Sr Security Consultant Us
2.00/5 (Submit Your Rating)
Professional Experience Confidential, Sr. Security Consultant Consumer location
- Design and lead the development and integration of Single Sign-on and Authentication Services utilizing Novell Access Manager and LDAP software into a highly complex Internet and Intranet set of web applications.
- Provides second level support for production problems related to LDAP binding, Active Directory, eDirectory, SAML, application problems, systems errors and other support related issues.
- Create reverse proxy policies, RBAC, and debug codes to meet new software or enhancements to existing software to enhance product efficiency.
- Work with customers to build partnership using WS-Federation, WS-Security, and other authentication/authorization protocols.
Tools Used: Novell Access Manager, Novell eDirectory, Windows Active Directory 2008 R2
Confidential,Lake Forest, IL, February 07 – Februrary 12 Identity and Access Management- Design, develop, deploy and support security solutions to provide secure LDAP, single sign-on using Novell’s Identity Management solution.
- Troubleshoot user access to downstream such as SAP HR systems, SAP Portal, active directory, and eDirectory.
- Identify and evaluate complex business system needs to leverage by automating processes through workflows. Workflows include PKI, users/suppliers/vendors ID provisioning.
- Daily task involves troubleshooting ACLs, password sync issues (Single Sign-On), and user account provisioning to downstream systems (Active Directory, Novell Identity Management, Linux\\Unix, SAP)
- Identify areas for improvement to IAM based on repeated support ticket and implement fixes/enhancements to IAM connectors and applications.
- Support and monitor replication for eDirectory and Active Directory products: DFS, FRS, GPO, logon scripts.
- Plan and design IDM and AD infrastructures for new company acquisitions and file migration project using quest tools.
Tools Used: Novell’s Identity Management Solution, Novell eDirectory, Windows Active Directory 2008 R2, Crytovision PKI, CyberArk Password Vault
Confidential,Itasca IL, June 2004 – February 2007 Special Projects – Executive support & Server support Consumer Location: W.W. Grainger Inc.- Installing, diagnosing, repairing, maintaining, and upgrading desktop, laptop, mobile devices, network, audio visual and telecoms equipment to ensure optimal performance for executive level personnels.
- Troubleshoot HP Servers platform (Intel-base) problems in the areas of hardware, applications, and operating systems and provide assistance to the Intel Server services manager.
- Administrate users, user environments, directories, and security in Windows Active Directory networks being installed throughout the Grainger Field environment.
- Elevate major hardware and software problems to branch managers and service personnel for correction.
- Monitor mission critical Windows 2003 server operating systems for Hardware mirror, quota warning, event logs, and services such as DFS, in terms of performance and availability for 425+ branch servers.
- Create and maintain documentation for new and existing users on HOW To… procedures.
- Tools Used: HP Insight Manger, Remedy 5.0, HP OpenView (Helpdesk software)
- Provide computer consulting onsite, via phone, and remote administration for variety of business backgrounds.
- Document all installation, and configuration on WAN/LAN-based applications for future reference.
- Monitor server checkup on a weekly base that includes hardware/software RAID, backups, Virus Definitions, backups and HDD space. With odd findings, recommending and scheduling repairs, upgrades, and server maintenance are made ASAP.
- Install, and configure switches/hubs, Wireless Access Points, security cameras, Bluetooth, pocketPC, BlackBerry, PalmOS, and appliance firewall/routers
- Install, configure, administrate/maintain, and upgrade the following software:
- Microsoft Windows NT/2000/2003 – Configure TCP/IP, DHCP Client/Server, DNS Client/Server, Active Directory, Terminal Server, VPN, windows scripting, offline synchronization, IIS, and Group Policy.
- Microsoft Exchange 5.5/2000/2003 – Configure SMTP and intelligent message filter for SPAM control.
- Microsoft Internet Security and Acceleration 2000 – Create IP packet filters and Protocol Definition for security, and configure OWA publishing settings.
- Symantec Anti-virus & Mail Security for Exchange – Configured for real-time virus protection along with SMTP mail virus scanning.
- BlackBerry Enterprise Server – Configured with MS Exchange for blackberry devices to retrieve and send e-mail.
Tools used: ESD (Tracking software); and MS Office/Visio/Project.
Confidential,LLC February 2000 – November 2003 DELL Consultant/Technical Lead- Implement strategies to deploy/replace legacy systems with Dell desktop computers, along with data, settings, and profile migration to new Dell desktop computers using the TRANXITION PT PRO migration tool.
- Provide mentorship to more junior personnel, and drive projects and tasks handed down by leadership
- Conduct strategies on department surveys, QA process on old/new equipment being liquidated.
- Lead a team of 12 technicians to rollout/replace 4500 pre-configured Dell workstations for client location.
- Create deployment rollout instruction and modify documentations and instructions procedures to better prepare the technician on their work order process.
- Track technician’s daily work progress, signoff on timesheets, and follow-up/interface with client on any complaints and satisfaction.
- Report daily status to offsite Dell project managers and client management on project status and client needs.
Tools used: MS Office, MS Visio, MS Project