We provide IT Staff Augmentation Services!

Identity & Access Management Administrator Security Information Event Management Resume

0/5 (Submit Your Rating)

Irwindale, CA

SUMMARY:

  • Detail - oriented, dedicated, and highly qualified IT Professional with several years of security administration and analysis experience. Solid analytical, communication, interpersonal, critical thinking, leadership, and problem solving skills. Recognized by business partners for providing excellent customer service and by management for reducing high-volume backlogs. Currently seeking a position as an Information Security Analyst/Administrator which will effectively utilize all acquired skills, abilities, and areas of expertise as follows:
  • Security Administration
  • & Analysis
  • Testing/Troubleshooting
  • Quality Assurance (QA)
  • Network/LAN Administration & Security
  • User Account Administration
  • Trouble Ticket Resolution
  • SOX Compliance
  • System Implementation
  • Production/Client Support
  • Process Improvement

TECHNICAL SKILLS:

SKILLS: Blackberry Enterprise JES2, HASP, RJE, APL Citrix Metaframe ICA Exchange Management Console Cryptocard Admin VPN Enterprise User Management Tool (EUM) Exchange Server Account Administration File - net Imaging/Ultera Gramm Leach Bliley Act (GLBA) FIM MS Identity Forefront Identity Management Health Information Trust Alliance( HITRUST) Health Insurance Portability and Accountability Act(HIPPA) IBM ITIM/TAM/TFIM and TCIM HPSM System Management Ticket System Hyena / Dumpsec tools IBM Mainframe ACF2/RACF/Vanguard IBM Tivoli ITIM 4.6 IBM Directory Integrator (IDI) IBM Netspy/Netview/OpenView/VTAM IBM Tivoli Service Request Manager (TSRM) IBM Tivoli Monitoring Manager IBM Tivoli Identity Manager 4.6 Interactive Network Admin LAN/WAN Environments IRAM Identity Resource Access Management Meditech / Camis 6.0 MacAfee Endpoint Encryption Lightweight Directory Access Protocol LDAP MS Windows Active Directory Group Policies and Trust Microsoft Office Communicator Lotus Notes Administration NetIQ DRA Console One MS Active Directory Domain Trust, Policies Folders and Permissions Magic Service Desk Novell Netware MS Lync 2010 Microsoft Office Suite Oracle SQL Plus MS Windows 2000 R2 Servers Microstrategy8 Desktop PeopleSoft PC Anywhere OS/ISPF/OS/MVS/IMS/CICS Mainframe Systems RAS/VPN User Token RSA Authority SSL Administration Remedy Software Tracker Remedy Tracking System Scripps -based tools csh/ksh/perl Sarbanes Oxley Act(SOX) Remote Desktop Single Sign-On Systems UNIX Operating System AIX Linux Security Siebel e-business 6.0 Tivoli Security Information and Event Manager (TSIEM) Vanguard Terminal Server Virtual Private Network (VPN) VERITAS Backup Tivoli Compliance Insight Manager (TCIM) Webconnect Windows XP, Vista 7 Vanguard Rio Vision Security Center 7.1 Websense Internet Web Filtering Serena TeamTrack

PROFESSIONAL EXPERIENCE:

Confidential, Irwindale CA

Identity & Access Management Administrator Security Information Event Management

Responsibilities:

  • Maintain the process of provisioning, managing and de - provisioning users across multiple internal and external applications.
  • Provide security administration services for several international divisions.
  • Ensure that all executed requests conform exactly to the process as defined with appropriate approvals.
  • Collaborate with functional and technical owners and stakeholders on security issues, incident management, problem management and escalation management.
  • Oversee the testing and migration of security objects from the non-production to the production environments.
  • Provide system support and maintenance (e.g. purging of obsolete security objects, test accounts and general security housekeeping) as needed.
  • Maintain contact with auditors and prepare responses to audit reports and requests.
  • Provide support for security reviews of new and existing systems.
  • Organize and retain appropriate documentation related controls.

Confidential, Hollywood CA

Technical Operations Analyst

Responsibilities:

  • Monitors, Supports, Escalate and Track mission critical servers, systems and applications used across the world wide Live Nation Technical Infrastructure
  • Monitoring and troubleshoot all internal mail servers, other mission-critical servers and external ticketing datacenters deployment and staging systems.
  • Performed collection, analysis and reporting of metrics data gathering from 3rd party service providers such as keynote and Akamai.
  • Performed ticket escalation to tier 2 technical personnel.
  • Manage the Enterprise ticketing system supporting a technical environment.

