications to address the shortfalls or Issues identified in the system.
  • Review business requirements, design specifications, Test plans and test cases.
  • Draft Confidential operating procedures. Involve into discussions with different business and system owners to understand and capture business requirements and IAM implementation proposals. Work with Vendors to drive proof of concept for new implementations.
  • Coordinate with Onsite and offshore leads to track and review status of the deliverables.

Senior Consultant

Confidential

Responsibilities:

  • conducted interviews to gather requirements.
  • Defined and Documented requirement and design specifications.
  • Managed and supported Development team to develop Confidential artifacts and custom Restful services based on OIM API. configured IDP initiated SAML Federation between OAM and ServiceNow.
  • Coordinated with operations team for production deployment.

Confidential, Tampa, FL

Project Lead

Responsibilities:

  • Defined and Documented requirement and design specifications.
  • Teamed with Development team to Upgrade OIM and developed Confidential artifacts (Configurations, Schedulers, Process tasks and Even Handlers). Involved in presenting Project status to project stakeholders.
  • Coordinated with config & change management, Quality and operations teams to ensure all the milestones and deliverables are achieved

Senior Consultant

Confidential, Dallas, TX

Responsibilities:

  • Extensively engaged with system analysts to derive and define system requirements and systems architecture.
  • Developed OIM schedulers, event handlers, process tasks and adapters.
  • Deployed OOTB and custom connectors.
  • Developed role-based authorization models, converted the authorization models into OES entitlements.
  • Deployed OES PEP and PDP modules for enabling fine grained authorization for wide variety of enterprise applications.
  • Built custom interfaces extending Confidential API related to OIM, OES and OAM. Configured OAM authentication schemes, plugins and integrated applications to enable SSO and Federation.
  • Configured OVD adapters, Extended OID Schemas and attributes.
  • Abided by business processes to work with configuration change management, quality assurance and regulatory and compliance teams to deliver project deliverables.

Confidential, California

Senior Developer

Responsibilities:

  • Installed and configured Oracle Confidential (11gR1) applications into different environments.
  • Deployed connectors for LDAP and Database applications including GTC connector to seed User identities into OIM.
  • Worked on OIM and LDAP API to build custom methods and packages based on JAVA methodologies and design patterns.
  • Deployed, tested and released the changes into various environments

Confidential, New Jersey

Lead Developer

Responsibilities:

  • Analyzed new requirements to define technical aspects for the proposed enhancements.
  • Executed and demonstrated proof of concept to the project stake holders.
  • Developed custom workflows (based on native SUN Confidential Xpress language). deployed workflow changes.

Confidential

Project Lead

Responsibilities:

  • Conducted interviews with operations and business stakeholders to define and design technical aspects.
  • Executed and demonstrated proof of concept.
  • Developed and deployed workflow changes.
  • Configured Active synchronization to seed User Identities and to propagate joiner, mover and leaver changes into Confidential .

Hire Now