We provide IT Staff Augmentation Services!

Senior Icam Architect / Cyber Security Architect Resume

0/5 (Submit Your Rating)

SUMMARY:

  • Senior - level Cloud, Cyber Security and Privacy Architect/Engagement Manager with diverse experience in the retail, financial, medical, higher, pharmaceutical, manufacturing, and government sectors. Proven skill sets include successful implementation of new solutions to the enterprise environment from the requirement gathering phase to operations turnover. Also, adept at conducting information assurance activities such as solution reviews, roadmap creation, and security policy compliance activities; and dealing with multiple levels of corporate management including CEOs. Additional experience includes RFP and RFQ sales activities.

TECHNICAL SKILLS:

SKILLS: Security and Privacy infrastructure - architecture, design, installation/support, and assessment: Two Factor Authentication Solutions (DS3, Gemalto, RSA, and Google Authenticator) Access management (Sun, IBM, and Tivoli) Identity management (Sun, IBM, and Tivoli) Privileged Identity Management (IBM Security) Directory services - LDAP, X.500 and DNS (Sun, IBM, Novell and Active Directory) HIPS/Change Control Enforcement (McAfee SolidCore and Tivoli) E-Mail Encryption with emphasis on privacy protections (Entrust) SSO Systems and Biometrics (ActivCard and Tivoli) Firewalls SSH/SSL Key management and PKI Management (Venafi) IT Process Tools: TOGAF, ITIL, and ISO, Mentoring and of developers, network and system administration staff Application, infrastructure, and system problem diagnosis on Windows, Linux, and Unix platforms Installation, optimization, and maintenance on Unix, Linux, and Windows solutions

PROFESSIONAL EXPERIENCE:

Confidential

Senior ICAM Architect / Cyber Security Architect

Responsibilities:

  • Responsible for IBM Security Access Manager overview and requirements gathering
  • Responsible for IBM Security Access Manager V9 Architecture, Design, and Deployment
  • Responsible for IBM Security Identity Manager and IBM Security Identity Governance and Intelligence comparison
  • Responsible for supporting Federal Identity, Credential, and Access Management (FICAM) requirements gathering
  • Responsible for project management
  • Responsible for leading technical team thru architect and implement phases
  • SailPoint IIQ
  • Active Directory Federation Services (ADFS)
  • CyberArk
  • SSH Universal Key Manager (UKM)
  • Responsible for drafting department leave policies, process, and procedures
  • Responsible for with integrating with other Task Orders / Projects
  • Responsible as primary customer focal point

Confidential

Senior IAM Architect / Cyber Security Architect

Responsibilities:

  • Responsible for IBM Security Access Manager overview and requirements gathering
  • Responsible for IBM Security Access Manager V9 Architecture, Design, and Deployment
  • Responsible for IBM Security Identity Manager and IBM Security Identity Governance and Intelligence comparison
  • Responsible for supporting Federal Identity, Credential, and Access Management (FICAM) requirements gathering
  • Responsible for project management
  • Responsible for leading technical team thru architect and implement phases
  • SailPoint IIQ
  • Active Directory Federation Services (ADFS)
  • CyberArk
  • SSH Universal Key Manager (UKM)
  • Responsible for drafting department leave policies, process, and procedures
  • Responsible for with integrating with other Task Orders / Projects
  • Responsible as primary customer focal point
  • Responsible for IBM Security Identity Governance Architecture
  • Responsible for implementation support.
  • Responsible for IBM Security Access Manager Cloud Architecture in Amazon Web Services (AWS)
  • Responsible for importing IBM Security Access Manager in to the cloud
  • Responsible for automation scripts provide automated upgrade facilities
  • Responsible for application onboarding assessment
  • Responsible for creating “junction patterns”
  • Responsible for supporting sales actives for Mountaire
  • Responsible for supporting sales project turnover for Pentair

Confidential

Specialist Master

Responsibilities:

  • Responsible for completing authentication assessment
  • Responsible for project management activities
  • Responsible for project finances
  • Responsible for completing SSH environment assessment

Confidential

I/T Architect - Engagement Manager

Responsibilities:

  • Responsible for completing the update of the project roadmap
  • Responsible selecting and assigning resources
  • Responsible for the quality of deliverables
  • Responsible for project finances
  • Responsible for Tivoli Access Manager for e-Business operational
  • Oversight for IBM Security Access Manager for Web and Mobile Version 8.0., and IBM Security Access Manager Architecture

Confidential

Security Architect

Responsibilities:

  • Responsible for reviewing approving technical standards
  • Responsible for defining security policies
  • Responsible for creating security process interface manual
  • Responsible for vendor’s identity and access management process
  • Responsible for vendor’s health check process
  • Responsible for vendor’s security incident process
  • Responsible for vendor’s patch management process
  • Responsible for Risk Management process
  • Responsible for performance and capacity process
  • Responsible for verifying processes, procedures, and standards mapped back to ISO 27001

Confidential

Lead Architect/Engagement Manager

Responsibilities:

  • Responsible for creating architecture and design
  • Responsible for project management activities
  • Responsible for project finances

Confidential

Lead Architect

Responsibilities:

  • Responsible for the collecting of inter-process authentication and entitlements requirements
  • Responsible for the collecting of inter-process authentication and entitlements design and architecture
  • Responsible for evaluating requirements and design against US Federal Banking mandates and best practices to control access to the production environment, eliminate the leakage of sensitive data, and prevent attacks, malicious access and transactions
  • Responsible for documenting and presenting findings
  • Supported other areas of review:
  • Logical resource separation
  • Object promotion
  • Data movement
  • Network

Confidential

HP-Technology Consultant

Responsibilities:

  • Responsible for Bill of Materials
  • Lead multi-country, multi-continent, and multi-cultural team: India & United States

Confidential

Technical Lead

Responsibilities:

  • Served as Technical Lead from end of plan and define phase to implementation close down
  • Delivered first pilot ahead of schedule
  • Managed vendor relations on technical matters
  • Completed system design document and other deliverables
  • Provided engineering estimates
  • Worked with project manager to construct and manage schedule
  • Led multi-country, and multi-cultural team: New Zealand, Brazil, India and United States

Confidential

I/T Architect

Responsibilities:

  • Completed solution reviews documenting customers’ areas of exposure and possible solutions for those issues.
  • Conducted implementation readiness reviews to help the customers find the optimal solution
  • Improved the security stance of customers through information assurance activities such as firewall policy review, threat and vulnerability management, and conducting risk assessments on various solutions
  • Often asked back for subsequent engagements
  • Assessed Firewalls
  • Provided threat and vulnerability management
  • Completed region wide vulnerability remediation management effort after penetration test - worked to resolve over 3000 vulnerabilities in the North America region
  • Management Performing Suppliers
  • Reviewed requests for security deviations and made recommendation to GM Management
  • Provided risk assessment of computer systems
  • Coding of a JAVA based tool to monitor system utilization
  • Coding of data migration tools in CSH/BASH/PEARL
  • Coding using Java Script within various middleware tools

Confidential

Infrastructure Specialist

Responsibilities:

  • Engineered and implemented solutions involving Tivoli Access Manager for e-Business. Successfully implemented solutions involving distributed systems including Unix, DCE, Netware, Directory Services, Lotus Notes, NIS, DNS, and Oblix. Provided system administration services on these platforms as well. Conducted an internal ISO audit to aid in ISO Quality compliance. Scripting for various administrative functions using TCL, PEARL, & Unix Shells

We'd love your feedback!