Confidential, Woodland Hills, CA

Systems Engineer

Responsibilities:

  • IBM Delivery Team Compliance Access and Identity Management
  • Monitoring servers for availability including backup and recovery and performance
  • Customer Support for Morgan Stanley Bank, State Street Bank, Banco Itau and Miller-Coors accounts
  • Install and configure IBM TSIEM monitoring agents to endpoints across the Data Center network.
  • Test endpoint to Tivoli infrastructure connectivity
  • Support Tivoli Enterprise Monitoring on Windows 2003, Windows 2008-R2 AIX, Linux, HP/UX, and
  • Solaris based operating systems.
  • Managed Audit Machines and Event Sources, Users and Roles Tivoli Enterprise Portal.
  • Support the critical systems monitoring implementation for IBM Tivoli’s multi customer community.
  • Gathers and analyses data relating to system failures as warranted. Determine root cause of problems
  • Utilizing Tivoli Enterprise Portal.
  • Performed Semi Annual ITCS104 DB2 - WAS(WebSphere Application Server) Middleware Health Checks and Remediation on TSIEM 2.0
  • Ensuring that the TSIEM servers are receiving data from all of the in-scope event sources
  • Performing problem determination, root cause analysis and finding the solution to any reported TSIEM system or environment problems
  • Implementing any policy changes as required by changes to the SARM Global Privilege Monitoring Policy
  • Making required configuration changes for adding newly commissioned servers and removing decommissioned servers
  • Performed Event Source data collection configuration including components Target Systems, Agent Systems and Tivoli Security Information and Event Manager Server.
  • Provided Steady State application level support
  • Monitored Privileged activity log archival for reporting and analysis

Confidential, Woodland Hills, CA

Senior Data Security Analyst

Responsibilities:

  • Domain Consolidation Project Retirement and Decommissioning of Legacy Windows Domains
  • Performed work on IBM Tivoli Service Request Manager (TSRM) Incident tickets from help desk level 3-4
  • Performed work on IBM Tivoli Service Request Manager (TSRM) Work orders - Provisioning, add, modify, delete AD accounts, groups and Change request.
  • Performed Legacy Domain Controllers Reports/Traffic Analysis
  • Performed Daily Check Reports on Domains to find Domain Controller Names,, Ping Status,, IP Address, Host Name, Drive list(Total size free space and percentage free space
  • Provided Status reports of servers from both traffic and computer report.
  • Performed Inventory for Infrastructure to know what applications and servers are dependent on each WLP Domain.
  • Hyena tool to extract/Query information from Active Directory Computers/Groups, Stale ids.
  • Dumpsec tool - To extract information from Active Directory for Groups with Members/w/o members on Windows Servers.
  • Performed Domain Controllers Inventory and Dependencies, Server Owners and Application Owners
  • Query Directory Attributes (Name, Directory, Name, Description, Primary group, Role, Member of, OS Version Service Pack.
  • Provided information on SOX, Compliance and IT Security within IT and to IT Security management
  • Provided Master Active Domain Inventory (Users, stale accounts, password last set, privileged accounts, service accounts, etc)
  • Coordinates and prepares the reporting of data security events and incidents
  • Provides system and network architecture support for information and network security technologies.
  • Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies
  • Lightweight Directory Access Protocol (LDAP) protocol.
  • Responsible for managing the delivery of information and network security systems and/or technology services, which may include server, desktop, software, network, database, helpdesk components.

Confidential, Burbank, CA

Systems Account Management Specialist Information Systems (Consultant)

Responsibilities:

  • Provided enterprise active directory and exchange account administration
  • Forefront Identity Management(FIM) Administration
  • Accountable for managing the administration and maintenance of the Security Logon IDs and information assets, as well as for providing provisioning to Lawson(Lawson Systems Foundation 9), Meditech Camis 6.0, Citrix, Awaris, Isite, CPN, Epic, MS Office Communicator Applications
  • HP System Management Ticketing System(HPSM)

Confidential, Torrance, CA

Enterprise Information Security Systems Administrator EISO (Consultant)

Responsibilities:

