Identity Manager Resume
SUMMARY
- 6+ years of experience in Information Security Space Comprising of Identity Management, Identity & Access Governance, Identity Federation.
- Worked actively in implementation/development and support projects
- Extensive Working Experience in CA products that include CA Identity Manager, CA Identity Suite (SIGMA), CA Identity Governance, and CA Federation Manager.
- Very good understanding of Identity Management Solutions, Identity Governance, Federation Protocols, Data/Communication Networks and Scripting - developed through work experience, professional training.
- Proficient in Design, Installation, Configuration and Administration of CA Identity Manager, CA Identity & Access Governance (CA Governance Minder).
- Thorough Knowledge on various Identity & Access Management Products IBM Tivoli Identity Manager, Sail point IIQ.
- Good work experience on products OpenAM/OpenSSO, PING Federate, Microsoft ADFS.
- Worked with different customers to understand their business and technical requirements.
- Integrate business requirements to the Identity Management Solution.
- Leverage CA IDM Solution to implement Customer Business Logics which in turn facilitate customer end user needs
- Implement Complex Business Logics using Policy Xpress Techniques in CA Identity Manager Solution
- Integrate Role Based Access Control, provisioning methodologies to the various applications.
- Automate Provision to Active Directory.
- Implement Remote Task Requests in CA IDM Solution using TEWS calls.
- Implement Password Policies, Event Handers in CA Identity Manager.
- Customized/Branded user self-registration pages within CA Identity Manager
- Understand existing Customer Identity Management Solution and suggest the best Upgrade Solution.
- Upgrade and Support CA Identity Manager Solution.
- Write Scripts to handle Automation and Administration in CA Identity Manager
- Assisted Customers to Implement Identity Federation Profiles such as ARTIFACT Binding, Attribute Query, SOAP Binding, Signing/Encryption of Assertions
- Interacted with customers to resolve technical obstacles
- Ability to think logically and use analytical skills to succeed in diverse technical & business environments
- Ability to adapt to new skills and deliver in short period of time
- Good communication skills, oral presentation & writing skills. Strong team player with high moral standards and professionalism
TECHNICAL SKILLS
Products: CA Identity Suite(SIGMA)12.6.4, CA Identity Minder R12.6SP5,CA Governance Minder R12, CA Single Sign-on R12.X, Amazon web services (AWS), Open AM10.0, PING Federate6.0/7, Oracle Identity Federation11gR1, Oracle Access Manager11gR2, IBM Tivoli Identity Manager6.0, ADFS2.0, ADFS3.0
Directory Servers: Oracle Directory server LDAP 5.2/6.0/7.0, Microsoft Active Directory 2003, 2008 CA Directory r12, OpenLDAP2.4, OpenDS2.2.
Federation Protocols: SAML2.0, OAuth2.0, OpenID2.0.
Web Servers: Apache2.4, IIS6, IIS7,IBM HTTP server.
Application Servers: Apache Tomcat6.0, WebLogic 10.3, JBOSS 5.1, IBM WebSphere8.5.
Databases: Oracle11gR1, MySQL, Microsoft SQL Server2008.
Development Tool: Eclipse.
Scripting: Javascript
Operating Systems: Solaris, Microsoft Windows, Red Hat Linux.
PROFESSIONAL EXPERIENCE
Confidential
Environment: CA Governance Minder12.6, CA Identity Suite12.6.4 (SIGMA), JBOSS Application Server, MS SQL Server 2008R2
Responsibilities:
- Setup CA Governance Minder Environment in AWS Cloud.
- Configured CA Governance Connector in CA Identity Suite Portal (SIGMA).
- Gather Data, Performed Data Analysis/cleanup using Pentaho tool.
- Helped Customer with regard to orphan accounts Data & Redundancy such as roles users.
- Perform Data modeling for the analyzed business requirements.
- Generate User Database, Resource Database and link files based on data provided by customer
- Import Customer Data (User, Resource) to CA RCM tool.
- Create Master, Model Configurations based on the data imported to CA RCM tool.
- Created Entity Certification Campaigns per the Customer Requirement such as Manager Employee Campaign, Manager Permission Campaign, and Data Owner Campaign.
- Certified Attestations using CA Identity Suite portal (SIGMA).
