Identity And Access Administrator Resume
2.00/5 (Submit Your Rating)
OBJECTIVE
- Dedicated IT professional wif 22 years supporting technical infrastructures and driving major cost savings for various organizations.
PROFESSIONAL EXPERIENCE
Identity and Access Administrator
Confidential, MI
Responsibilities:
- Support range of ADIENT custom and production - critical applications for 50k North American end users and provide daily, onsite technical support to 15k local users
- Provide security for network and application resources
- Performing daily duties as assigned to resolve Administrative and maintain IAM tickets in my capacity and made sure IAM tickets meet teh SLA.
- Support users MFA (Multifactor Authentication) related issues
- Maintain and update user profiles in Identity Manager: reset passwords, unlock accounts, and resolve issues wifin posted Service Level Agreements (SLA)
- Leverage remote agent resources to support regional Ethernet technologies
- Manage users shared drive access using Active Directory tool.
- Manage security groups, service accounts using MIM (Microsoft-identity-manager)
- support of enterprise level computing platforms and systems administration
- Provide production monitoring support through monitoring tools such as SCOM alert.
- Manage DNS/DHCP record, such as A record, CNAME record using tool MEN&MICE.
- Manage external DNS record using tool such as: CSC GLOBAL.
- Communicate more effectively wif team members and leadership by proof reading so that teh intended message sent clearly.
Operation Specialist
Confidential
Responsibilities:
- Provided extensive technical support for critical applications for all JCI North American production sites, wif nearly 50k end users
- Managed off-site recovery and transfer and executed data backup and recovery wifin data center
- Configured, monitored, and deployed routers, hubs, switches, and QIP servers
- Administered local area network (LAN) and local mail server, including hardware and software upgrades
- Managed communications infrastructure, including software and user availability
- Utilized change management tools, performs moves, adds and changes to teh networks and PC devices ad requested.
- Process and deploy application installation requests to machines on JCI network by utilizing system administration tools, like SMIT, in accordance wif JCI security policies.