We provide IT Staff Augmentation Services!

Sr Iam Security Engineer Resume

0/5 (Submit Your Rating)

Dallas, TX

SUMMARY

  • Strong background of Identities Access Governance and Compliance, Federation, Application/Web Servers, LDAP/Azure AD domains involving design, development, implementation, integration, testing, deployment, configuration and code management, production support, maintenance, and enhancements.
  • Experience in mapping business requirements, designing customized solutions and ability to handle pressure, with strong analytical skills and ability to analyze business practices and define optimal procedures to fulfill client’s requirements.
  • Experience in doing POC for any new application that is required and advise and implement/ recommend best practices that is followed and recommended by SailPoint.
  • Experience in mentoring Junior team members, clients, stake holder and business team as needed.
  • Integrated SailPoint solution with in - house and third-party applications for birthright provisioning, request approval and fulfilment, de-provisioning etc.
  • Involved in activities to troubleshoot and resolve SailPoint complex Workflow, Business rules and IAM migration problems.
  • Lead knowledge session Internal to internal team to develop good foundation of knowledge across team.
  • Responsible for synchronization of all Active Directory accounts and groups to utilize Okta solution.
  • Worked on day-to-day activities creating and managing OKTA policies and creating and managing OKTA application provisioning and user provisioning.
  • Setup multi-factor authentication and made configuration changes as required - such as password policy updates.
  • Experience with SSO and federation using SAML 2.0, OAuth 2.0, OpenID connect (OIDC) and WS-Federation.
  • Experience on setting up SAML applications in OKTA Installing AD / IWA agents on member domains, validating single sign-on, user provisioning and troubleshooting password synchronization across multiple Okta platforms.
  • Migrated Siteminder Rule based SSO to Okta SAML based SSO.
  • Development of review access application (IdentityIQ), bug-fixes, addition of new tools, user interface changes on business demands.
  • Configured and Deployed SailPoint IIQ Connectors for various target systems.
  • Hands-on with aggregation, workflows, tasks, rules, and roles.
  • Built various rules like Build Map rule, Pre-Iterate Rule, Identity Attribute Rules, Provisioning Rules etc. based on business need.
  • Worked with clients post implementation for user testing, debugging, support and maintenance.
  • Have good knowledge on Ping Federation (SSO).

TECHNICAL SKILLS

Identity and Access Management: SailPoint IIQ 6.x, 7.x, 8.x Okta, IdentityNow, Azure, AWSCompliance - Access, Auditing/Reporting, Policy ManagementGovernance - Policy, Role and Risk Modules, Data/Identity WarehousingLife Cycle Management - Access Request, Provisioning, Password Management

Operating Systems: Linux, Windows XP, Windows 7/8/10, Windows Server

Directory Server: Sun LDAP, Microsoft AD

Application Servers: Tomcat, Web sphere, WebLogic, WebSphere

Frameworks & IDE tools: IDE Eclipse, NetBeans

Databases: Oracle, MySQL, MS-SQL

Languages/Technologies: Java/J2ee Technologies, XML, JSF, BeanShell, PowerShell

PROFESSIONAL EXPERIENCE

Confidential, Dallas, TX

Sr IAM Security Engineer

Responsibilities:

