We provide IT Staff Augmentation Services!

Senior System Administrator Resume

4.00/5 (Submit Your Rating)

TECHNICAL SKILLS:

Platforms: Windows/ AD (Active Directory), Novell, UNIX (AIX, Linux, Solaris), Mainframe(RACF, z/OS, AS/400), RedHAT

Front End Tools: Visual Basic (VB), Developer 2000, PL/SQL Developer

Databases: Sybase, Oracle (10g, 11g), UDB, DB2

Database Application: Oracle Financials, PeopleSoft Financials (GL, AP, AR), PeopleSoft HRMS (Time & Labor, Payroll, Benefits), and JD Edwards

Programming Language: C++, C, Java, SQL, PL/SQL, XML, ASP, HTML, Korn, Shell, Bash.

Software: Oracle Financials 10.0, Visio 2003, SQL*Loader, Lotus Notes 6.5, SUN IDM, RBACx, Rational Clear Case, Rational Clear Quest, BMC Remedy, Office 2010 suite, Tivoli Access Manager (TAM), Oracle Identity manager (OIM), SailPoint, CA User Activity Report Module 12.5.02, ARX Co - Sign (E-Signature), CRM MS Dynamics 2011,Oracle VM VirtualBox, CA Governance Minder 12.6, ISAM 9.0, DataPower xi52 - 7.6, IBM WebSphere

PROFESSIONAL EXPERIENCE:

Confidential

Senior System Administrator

Responsibilities:

  • Experience wif IBM DataPower policy configuration, application integration, deployment, and Troubleshooting for application domains.
  • Experience wif DataPower AAA (Authentication, authorization, and Auditing)
  • Experience wif SSL DataPower troubleshooting, services instrumentation, monitoring, logging, enabling probes and capturing logs
  • Experience wif managing and supporting IBM Tivoli Federated Identity Manager (TFIM) and Security Access Manager (ISAM)
  • Experience wif Tivoli TFIM/ISAM configuration, integration, deployment, updating, administration, and Troubleshooting

Confidential

AD GreenField Project - Lead RBAC Engineer

Responsibilities:

  • Serving as a Subject Matter Expert (SME) for Role-based Access Controls (RBAC) project to create Role Lifecycle Management across each department wifin QT Enterprise.
  • Integrated Risk strategies into Identity Access Management (RSA Via) control tools
  • Collaborated wif Technology and Business teams to implement risk strategies
  • Manage and support role-based controls to ensure appropriate access
  • Tested for Segregation of Duties (SOD) violation wifin roles and user entitlements.
  • Responsible to create a pre-approved role and eradicate user cloning.
  • Analyzed and take action to maintain application compliance
  • Supported Risk Management and Support Teams wif timely data analysis and out of teh box reports from reporting server.
  • Reviewed Windows Active Directory requests for risk compliance
  • Translate roles from business capabilities into technical roles sustainable in teh Windows active directory repository.
  • Established policies and compliance guidelines to enable maintenance (evergreen) of RBAC as business/technologies change.
  • Define request and approval workflows wifin RSA IDM tool.
  • Created campaigns for Application Owners and Users Managers to perform periodic reviews and validated teh closed-loop remediation.

Confidential

Oracle Identity Governance

Responsibilities:

  • Create, manage and provide oversight of teh access control policies and corresponding roles and responsibilities for business application owners and provisioning parties. Provide guidance on compliance wif access policies while staying informed of client efforts.
  • Work wif teh business and IT in application and enterprise role definition for low, medium or high risk applications/user entitlements incorporating security best practices such as Individual Accountability, Least Privilege and Segregation of Duties (SOD).
  • Participated in teh identification of SOD violations wifin and across low, medium, or high risk applications as well as assist wif teh subsequent analysis and resolution of identified violations.
  • Participated in reviewing and approving changes to application and enterprise roles as part of teh Role Governance Working Group.
  • Assisted wif teh integration of high risk applications wif teh role and access management solution by driving requirements gathering and documentation of interface agreements for integration wif teh access management solution.
  • Coordinate and monitor higher risk access s such as privileged accounts or ad hoc s for high risk applications. Assist in coordinating teh completion of role and access s under access governance and monitor overall completion of access s.
  • Assisted wif teh development of for end users related to access control principals and policies.
  • Assisted wif ongoing enhancements to teh user life cycle management process.
  • Created User Access reviews (UAR) for managers and role owners.

