We provide IT Staff Augmentation Services!

Identity And Access Management Engineer Resume

4.00/5 (Submit Your Rating)

Salisbury, NC

SUMMARY:

Multinational senior IT professional specializing in identity and access authentication including but not limited to, Active Directory, cloud - based solutions, PKI, federation, authentication and authorization, and mobile device management

TECHNOLOGIES:

CyberArk

Microsoft Azure

Active Directory on premise and AAD Azure Active Directory

AD Connect

Microsoft MFA (multifactor Authentication)

Entrust IdentityGuard MFA

Entrust Managed PKI

Microsoft Hello for Business (workstation authentication)

LDAP stores: Active Directory, Azure Active Directory, IBM Security Directory, Sun One.

Windows OS (2003, 2008, 2012, 2016)

Microsoft Office 365

PowerShell

Private, hybrid and public cloud

Enterprise single sign on for applications access, for internal and external clients

ADFS Microsoft Active Directory Federated Service

Centrify Identity Management for Unix/Linux

Microsoft Public Key Infrastructure

Forefront Identity Manager

Ping Identity

Mobile Device Management - Intune, Air Watch, Maas360

Service-Now

Success-Factor

Red Hat Linux

Radiant Logic Virtual Directory

DNS

Broadcom SSO (previously known as SiteMinder)

RSA Access Manager

EXPERIENCE:

Confidential, Salisbury, NC

Identity and Access Management Engineer

Responsibilities:

  • Subject matter Expert in IAM technologies
  • Active Directory
  • Federation: ADFS
  • Azure AD
  • AAD Sync, AAD connect
  • MS Cert services
  • SSO: ISAM, ISIM
  • Multi-Factor authentication: Azure MFA, Entrust IdentityGuard
  • Development of Authentication and Authorization standards and processes
  • Office 365 implementation and onboarding
  • Global Administrator: Azure, Office 365
  • PowerShell for AD and Azure

Confidential, Lincoln, RI

Identity and Access Management Specialist

Responsibilities:

  • Auditing Office 365 deployment and operational, role- based access and control
  • Auditing design and operational function of Azure and on-premise Active Directory using PowerShell
  • Audit security implementation for recently purchase of Motorola solutions with emphasis in Identity and access for disparate Active Directory
  • Security audits of Confidential operational infrastructure and change management.
  • Evaluate technologies to increase Confidential ’s innovation and production in the competitive field of access management

Confidential, Southborough, MA

Application Administrator

Responsibilities:

  • Administer SSO with RSA Access Manager on Linux and Windows environment
  • Implement Centrify (Linux identity and access in Active Directory environment
  • Administrator DNS InfoBlox

Confidential, Cambridge, MA

Consultant

Responsibilities:

  • Implement addition attribute for Forefront Identity Manager Services and Synchronization
  • Implemented SaaS solution for managed PKI service through Entrust
  • Implement and managed MDM solution using Air Watch
  • Added AD schema attributes to link Oracle with AD to support Office365
  • Implemented d bases SSO through ADFS

Confidential, Cambridge, MS

Senior Engineer Identity Management

Responsibilities:

  • Designed, implement, managed Mobile Device Management System using MaaS 360
  • Designed, implement, managed Identity Lifecycle Management 2007 and upgraded to Forefront 2010 R2
  • Designed, implemented, managed Microsoft PKI infrastructure
  • Designed, implemented, managed two factor authentication through user, Soft tokens, RSA tokens, SMS phone factor phone authentication
  • Designed, implemented, managed
  • Designed, implemented, managed Role Based Access Control
  • Designed, implemented, managed identity management, authentication and authorization system based on Active Directory, LDAP and SiteMinder
  • Implement patch management
  • Redesign AD groups and GPOs for single domain forest.
  • Designed, implemented, managed AD Light Directory Service to support directory enabled applications
  • Designed Microsoft Rights Management
  • Designed, implemented, managed FDA qualified IT infrastructure
  • Design Federate Identity server, Microsoft ADFS and cloud based PIngOne
  • Quest software for AD reporting and fine grain recovery
  • ADMT and Quest for group and user migration

Confidential, Boston, MA

Senior Directory Engineer

Responsibilities:

  • Virtual Directory: Radiant Logic Virtual Directory
  • Designed, implemented, managed password, user and group synchronization between AD, Sun One LDAP, PeopleSoft, and Lotus Notes using virtual directory technology.
  • Designed, implemented, managed PAM (pluggable authentication module) for Linux and Solaris
  • IBM WebSphere, Notes Portal and other application authentication through Enterprise LDAP
  • Secure LDAP through PKI infrastructure.
  • Design of Tivoli Access Manager for internal enterprise applications

Confidential, Wellesley Hills, MA

Network Planning Engineer

Responsibilities:

  • Migration of Netware environment to Windows 2000 Active Directory.
  • Active Directory security through group policy objects and audit of critical features
  • Design and implementation of NDS upgrade from 4.11 to directory 8.6.2
  • Corporate design and implementation of Windows 2000 Active Directory.
  • Design migration from directory to Windows 2000
  • Migration from Windows 2000 servers to Windows 2003
  • LDAP implementation on NDS, Netscape DS, Sun One Directory service 5.1 & 5.2, Microsoft Windows 2000 & 2003 Active Director, ADAM
  • Corporate Netegrity Siteminder implementation (US CDA, UK, AP)
  • Patch management and software deployment through SMS 2003

We'd love your feedback!