We provide IT Staff Augmentation Services!

Sr Security Consultant Us

2.00/5 (Submit Your Rating)

Professional Experience Confidential, Sr. Security Consultant Consumer location

  • Design and lead the development and integration of Single Sign-on and Authentication Services utilizing Novell Access Manager and LDAP software into a highly complex Internet and Intranet set of web applications.
  • Provides second level support for production problems related to LDAP binding, Active Directory, eDirectory, SAML, application problems, systems errors and other support related issues.
  • Create reverse proxy policies, RBAC, and debug codes to meet new software or enhancements to existing software to enhance product efficiency.
  • Work with customers to build partnership using WS-Federation, WS-Security, and other authentication/authorization protocols.

Tools Used: Novell Access Manager, Novell eDirectory, Windows Active Directory 2008 R2

Confidential,Lake Forest, IL, February 07 – Februrary 12 Identity and Access Management
  • Design, develop, deploy and support security solutions to provide secure LDAP, single sign-on using Novell’s Identity Management solution.
  • Troubleshoot user access to downstream such as SAP HR systems, SAP Portal, active directory, and eDirectory.
  • Identify and evaluate complex business system needs to leverage by automating processes through workflows. Workflows include PKI, users/suppliers/vendors ID provisioning.
  • Daily task involves troubleshooting ACLs, password sync issues (Single Sign-On), and user account provisioning to downstream systems (Active Directory, Novell Identity Management, Linux\\Unix, SAP)
  • Identify areas for improvement to IAM based on repeated support ticket and implement fixes/enhancements to IAM connectors and applications.
  • Support and monitor replication for eDirectory and Active Directory products: DFS, FRS, GPO, logon scripts.
  • Plan and design IDM and AD infrastructures for new company acquisitions and file migration project using quest tools.

Tools Used: Novell’s Identity Management Solution, Novell eDirectory, Windows Active Directory 2008 R2, Crytovision PKI, CyberArk Password Vault

Confidential,Itasca IL, June 2004 – February 2007 Special Projects – Executive support & Server support Consumer Location: W.W. Grainger Inc.
  • Installing, diagnosing, repairing, maintaining, and upgrading desktop, laptop, mobile devices, network, audio visual and telecoms equipment to ensure optimal performance for executive level personnels.
  • Troubleshoot HP Servers platform (Intel-base) problems in the areas of hardware, applications, and operating systems and provide assistance to the Intel Server services manager.
  • Administrate users, user environments, directories, and security in Windows Active Directory networks being installed throughout the Grainger Field environment.
  • Elevate major hardware and software problems to branch managers and service personnel for correction.
  • Monitor mission critical Windows 2003 server operating systems for Hardware mirror, quota warning, event logs, and services such as DFS, in terms of performance and availability for 425+ branch servers.
  • Create and maintain documentation for new and existing users on HOW To… procedures.
  • Tools Used: HP Insight Manger, Remedy 5.0, HP OpenView (Helpdesk software)
Confidential,Vernon Hills, IL, November 2003 – June 2004 Network Consultant
  • Provide computer consulting onsite, via phone, and remote administration for variety of business backgrounds.
  • Document all installation, and configuration on WAN/LAN-based applications for future reference.
  • Monitor server checkup on a weekly base that includes hardware/software RAID, backups, Virus Definitions, backups and HDD space. With odd findings, recommending and scheduling repairs, upgrades, and server maintenance are made ASAP.
  • Install, and configure switches/hubs, Wireless Access Points, security cameras, Bluetooth, pocketPC, BlackBerry, PalmOS, and appliance firewall/routers
  • Install, configure, administrate/maintain, and upgrade the following software:
    • Microsoft Windows NT/2000/2003 – Configure TCP/IP, DHCP Client/Server, DNS Client/Server, Active Directory, Terminal Server, VPN, windows scripting, offline synchronization, IIS, and Group Policy.
    • Microsoft Exchange 5.5/2000/2003 – Configure SMTP and intelligent message filter for SPAM control.
    • Microsoft Internet Security and Acceleration 2000 – Create IP packet filters and Protocol Definition for security, and configure OWA publishing settings.
    • Symantec Anti-virus & Mail Security for Exchange – Configured for real-time virus protection along with SMTP mail virus scanning.
    • BlackBerry Enterprise Server – Configured with MS Exchange for blackberry devices to retrieve and send e-mail.

Tools used: ESD (Tracking software); and MS Office/Visio/Project.

Confidential,LLC February 2000 – November 2003 DELL Consultant/Technical Lead
  • Implement strategies to deploy/replace legacy systems with Dell desktop computers, along with data, settings, and profile migration to new Dell desktop computers using the TRANXITION PT PRO migration tool.
  • Provide mentorship to more junior personnel, and drive projects and tasks handed down by leadership
  • Conduct strategies on department surveys, QA process on old/new equipment being liquidated.
  • Lead a team of 12 technicians to rollout/replace 4500 pre-configured Dell workstations for client location.
  • Create deployment rollout instruction and modify documentations and instructions procedures to better prepare the technician on their work order process.
  • Track technician’s daily work progress, signoff on timesheets, and follow-up/interface with client on any complaints and satisfaction.
  • Report daily status to offsite Dell project managers and client management on project status and client needs.

Tools used: MS Office, MS Visio, MS Project

We'd love your feedback!