- Delegated Administration within Governance Minder using features Share my work, Reassignment in different entity certifications.
- Implement portal security and provided portal access permissions to users.
- Create Cascade Certifications based on requirements.
- Export Certification decisions to Audit Card .Created BPR rules, generated SOD violations and applied SOD Violations to Certifications.
- Generate reports for Completed, Pending, and Reassign Attestations for the different Certification Campaigns.
- Enable email server configuration, create email templates for the certification campaigns and schedule emails.
- Implement escalation and two level approval workflow in certification campaigns.
- Identify the risk in the applications and mitigate the risk.
- Troubleshoot the issues encountered while creating campaigns and generate reports.
Confidential
Environment: CA Identity Suite12.6.4(SIGMA),CA IdentityMinder,IBM WebSphere ApplicationServer, Linux, Microsoft ActiveDirectory 2008, CA Directory ServerR12, MySQL, AWS.
Responsibilities:
- Understand Existing Customer Identity Management Solution and suggest upgrade solution.
- Upgrade and Support CA Identity Manager Solution.
- Backup Existing Roles, Policy Xpress, and Account Templates. Backup Identity Manager Environment.
- Install CA Identity Manager R12.6sp5 on 64 bit IBM WebSphere Application Server.
- Import Roles, Policies Account templates in CA Identity Manager.
- Explore Correlate Endpoint accounts in CA Identity Manager & Provisioned User Accounts in Active Directory, Lawson HR Endpoint.
- Implement different components like event handlers, schedulers, and form customization.
- Implement Remote Task Requests in CA IDM Solution using TEWS calls.
- Implement Password Management in CA Identity Manager.
- Bulk Upload user records using existing Scripts.
- Generate Out of the Box and custom Reports for the user activities.
- Manage Orphan Accounts in CA Identity Manager.
- Create Self Service User Registration Screen.
- Troubleshoot issues reported by the end-user.
Confidential
Environment: CA Identity Suite (SIGMA) 12.6.4, CA Identity Minder, Jboss Application Server, Red Hat Enterprise Linux6, Active Directory2008, CA DirectoryR12, MySQL, AWS.
Responsibilities:
- Primary role is to implement and administrate CA Identity Manager Solution
- Understand customer’s environment and gather requirements for the solution
- Install and configure multiple instances of CA Identity Manager Solution (Dev, QA, and Prod) in AWS Cloud.
- Installed and Configured CA Identity Suite (SIGMA)
- Understand customer requirements, develop use cases based on the requirements and integrate with CA Identity Management Solution in QA, DEV environments and migrate to Production
- Leverage CA Identity Manager Solution to meet the customer business needs
- Manage complete user life cycle in terms of account provisioning, capability for audit logging across various applications.
- Integrate role-based access control, user accounts provisioning with existing applications
- Onboarding of a new-hire and rehired employee. This process is initiated by the incoming feed from SAP, bulk loaded into IM ending with an active user account in the user store
- Implement Password Synchronization, and service definition for target systems.
- Customized user self-registration pages within CA Identity Manager
- Customized Employee, Contractor request forms
- Develop Approval & Escalation Workflow for Employees, Contractors
- Map CA Identity Suite (SIGMA) user & group attributes to IDM/Access Governance attributes
- Bulk Task Configuration in CA Identity Suite Portal(SIGMA)
- Backup SIGMA objects using Export/Import Tools
- Write Java Scripts to handle Automation and Administration in CA Identity Manager
- Integrated Dynamic connectors using Connector Express
- Analyzed the server log and application log for debugging
- Troubleshoot CA Directory related issues which is used as Provisioning directory & corporate store
- Automate backup of IDM environment using scripts
Confidential
Environment: CA Site Minder R12.5, MS SQServer 2008, CA Secure Proxy Server, Linux, CA Directory R12, MISP™.
Responsibilities:
- Set up Complete CA Site Minder Environment on AWS Cloud.
- Enable Partnership with Leading SaaS Partners.
- Involved in presales, discovery calls with the Cloud SaaS partners.
- Attended weekly customer status call.
- Configured 150 + SAML SaaS SP’s with CA Site Minder IDP.