  • Lead and work as IAM SME and help the team/developer on SailPointIIQ Identity and Access management implementation in fast paced Agile Project.
  • Working on Life Cycle Managements like joiner, leaver, job change, rehire and Working on the tasks like approval workflows.
  • Involved in designing, implementation, and support of SailPoint IAM Solution.
  • Integrated Plain ID version 4 with SailPoint for PBAC module.
  • Gathered requirements from application team and performing design analysis to integrate IdentityIQ. Lead App on-boarding meetings with business owners to integrated new applications into SailPoint for governance and provisioning access.
  • Developed custom workflows with approvals and modified OOTB workflows as per client requirement.
  • Involved in designing, requirement gathering, talking to business team, development, and deployment of SailPoint IIQ
  • Responsible for Developing and applied storage strategies and disaster-recovery plan for large operational database that guaranteed recovery performance and high availability
  • Developed rules in BeanShell - Application rules, identity trigger rules, aggregation rules, connector rules, rules and policy rules.
  • Rewriting the workflows to encompass the new way of provisioning. Restructured the entire product to reflect direct provisioning across many applications. In the process of upgrading the IdentityIQ.
  • Involved in knowledge sharing sessions for SailPoint Compliance Manger component and involved in creation of design documents, code reviews and statement of deployment methodologies for the clients.
  • Created documents for requirements and design from customer on an ongoing basis for regular enhancements of the project
  • Designed and developed HTML, Java Scripts, Apache Velocity and custom JSP’s to modify the form navigation in the administrator interface of Identity Manager.
  • Created customized workflows changes password and sends the password through an email and stores the information in Database for Audit.
  • Worked on the On-boarding Workflow to Provision the various resources based on Roles and policies.

Confidential, Indianapolis, IN

Sr. IAM Engineer

Responsibilities:

  • Implemented, Workflow (Provisioning Plans), rules.
  • Worked on the form model customization for the create and update workflow, which adds huge value in the customer side.
  • Familiarity with the ServiceNow to deal with the ticketing system.
  • Built the workflows from scratch and pushed workflows-create users, update user, and reset user password in production.
  • Tested the functionality of existing workflows in DEV and QA.
  • Research in the UI configuration and System configuration in 8.0 to make changes in the frontend as per the client requirements.
  • Establish and maintain governance over user access rights and approvals for requests for new access.
  • Designed and implemented custom solution for end users to request IdentityIQ capabilities following proper approval and auditing process. This feature is not available to end users by out of box.
  • Designed and implemented Joiner, Leaver, Information Updates, Emergency Termination.
  • Functioned as the primary liaison between the business client, operations, and technical areas throughout the project life cycle.
  • Facilitated meetings with stakeholders to elicit business and functional requirements and perform business process analysis.
  • Building and Configuring SailPoint IIQ tasks like Group Aggregation, Identity Refresh, Roles, System Maintenance, Populations, Check Active Policies, Refresh, Run Rule, etc.
  • Provided direct technical evaluation of third-party products for inclusion in IAM solutions and define software development processes.
  • Set up an automated application user campaign for approval of the access and privileges for .
  • Generated reports for each application for audit purpose.
  • Setup the workflows for requesting, granting and revocation of the user access.
  • Reviewed the documentation on a regular basis to ensure accuracy and completeness.
  • Analyzed and communicate the viability of the solution to meet project timeline, budget and quality.
  • Performed attribute mapping on Okta and provided support for OKTA service/help desk queue - Identifying and troubleshooting issues.
  • Experience in installing Okta’ s Lightweight agent to integrate with Active Directory.
  • Designed, documented and explained the file formats for collecting the Separation of Duties (SOD) data within the application and system.
  • Documented the process and setup for user to raise a request and associated workflow with it for each application in a standard format.
  • Provided demos and assistance to the application team throughout the project life cycle starting from onboarding application to certifying and revoking access for users.

Confidential, Bentonville, AR

IAM Developer (SailPoint)

Responsibilities:

