We provide IT Staff Augmentation Services!

Independent Consultant Resume Profile

3.00/5 (Submit Your Rating)

New York, NY

SUMMARY

Software Engineer with over 26 years in IT Infrastructure Design, Implementation, Systems Administration, IT Security and Software Development. Proven track record with Implementation, Design and Development with Identity and Access Management, Systems and Network Design and Pre/Post Sales Software Delivery.

Operating Systems:

MS Windows 9x/Me/NT/2000/2003 Server, UNIX Sun Solaris, AIX, HP-UX, Linux , Z/OS

Programming Languages:

Unix Shell Scripting, Perl, Javascript, C , Java, XML, SQL Development, ADSI, WMI

Databases:

Oracle, DB2, Informix, SQL Server

WebServers:

WebSphere, Weblogic, Apache

Network/Transport Protocals

TCP/IP, SMTP, SNMP, HTTP,

Applications

IBM Identity Manager ISIM 6 , Tivoli Access manager ISAM 8 , HP Select Identity, CA SiteMinder, Sun Identity Manger, Tivoli Directory Integrator, Microsoft ForeFront FIM , Oracle Identity Manager, MQ, Tivoli Monitoring, IBM Tivoli Enterprise Console, Foglight, TFIM, Tivoli Endpoint Manager, Netview, HP OpenView, IBM QRadar 7.1, Netcool/Omnibus 7.3, Quest One Identity Manager, Active Role Sever, Defender, Enterprise Single Sign-On, Priviledge Manager for Sudo, Quest Quick Connect, WebThority, Authentication Services, Priviledge Manager for Unix, Quick Connect Virtural Directory Server, Management Console for Unix, RSA Access Certification Manager, RSA Access Fulfillment Express, RSA Access Request Manager

RSA Data Access Governance, RSA MyAccessLive,RSA Business Role Manager

LDAP

IBM Directory Server, SunOne, Active Directory

WebServices Protocols

XML, SOAP, WSDL

Professional Experience:

Independent Consultant

Confidential

  • Implementation, Design and Installation of IBM Security Products for several high profile clients.
  • Implementation Tivoli Identity Manager ISIM 6 and Tivoli Access Manager Solution ISAM 8 .
  • Configuration of WebSphere, DB2 and HTTP Applications in conjunction with TIM and TAM implementations.
  • Installation and configuration of Tivoli Directory Integrator.
  • Installation and Configuration of IBM Directory Server LDAP .
  • Enterprise LDAP Configuration with Tivoli Identity Manager.
  • Configuration of Role Base Access.
  • Federation Identity Provisioning for SaaS Applications
  • Upgrade of ITIM 5.0 to ISIM 6.0
  • Upgrade of TAM 6.0 to ISAM 7.0 for E-Business
  • Implementation of Quest One Identity Manager Dell IDM for 1 Commercial Client
  • Implementation of Novell Identity Manager/Novell Access Manager for two Educational Client
  • Installation and Configuration of RSA Aveksa for 3 Commercial Clients

Confidential

Access Management Consultant

  • Implementation, Design and Installation of IBM Security Products for several high profile clients.
  • Implementation Tivoli Identity Manager ISIM 6 and Tivoli Access Manager Solution ISAM 8 .
  • Configuration of WebSphere, DB2 and HTTP Applications in conjunction with TIM and TAM implementations.
  • Installation and configuration of Tivoli Directory Integrator.
  • Installation and Configuration of IBM Directory Server LDAP .
  • Enterprise LDAP Configuration with Tivoli Identity Manager.
  • Configuration of Role Base Access.
  • Federation Identity Provisioning for SaaS Applications
  • Upgrade of ITIM 5.0 to ISIM 6.0
  • Upgrade of TAM 6.0 to ISAM 7.0 for E-Business
  • Integration with Remedy 7.5.
  • Development of Workflows Approvals, Transfer, Termination .
  • Lifecycle Rule Development/Configuration.
  • Password Rest Configuration ITIM Adapters Windows, Unix/Posix, AS400, MVS .
  • Installation and Configuration of DB2 Instances for IBM Tivoli Identity Manager and LDAP Configuration.
  • Writing of Javascript code in conjunction with creation of Workflows and RBAC Role exception settings.
  • Writing DB2 Sql Scripts to extract data from DB2 Tables.
  • Configuration of Sendmail service for notification and monitoring alerts.
  • Configuration of WebSphere Application Servers/Cluster.
  • Writing JavaScript to pull HR Data from Sources using IBM Directory Integrator.
  • Configuration and Administration of IBM Qradar SIEM 7.1 in support of Customers Security Operations Center for Intrusion and Detection Analysis.
  • Configuration and Administration of Netcool/Omnibus for daily support of Network and System Monitoring.

Confidential

Sr. Architect/Professional Service Consultant

  • Implementation and Design of Quest Software Identity Management Solutions Quest One Identity Manager, Authentication Services and Enterprise Single Sign-On
  • Configuration of Q1IM
  • Configuration and Implementation of QAS Quest Authentication Services
  • Implementation and Configuration of Enterprise Signal Sign-On
  • Implementation and Configuration of Quest Quick Connect and Quest Quick Connect for Virtual Directory VDS
  • Implementation and Configuration of WebThority
  • Virtual SaaS Implementation for Cloud Identity and Access Provisioning

Confidential

Sr. IDM/IAM Software Integration Architect

  • Implementation, Design and Installation of IBM Security Products for IBM Global Customers.
  • Implementation of Tivoli Identity and Tivoli Access Manager Solutions.
  • Installation and Configuration of Active Directory Adapter
  • Assembly Line Creation through IBM Directory Integrator.
  • Writing Java Script code for HR Feeds through IDI.
  • WebSphere Network Node Manager and Cluster Configuration.
  • Configuration of Notification and Monitoring Alerts for IAM Solutions.
  • Password Synchronization Configuration through TIM/TAM.
  • TAM WebSeal Configuration.
  • HTTP Configuration for SSL
  • Oracle, Exchange, AD, TAM and Mainframe Connector implementation and configuration
  • Custom Adapter Development with TDI
  • LDAP Reverse Synchronization Configuration.
  • Big Brother Monitoring Configuration.
  • IBM LDAP, SunONE and Active Directory Configuration for TIM/TAM Implementations.
  • Installation and Configuration of DB2 and WebSphere Application Server.
  • Technical Requirements Gathering and Project Management.
  • WebServices Connector Development XML Custom code development
  • Architect and Design of Quest Authentication Service QAS Solution. Demonstrated QAS Capability in POC environment Conducted demo's and design session for Customers.
  • Installation and Deployment of QAS for Customers. Installation of Base QAS product for Clients wanting the ability to Authenticate Users to UNIX, Linux and MAC Systems with their AD Credentials.
  • Installation and Configuration of Quest Authentication Services QAS
  • Configuration of QAS for Group Management Policies. Configured Group Policy Rules for Unix, Linux and MAC Accounts that use AD for Authentication to those targets.
  • Joining of Target Systems to the AD Domain in order to authenticate accounts. Mapping Target System Accounts to AD Uses for Authentication.
  • Implementation and Support of TEM Tivoli Endpoint Manager to apply patches, security Upgrades,

We'd love your feedback!