Security Analyst Resume
0/5 (Submit Your Rating)
Dallas, TX
SUMMARY
- Experience as a Business Analyst on Identity and Access Management, specifically Sailpoint IIQ Sailpoint Identity Now, Okta, CyberArk.
- Worked very closely with App owner, Stakeholder, Engineers, and Architect to achieve company’s priority and met specific deadlines.
- Provided high level consulting and recommendation to various clients to follow best practices that is followed by industry standard and according to specific applications.
- Experienced performing business analysis activities supporting the implementation for Identity
- Management and Access Governance and Administration solutions.
- Worked as a Liaison between stake holder, App owner and developer/ Engineers and did white board sessions with them to explain certain things.
- Experience in validating all requirements and separating key business requirements from wish lists.
- Expertise in configuring workflows and Integration for life cycle events.
- Setting up business process, created BRD, FRD, Visio diagram according to client requirements.
- Expertise in Analysis, Design, Development and Deployment of SailPoint.
- Direct provisioning using direct connectors for integration of target applications.
- Extensive experience in Role Mining, Entitlements Analysis, and Advanced Analytics.
- Technology Domains experience in IDM, IAM, Directory Services.
- Experienced with all facets of SDLC (Requirements, Design, Development, Testing Implementation, installation, documentation and Maintenance) using UML, MS Visio.
- Communicate to clients and partners aspects of both the product and the implementation at the technical and functional levels appropriate for the situation.
- Manage project scope, schedule, status, and documentation.
- Deliver technical designed to enable/educate implementation partners.
- Excellent interpersonal skills, proven team player with an analytical bent to problem solving and delivering under high stress environment.
- Good analytical and communication skills and ability to work independently with minimal supervision and perform as part of a team.
- Working experience with Service Now ticketing system to generate ticket.
- Excellent skills in working with excel, database software such as SQL and MySQL.
- Team Player and self - starter with effective communication, motivation and organizational skills combined with attention to details and business process improvements.
- Highly motivated team player with analytical, organizational, and technical skills, unique ability to adapt quickly to challenges and changing environments.
PROFESSIONAL EXPERIENCE
Confidential
Security Analyst
Responsibilities:
- Gathering and documenting the requirements from the application teams to be integrated into SailPoint.
- Integrated various applications including legacy applications, Out of the Box connectors like AD, LDAP, JDBC, SQL Direct, Flat file Custom Connector for Legacy applications.
- Gather requirements/ Implemented OKTA to enable Single Sign On (SSO).
- Responsible for creating, maintaining, and implementing IAM Governance processes such as audit issue management, facilitation of remediation plans to closure and evidence gathering.
- Managing process to track, monitor and coordinate compliance activity with information security policies, procedures and baseline security standards.
- Assisted in implementation of RBAC Design in SailPoint IIQ, and the integration of applications/programs.
- Integrated CyberArk PAM module with Sailpoint IIQ.
- Created a sustainable process to provide status updates/reporting of audit issues to key stakeholders, executive leadership, and risk partners.
- Work with IAMleads and business IT managers to understand business requirements, enterprise IT standards and other considerations that influence how Access Controls and Systems Accounts Inventory with LCM solutions and services should perform and operate.
- Worked in creating and managing stories and sprints in JIRA.
- Involved in complete software development life cycle (SDLC) from gathering requirements, designing, planning and developing to implement several webs based and client-server applications
- Manage Governance project plan to ensure tasks are added, deliverables are met within the defined timeframe and report weekly status to Program leadership.
- Experienced in Designing the Business Case.
- Preparing Excel reports and PowerPoint presentations to inform stakeholders of results.
- Eliciting and documenting how user access is provided and examining the type of security used to protect the access (SSO, MFA, rule of least privilege, segregation of duties, role-based access).
- Eliciting and documenting how user access is provided and examining the type of security used to protect the access (SSO, MFA, rule of least privilege, segregation of duties, role-based access).
- Closely tracking the customer UAT feedback and documenting.
- Preparing Excel reports and PowerPoint presentations to inform stakeholders of results.
