Identity And Access Management Engineer Resume
Salisbury, NC
SUMMARY:
Multinational senior IT professional specializing in identity and access authentication including but not limited to, Active Directory, cloud - based solutions, PKI, federation, authentication and authorization, and mobile device management
TECHNOLOGIES:
CyberArk
Microsoft Azure
Active Directory on premise and AAD Azure Active Directory
AD Connect
Microsoft MFA (multifactor Authentication)
Entrust IdentityGuard MFA
Entrust Managed PKI
Microsoft Hello for Business (workstation authentication)
LDAP stores: Active Directory, Azure Active Directory, IBM Security Directory, Sun One.
Windows OS (2003, 2008, 2012, 2016)
Microsoft Office 365
PowerShell
Private, hybrid and public cloud
Enterprise single sign on for applications access, for internal and external clients
ADFS Microsoft Active Directory Federated Service
Centrify Identity Management for Unix/Linux
Microsoft Public Key Infrastructure
Forefront Identity Manager
Ping Identity
Mobile Device Management - Intune, Air Watch, Maas360
Service-Now
Success-Factor
Red Hat Linux
Radiant Logic Virtual Directory
DNS
Broadcom SSO (previously known as SiteMinder)
RSA Access Manager
EXPERIENCE:
Confidential, Salisbury, NC
Identity and Access Management Engineer
Responsibilities:
- Subject matter Expert in IAM technologies
- Active Directory
- Federation: ADFS
- Azure AD
- AAD Sync, AAD connect
- MS Cert services
- SSO: ISAM, ISIM
- Multi-Factor authentication: Azure MFA, Entrust IdentityGuard
- Development of Authentication and Authorization standards and processes
- Office 365 implementation and onboarding
- Global Administrator: Azure, Office 365
- PowerShell for AD and Azure
Confidential, Lincoln, RI
Identity and Access Management Specialist
Responsibilities:
- Auditing Office 365 deployment and operational, role- based access and control
- Auditing design and operational function of Azure and on-premise Active Directory using PowerShell
- Audit security implementation for recently purchase of Motorola solutions with emphasis in Identity and access for disparate Active Directory
- Security audits of Confidential operational infrastructure and change management.
- Evaluate technologies to increase Confidential ’s innovation and production in the competitive field of access management
Confidential, Southborough, MA
Application Administrator
Responsibilities:
- Administer SSO with RSA Access Manager on Linux and Windows environment
- Implement Centrify (Linux identity and access in Active Directory environment
- Administrator DNS InfoBlox
Confidential, Cambridge, MA
Consultant
Responsibilities:
- Implement addition attribute for Forefront Identity Manager Services and Synchronization
- Implemented SaaS solution for managed PKI service through Entrust
- Implement and managed MDM solution using Air Watch
- Added AD schema attributes to link Oracle with AD to support Office365
- Implemented d bases SSO through ADFS
Confidential, Cambridge, MS
Senior Engineer Identity Management
Responsibilities:
- Designed, implement, managed Mobile Device Management System using MaaS 360
- Designed, implement, managed Identity Lifecycle Management 2007 and upgraded to Forefront 2010 R2
- Designed, implemented, managed Microsoft PKI infrastructure
- Designed, implemented, managed two factor authentication through user, Soft tokens, RSA tokens, SMS phone factor phone authentication
- Designed, implemented, managed
- Designed, implemented, managed Role Based Access Control
- Designed, implemented, managed identity management, authentication and authorization system based on Active Directory, LDAP and SiteMinder
- Implement patch management
- Redesign AD groups and GPOs for single domain forest.
- Designed, implemented, managed AD Light Directory Service to support directory enabled applications
- Designed Microsoft Rights Management
- Designed, implemented, managed FDA qualified IT infrastructure
- Design Federate Identity server, Microsoft ADFS and cloud based PIngOne
- Quest software for AD reporting and fine grain recovery
- ADMT and Quest for group and user migration
Confidential, Boston, MA
Senior Directory Engineer
Responsibilities:
- Virtual Directory: Radiant Logic Virtual Directory
- Designed, implemented, managed password, user and group synchronization between AD, Sun One LDAP, PeopleSoft, and Lotus Notes using virtual directory technology.
- Designed, implemented, managed PAM (pluggable authentication module) for Linux and Solaris
- IBM WebSphere, Notes Portal and other application authentication through Enterprise LDAP
- Secure LDAP through PKI infrastructure.
- Design of Tivoli Access Manager for internal enterprise applications
Confidential, Wellesley Hills, MA
Network Planning Engineer
Responsibilities:
- Migration of Netware environment to Windows 2000 Active Directory.
- Active Directory security through group policy objects and audit of critical features
- Design and implementation of NDS upgrade from 4.11 to directory 8.6.2
- Corporate design and implementation of Windows 2000 Active Directory.
- Design migration from directory to Windows 2000
- Migration from Windows 2000 servers to Windows 2003
- LDAP implementation on NDS, Netscape DS, Sun One Directory service 5.1 & 5.2, Microsoft Windows 2000 & 2003 Active Director, ADAM
- Corporate Netegrity Siteminder implementation (US CDA, UK, AP)
- Patch management and software deployment through SMS 2003