- Configured Federated SSO between SiteMinder12.5 (IDP) and SaaS Partners.
- Integrated SAML Federation with Leading partners AWS, Microsoft Azure.
- Involved in configuration of Microsoft Office365 for Single Sign-On for various Office365 services like Lync, Outlook and Dynamics CRM Online.
- Involved in configuration of Microsoft Office365 using command line in Windows Azure Active Directory PowerShell.
- Implemented Features like SSO, SLO, ARTIFACT, POST, SOAP Bindings, Signing/Encryption.
- Configured OAuth Federation with leading IDP’s Google, Facebook.
- Analyzed FWS trace logs, SAML debugger such as SAML tracer, IE Headers and solved the issues.
- Interacted with Customers in troubleshooting the federation related issues.
- Test, Validate and Certify the Configured Federations using 8KMiles MISP™.
- Deliver Conformance reports using 8KMiles MISP™ for each of the SaaS partner.
Confidential
Environment: CA Identity Minder R12.6, MS SQServer 2008, CA API Gateway (Layer7), Jboss5.1, SCIM1.1, REST, SOAP Web Services.
Responsibilities:
- Setup CA Identity Minder in AWS Cloud Environment
- Setup CA API Gateway (Layer7) and Configuration
- Establish Integration of SaaS User Provisioning Partner Applications, test, validate and certify the integrations
- Integrations to focus on aspects of identity provisioning, i.e., the ability to create, modify, and delete user accounts in the target applications
- Integrate CA SaaS partner via one of the two methods: using the CA IM SCIM, Connector or using REST-based Web services facilitated by CA L7G.
- Discovery on the SaaS partners for support of SCIM protocol
- Interacted with the partners to get the requirements to implement provisioning
- Identified the SaaS partner REST/ SOAP Web Services endpoints and generated Request/Responses.
- Responsible for Creation of SCIM schema for the endpoints which does not support out of the box SCIM protocol
- Deployed the endpoint connectors through the ConnectorXpress
- Map endpoint attributes to the CA Identity Minder attributes
- Design endpoint account screens in ConnectorXpress
- Performed CRUD operations on the endpoint accounts
- Test and validate the CRUD operations
- Troubleshoot the connector related issues in the CA Identity Minder
- Analyzed the problems and found the cause of the problem
- Responsible for developing of JMeter LDAP Testing Script
Confidential
Environment: Oracle Identity Management 11gR2, Oracle Web Logic Server, Linux, Ping Federate, CA Directory, Sun one Directory Server5.2
Responsibilities:
- Install Oracle Fusion Middleware comprising of Identity Federation, PING Federate in Linux Environments
- Troubleshoot issues encountered during the installation
- Implement SAML2.0 Federated SSO between 8KMiles IDP to Customer SP
- Implement SAML Federation between 8KMiles Bank IDP to Customer SP using Oracle Identity Federation and PING Federate
- Configure Federation Profiles ARTIFACT Binding, SOAP Binding, User Consents and Signing/Encryption to provide secure federation access between two entities
- Configure federations between 8KMiles Bank IDP to Customer SP in Customer’s QA environment and ZDR environments
- Co-coordinate with Customer’s Devops team to configure the federation setup to Customer SP and Troubleshoot issues
- Onboard new Mock Banks in Sandbox Environment and moving to the Production
- Implement SAML2.0 Federation setup changes in sandbox environment before going to Production
Confidential
Environment: CA IdentityMinder R12, Jboss Application Server, Red Hat Enterprise Linux6, Active Directory 2008, CA Directory, MySQL, AWS.Responsibilities:
- Install & Configure CA Identity Manager R12
- Troubleshoot Installation issues
- Create CA Identity Minder Environment
- Manage Provisioning Directory
- Integrate and manage different endpoints like Active Directory, SQL and SaaS endpoints like Salesforce
- Implement User Life Cycle Management in CA Identity manager
- Created different roles like admin roles and provisioning roles for RBAC
- Setup Password Policies in CA Identity Manager
- Configure Email notifications using CA IDM interface
- Customize CA Identity manager UI as per requirements
- Analyze Identity Manager provisioning logs to troubleshoot the issues
- Test the Identity Manager functionalities in test environment & report any issues
- Prepare test cases