Confidential, Dallas, TX
IAM Security Analyst
Responsibilities:
- As a Part of the Core Security Architect team, working with security Architects to find defects, bringing best practices, laying out future road map, documenting business requirement and functional requirement from the client.
- Gathering and documenting the requirements from the application teams to be integrated into theIAM system.
- Experienced with NIST framework for cybersecurity risk as part of risk management.
- Worked with NIST to align and prioritize cybersecurity activities with business requirements, risk tolerances and recourses.
- Gathered requirement for analysis of different modules of NIST frameworks.
- Worked with different cores form NIST framework such as identify, protect, detect, respond, and recover.
- Lead over area performing security access management for network, database, applications, and different target systems.
- Run daily/weekly/monthly compliance and audit reports and act appropriately.
- Overall responsibility to ensure prevention of work loss due to access or role provisioning and ensuring timely and accurate deprovisioning to prevent unauthorized access due to account termination or job role change.
- Worked with IAM access control to make sure there is no Latency in the network and the IAM platform.
- Created, reviewed, and maintained process and procedures with continual drive for service improvement following security best practices.
- Defined Role Based Access Controls (RBAC) and assisted with the implementation and ongoing maintenance to support role-based access.
- Understanding of directories (AD/LDAP) and group structures, policies, Frame set up for enterprise level Role mining, Role Based Access Control (RBAC).
- Audit team’s performance and provide corrective action when necessary.
- Writing, Performing and Documenting the test cases, results.
- Responsible for directSailPointprovisioning via both out of the boxSailPointconnectors, and custom written Java code connecting to a variety of systems via mechanisms such as SOAP and REST web services, JDBC, custom API's etc.
- Implementation of different direct/custom connectors to connect Mainframe (RACF), Unix and Oracle etc.
- Conducted business processes and data analysis to derive Role-based access control (RBAC) for IAM solutions.
- Worked to gather requirements for implementing and automating RBAC processes.
- Involved in knowledge sharing sessions forSailPointCompliance Manger component and involved in creation of design documents, code reviews and statement of deployment methodologies for the clients.
- Preparing Audit reports for monitoring the SOD conflicts using Control Software International (CSI) Tool.
- Collaborated in implementing and deployingSailPoint Identity Now (ID Now) in Windows for a SOX Compliance Reporting application.
- Provisioning and access governance experience with and understanding of security on systems such as AD, LDAP/Unix, and manual provisioned applications.
- Worked on Tracking and Reporting of defects using Defect Tracking Tools such asJIRAand HP ALM, HP Quality Center.
Confidential
Security Analyst
Responsibilities:
- Working with the Identity Access Management team to support the Current State and Future State of access provisioning governance and life cycle management.
- Documented RBAC configuration in IIQ and used a hybrid concept.
- Experienced in Analyzing and implementing Segregation of Duties, Application access reviews, Audit and Compliance requirements, Role Based Access Control (RBAC).
- Worked on governance module of SailPoint for roles and policies.
- Worked on compliance module of SailPoint for access review and s.
- Gathering the requirements from the various departments and converting them to technical scenarios.
- Worked with ISO framework for protection of privacy, integrity, and accessibility of data information in IAM space.
- Worked with ISO IEC 27001 for standards of information security management systems.
- Developed comprehensive requirements documents that were used as input for tailoring the internal product.
- Primary point of contact with the Business team liaising with technology team (developers and testers) through the execution process under aggressive timelines
- Actively collaborated with the vendor team through periodic status meetings to track and monitor project progress for multiple releases.
- Participating in detailed architecture sessions with Cross Functional Teams and understand various factors impacting integration modules
- Prepared the Test Plan in alignment with the project deliverables and published the same to the stakeholders.
- Reviewed the test scripts prepared by the team members making sure that the test coverage is in alignment with BRD and Traceability documents.
- Diagramed business process flow improvements while migrating from the current to future state during their organizational change.
- UsedJIRAfor task allocation, user story writing, backlog management, issue tracking, and forward and backward requirement traceability.