Senior Icam Architect / Cyber Security Architect Resume
SUMMARY:
- Senior - level Cloud, Cyber Security and Privacy Architect/Engagement Manager with diverse experience in the retail, financial, medical, higher, pharmaceutical, manufacturing, and government sectors. Proven skill sets include successful implementation of new solutions to the enterprise environment from the requirement gathering phase to operations turnover. Also, adept at conducting information assurance activities such as solution reviews, roadmap creation, and security policy compliance activities; and dealing with multiple levels of corporate management including CEOs. Additional experience includes RFP and RFQ sales activities.
TECHNICAL SKILLS:
SKILLS: Security and Privacy infrastructure - architecture, design, installation/support, and assessment: Two Factor Authentication Solutions (DS3, Gemalto, RSA, and Google Authenticator) Access management (Sun, IBM, and Tivoli) Identity management (Sun, IBM, and Tivoli) Privileged Identity Management (IBM Security) Directory services - LDAP, X.500 and DNS (Sun, IBM, Novell and Active Directory) HIPS/Change Control Enforcement (McAfee SolidCore and Tivoli) E-Mail Encryption with emphasis on privacy protections (Entrust) SSO Systems and Biometrics (ActivCard and Tivoli) Firewalls SSH/SSL Key management and PKI Management (Venafi) IT Process Tools: TOGAF, ITIL, and ISO, Mentoring and of developers, network and system administration staff Application, infrastructure, and system problem diagnosis on Windows, Linux, and Unix platforms Installation, optimization, and maintenance on Unix, Linux, and Windows solutions
PROFESSIONAL EXPERIENCE:
Confidential
Senior ICAM Architect / Cyber Security Architect
Responsibilities:
- Responsible for IBM Security Access Manager overview and requirements gathering
- Responsible for IBM Security Access Manager V9 Architecture, Design, and Deployment
- Responsible for IBM Security Identity Manager and IBM Security Identity Governance and Intelligence comparison
- Responsible for supporting Federal Identity, Credential, and Access Management (FICAM) requirements gathering
- Responsible for project management
- Responsible for leading technical team thru architect and implement phases
- SailPoint IIQ
- Active Directory Federation Services (ADFS)
- CyberArk
- SSH Universal Key Manager (UKM)
- Responsible for drafting department leave policies, process, and procedures
- Responsible for with integrating with other Task Orders / Projects
- Responsible as primary customer focal point
Confidential
Senior IAM Architect / Cyber Security Architect
Responsibilities:
- Responsible for IBM Security Access Manager overview and requirements gathering
- Responsible for IBM Security Access Manager V9 Architecture, Design, and Deployment
- Responsible for IBM Security Identity Manager and IBM Security Identity Governance and Intelligence comparison
- Responsible for supporting Federal Identity, Credential, and Access Management (FICAM) requirements gathering
- Responsible for project management
- Responsible for leading technical team thru architect and implement phases
- SailPoint IIQ
- Active Directory Federation Services (ADFS)
- CyberArk
- SSH Universal Key Manager (UKM)
- Responsible for drafting department leave policies, process, and procedures
- Responsible for with integrating with other Task Orders / Projects
- Responsible as primary customer focal point
- Responsible for IBM Security Identity Governance Architecture
- Responsible for implementation support.
- Responsible for IBM Security Access Manager Cloud Architecture in Amazon Web Services (AWS)
- Responsible for importing IBM Security Access Manager in to the cloud
- Responsible for automation scripts provide automated upgrade facilities
- Responsible for application onboarding assessment
- Responsible for creating “junction patterns”
- Responsible for supporting sales actives for Mountaire
- Responsible for supporting sales project turnover for Pentair
Confidential
Specialist Master
Responsibilities:
- Responsible for completing authentication assessment
- Responsible for project management activities
- Responsible for project finances
- Responsible for completing SSH environment assessment
Confidential
I/T Architect - Engagement Manager
Responsibilities:
- Responsible for completing the update of the project roadmap
- Responsible selecting and assigning resources
- Responsible for the quality of deliverables
- Responsible for project finances
- Responsible for Tivoli Access Manager for e-Business operational
- Oversight for IBM Security Access Manager for Web and Mobile Version 8.0., and IBM Security Access Manager Architecture
Confidential
Security Architect
Responsibilities:
- Responsible for reviewing approving technical standards
- Responsible for defining security policies
- Responsible for creating security process interface manual
- Responsible for vendor’s identity and access management process
- Responsible for vendor’s health check process
- Responsible for vendor’s security incident process
- Responsible for vendor’s patch management process
- Responsible for Risk Management process
- Responsible for performance and capacity process
- Responsible for verifying processes, procedures, and standards mapped back to ISO 27001
Confidential
Lead Architect/Engagement Manager
Responsibilities:
- Responsible for creating architecture and design
- Responsible for project management activities
- Responsible for project finances
Confidential
Lead Architect
Responsibilities:
- Responsible for the collecting of inter-process authentication and entitlements requirements
- Responsible for the collecting of inter-process authentication and entitlements design and architecture
- Responsible for evaluating requirements and design against US Federal Banking mandates and best practices to control access to the production environment, eliminate the leakage of sensitive data, and prevent attacks, malicious access and transactions
- Responsible for documenting and presenting findings
- Supported other areas of review:
- Logical resource separation
- Object promotion
- Data movement
- Network
Confidential
HP-Technology Consultant
Responsibilities:
- Responsible for Bill of Materials
- Lead multi-country, multi-continent, and multi-cultural team: India & United States
Confidential
Technical Lead
Responsibilities:
- Served as Technical Lead from end of plan and define phase to implementation close down
- Delivered first pilot ahead of schedule
- Managed vendor relations on technical matters
- Completed system design document and other deliverables
- Provided engineering estimates
- Worked with project manager to construct and manage schedule
- Led multi-country, and multi-cultural team: New Zealand, Brazil, India and United States
Confidential
I/T Architect
Responsibilities:
- Completed solution reviews documenting customers’ areas of exposure and possible solutions for those issues.
- Conducted implementation readiness reviews to help the customers find the optimal solution
- Improved the security stance of customers through information assurance activities such as firewall policy review, threat and vulnerability management, and conducting risk assessments on various solutions
- Often asked back for subsequent engagements
- Assessed Firewalls
- Provided threat and vulnerability management
- Completed region wide vulnerability remediation management effort after penetration test - worked to resolve over 3000 vulnerabilities in the North America region
- Management Performing Suppliers
- Reviewed requests for security deviations and made recommendation to GM Management
- Provided risk assessment of computer systems
- Coding of a JAVA based tool to monitor system utilization
- Coding of data migration tools in CSH/BASH/PEARL
- Coding using Java Script within various middleware tools
Confidential
Infrastructure Specialist
Responsibilities:
- Engineered and implemented solutions involving Tivoli Access Manager for e-Business. Successfully implemented solutions involving distributed systems including Unix, DCE, Netware, Directory Services, Lotus Notes, NIS, DNS, and Oblix. Provided system administration services on these platforms as well. Conducted an internal ISO audit to aid in ISO Quality compliance. Scripting for various administrative functions using TCL, PEARL, & Unix Shells