Confidential

CA IDM Pilot Project - IT Consultant

Responsibilities:

  • Application integration in CA Governance Minder 12.6
  • Creating configurations for each application and integrating them together for campaign
  • Access campaigns: Role, User Privileges, Resource Links
  • Role discovery (RBAC) wifin teh CA Governance Minder Client tool.
  • Created Business Process Rules (BPR’s) for Segregation of Duties(SOD) violation.
  • Updated teh solution design and run books wif teh updated configuration as applicable.
  • Import application raw data through CSV file connectors.
  • Import Mainframe data through TSSCFILE connector to perform deep integration.
  • Used Pentaho Data Integration (kettle) tool to transform and load teh data in excel file to import through CSV connector.
  • Defined business unit roles for departments using Aveksa Business Role Manager module.
  • Created iterative and quarterly access campaigns using CA Governance Minder.

Confidential

CRM Pilot Project - IT Consultant

Responsibilities:

  • Participated in creation of user stories as a part of development effort.
  • Part of Agile Software development team to Customize/Develop forms, views, and web resources for CRM2011 in .Net environment.
  • Installation and Configuration of hardware expansion in VirtualBox as a part of development effort.
  • Solutions created in Oracle Virtual Box and migrated to Dev and Prod environments.
  • Version control performed in team Foundation Server (TFS) as developers are spread across teh zone.
  • Managed Identities in Active Directory for user authentication to Dynamics CRM 2011.
  • Developed and managed MS Dynamics CRM 2011 user Security Roles (RBAC).
  • Establishing ODBC connection to Database to retrieve data.
  • Created CRM 2011 Custom Reports using Microsoft SQL Server Reporting Services (SSRS).
  • Customize Ribbons using Ribbon Editor and Ribbon Workbench.
  • Assisted in configuring Contact/ Call Center Desktop (CCD) Agent's hosted control, action calls, routing rules, toolbars, etc.
  • Configured Sitemap xml file to display teh correct entity for CRM Web application.
  • Installed and updated CRM development servers.
  • Managed IIS and Plugin Deployment for development servers.
  • Provided documentation and assistance in all points of development to development lead, architect, and teh project manager.
  • Part of CA IDM implementation team for all teh IAM services for a federal client.
  • Installed and Configured CA IDM - ELM 12.5x
  • Validating users’ authentication and authorization details from LDAP back to CA IDM Application.
  • Tested Policy Enforcement Point (PEP) and Policy Decision Point (PDP) for authentication and authorization of a user access.
  • Monitoring of CA IAM/IDM services: CA Site Minder, CA Directory & CA SSO Server for Single Sign On (SSOi), CA IDM for Provisioning, CA SiteMinder for Credential Service Provider (CSP), Identity Proofing (IP), IBM Datapower X150 for Specialized Access Control (SAC), ARX Co-Sign device for E-Signature (E-Sig) and CA UARM For CAR to produce reports and generate alerts triggered by events or breach of predetermined thresholds.
  • Experience on Integration and administration experience wif DataPower XI50.
  • Experience wif SAML 2.0 web service and understanding of SAML tokens between VA and other service providers which hosts other application services for VA customer.
  • Performed testing of teh CA UARM COTS Application based on teh business requirements.
  • Preformed testing of E-Signature on Level of Assurance (LOA) 1 and LOA 2 users.
  • Created Identity & Access Management reports using SAP Business Objects XI R3.1 SP3 for teh logs stored in Oracle RAC Databases.
  • Set up alerts and triggers wifin CA Enterprise Log Manager SIEM tool (ELM) for crossing teh threshold limits.
  • Establishing JDBC connection to Database to retrieve data using SQL queries.
  • Drafted role based Test Scripts and User Acceptance Test Plan for Compliance Audit & Reporting (CAR) and its integrated IAM Services: Single Sign On (SSOi), Provisioning, Credential Service Provider (CSP), Identity Proofing (IP), Specialized Access Control (SAC), E-Signature (E-Sig).
  • Drafted Installation guide for CA IDM - ELM 12.5.x
  • Mapped teh reporting requirements to FISMA, NIST 800-53 and Veteran Affairs (VA) 6500 by validating Out of teh box reports generated from Reporting server.
  • Drafted Help desk and Operations Manual for CA IDM Compliance and Audit Reporting (CAR) CA User Activity Report Module 12.5.02 COT’s Application.
  • Drafted Installation and configuration guide for Identity & Access Management suite of applications: Single Sing On (SSO), Provisioning, Digital Signatures, etc.
  • Participated in UAT wif VA stakeholders while testing teh release 1 of teh CAR application.
  • Preformed testing of ARX Co-Sign E-Signature (PKI) on Level of Assurance (LOA) 1 and LOA 2 users.
  • Test teh fine grained user entitlement level details generated wif IBM datapower.
  • Created IAM reports using SAP Business Objects XI R3.1 SP3.

We'd love your feedback!