  • Gathered requirements from application team and performing design analysis to integrate IdentityIQ. Lead App on-boarding meetings with business owners to integrated new applications into SailPoint for governance and provisioning access.
  • Developed custom workflows with approvals and modified OOTB workflows as per client requirement.
  • Involved in various patch upgrades including version upgrade from 7.0p2 to 7.2p4.
  • Involved in designing, requirement gathering, talking to business team, development and deployment of SailPoint IIQ
  • Responsible for Developing and applied storage strategies and disaster-recovery plan for large operational database that guaranteed recovery performance and high availability
  • Developed rules in BeanShell - Application rules, identity trigger rules, aggregation rules, connector rules, rules and policy rules.
  • Rewriting the workflows to encompass the new way of provisioning. Restructured the entire product to reflect direct provisioning across many applications. In the process of upgrading the IdentityIQ product from 7.0p2 to 7.2p4
  • Involved in knowledge sharing sessions for SailPoint Compliance Manger component and involved in creation of design documents, code reviews and statement of deployment methodologies for the clients.
  • Created documents for requirements and design from customer on an ongoing basis for regular enhancements of the project
  • Provisioning of users on Okta, monitoring the O365 / salesforce application assignment.
  • Involved in Application development by using connector configurations like Oracle unified directory, delimited, DB, SAP and Active Directory etc
  • Designed and developed HTML, Java Scripts, Apache Velocity and custom JSP’s to modify the form navigation in the administrator interface of Identity Manager.
  • Created customized workflows to manage the Super Users of RACF Mainframe. The Workflow changes password and sends the password through an email and stores the information in Database for Audit.
  • Worked on the On-boarding Workflow to Provision the various resources based on Roles and policies.

Confidential, Sunnyvale,CA

IAM Developer (SailPoint)

Responsibilities:

  • Involved in designing, requirement gathering, talking to business team, development and deployment of SailPoint IIQ.
  • Done installation, configuration, and customized UI according to the requirement.
  • Involved in various patch upgrades including version upgrade from 6.4 to 7.0.
  • Worked with different kind of connector like JDBC, LDAP, AD, Oracle Direct, delimited file, etc including custom connector.
  • Involved in recommending,, and mentoring junior team members and educated best practices to the client.
  • Building and ConfiguringSailPointIIQ in-built tasks like Account Aggregation, Group Aggregation, Identity Refresh, System Maintenance, Check Active Policies, Refresh, Run Rule, etc.
  • Involved in Integration of Service Now and workday in SailPoint.
  • Hands on experience in working with workflows and customizing workflows to meet business requirements.
  • Developing custom tasks such as a task to refresh the Statistics of All Roles.
  • Developing custom QuickLinks, Business Processes/workflow and Rules.
  • Heavily involved in writing bean shell scripting as required to automated task.
  • Experience working with other application groups and presenting system design documents.
  • Provide production support of identity and access management infrastructure applications.

Confidential, Wilmington, DE

JAVA Developer

Responsibilities:

  • Designed applications using Fusion framework which is a Spring based MVC architecture.
  • Created the front-end application using HTML5, CSS3, JavaScript, jQuery, ReactJS, npm, Node.js.
  • Created the UI application using ReactJS components of reusability with Redux framework for responsive web designs with actions, reducers, store.
  • Developed JWT token authentication using Node.js for credit card applications.
  • Utilized Bootstrap for development of the mobile application of the Chase Pay.
  • Integrated JAXB for marshalling and unmarshalling of XML in the current applications in Java for client and server request and responses.
  • Executed Spring Web Services with SOAP and used Apache Tomcat web servers for the deployments in Eclipse in the Windows OS.
  • Worked with the Mortgage loans, Credit Card applications and monitoring them using Datadog.
  • Utilized design patterns to handle the business flow and followed TDD approached within the project. Implemented SQL database queries and operations using Oracle DB.
  • Developed the EJB legacy applications to make calls to Spring with SOAP based application and deployed in WebSphere application server. Used Log4J to store log messages.
  • Utilized SOAP UI - API testing tool was used and imported the various services of inline WSDLs to functional test the web services.
  • Deployed the applications in Jenkins by creating a pipeline and Maven for generating the builds and used JUnit tool for unit testing. system testing of the application, Mockito for mocking.
  • JIRA tool was used for tracking daily tasks, issues & SVN for source code repository.
  • Closely worked with QA and DevOps teams in preparation, review of test cases for various operations and for release builds for production.
  • Supported production release with L2, L3 teams for successful deployment in PROD

We'd love your feedback!