  • Managed the administration and maintenance of the Security Logon ID’s and information assets.
  • IBM ITIM Tivoli Identity Manager 4.6.Administration, Account creations, terminations, SOX Validation audit, Lotus Notes, Unix, OS/400,RACF,Troubleshotting and Support
  • Provided enterprise active directory account administration and application ids
  • Managed user login scripts for network drive mapping
  • Restored Shared Files from accidental deletion or file corruption
  • Provided New Lotus Notes and Instant Messaging account Administration.
  • Granted access to Lotus Notes existing databases/applications/groups calendars/groups mailboxes
  • Provided The Periodic Access Review (PAR) is a semi-annual review of accounts (user and nonstandard access to “in-scope” audited AHM computer resources and ensure that is SOX compliant.
  • Provided support for Blackberry issues, Syncing contacts
  • Provided second level support for CCSC, Deskside and TAC for password issues, login problems maintenance, testing and troubleshooting with 100% accuracy.
  • Provided provisioning, reporting, scripting support of UNIX (AIX).
  • Created and Alter LDAP Unix accounts
  • Second level support for Unix (LDAP & Local) password changes
  • Locked and De-provision Unix accounts upon employee termination
  • Managed a multi-platform environment that included IBM RACF z/Secure Mainframe, mid-range and client server. .
  • Improved effectiveness by performed mainframe/RACF, TSO, ISPF resource and dataset rule creation, maintenance, testing and troubleshooting with 100% accuracy.
  • Interactive Network Administration, Create and modify Inter Network user and Administrator accounts
  • Process and validate to HR of completion thru Personnel Office Information System (POIS) PeopleSoft of new hires, terminations, transfers, leave of absence, and return from leave.
  • Conduct Weekly QA review and reauthorization of SOX critical CICS transactions.
  • Monitored and resolved requests in the Remedy Case Management system in an accurate and timely manner.

Confidential, Woodland Hills, CA

Applications Security Administrator (Consultant)

Responsibilities:

  • Provided enterprise active directory and exchange account administration while supporting and maintaining over 50 applications/platforms and providing operational/analytical support for application security issues.
  • IBM ITIM Tivoli Identity Manager 4.6.Administration, Account creations, terminations, SOX Validation, Audit, Exchange, Unix, RACF, Troubleshooting and Support
  • Managed security awareness, conducted to improve security and operational effectiveness, and improved operations efficiency by performing SOX quarterly cleanup on terminations on all applications.
  • Conducted semi-annual review and reauthorization of SOX critical application/platform user access and managed the quarterly review of emerge SQL,DB2, Oracle DB,.IBM RACF z/OS Mainframe Administrator IDs, super users, and password controls.

Confidential, Torrance, CA

Enterprise Information Security Analyst EISO (Consultant)

Responsibilities:

  • Managed the administration and maintenance of the security logon IDs and information assets, as well as provided provisioning, reporting, and scripting support of UNIX (AIX).
  • Improved effectiveness by performing mainframe/RACF, TSO, ISPF resource, and dataset rule creation, maintenance, testing, and troubleshooting with 100% accuracy.
  • Managed a multi-platform environment that included IBM RACF Mainframe, mid-range and client server.
  • Provided provisioning reporting scripting support o Unix (AIX)
  • Created and Alter LDAP Unix accounts
  • Second level support for Unix (LDAP and local accounts) passwords changes
  • Provided Technical support to front-end users in a production setting.
  • Provided security and compliance support to end users and propagate awareness among employees

Confidential, Woodland Hills, CA

Technical Services Advisor IAM (Consultant)

Responsibilities:

  • Performed user account administration, file-level security administration, and e-mail account administration while managing the administration and maintenance of the security logon IDs and information assets.
  • Added new users, modified existing users, disabled or deleted users, reset passwords, unlocked user IDs, and validated users and roles.
  • MS Active Directory Administration created and maintained user and system accounts and security groups, as well as performed troubleshooting at the LAN level as reported by users.

Confidential, Simi Valley, CA

Enterprise Information Security Engineer IT Operations

Responsibilities:

  • Ran and generated reports on the Netspective servers, as well as managed all RSA Authority SSL requests (new, renewals, or revoked).
  • Vetted each new website’s SSL request and verified or followed up with the IT Security Group to ensure the security review has been completed for each request prior to issuing the .
  • Service Provider Due Diligence Performed due diligence reviews on third party service providers both existing providers and those under consideration.
  • Maintained Internet software for the enterprise Websense filtering and web security solutions to help the company productively use the internet
  • Monitored network capacity or system downtime when too many employees use bandwidth-intensive applications, like streaming media or internet radio.
  • Responsible for all Internet blocking and unblocking of website (Websense Internet filtering)
  • Performed, defined and enforced internet use policies that prevent employees from engaging in inappropriate behavior
  • Data Classification Program Promoted Corporate Data Classification Program to all data owners, proxies and custodians to ensure compliance to policy and Federal/State regulatory requirements
  • Test Data Provided guidance on using sensitive data in non-production environments to ensure that CFC
  • Responsibility to protect information of stakeholders is not compromised.
  • Documented all procedures on the vetting SSL s process Communicated with Website Owners about their upcoming renewal dates and then follow prior to the expiration.

Confidential, Woodland Hills, CA

Senior Data Security Analyst

Responsibilities:

  • Ensured systems availability to users, administered and maintained security logon IDs, and processed and delegated all incoming request to Information Security staff.
  • Provided 24x7 support to end-users and system, performed application security, processed all HR employee terminations/reinstates, and extended contractors/temps logon IDs.
  • Handled EUM Administration (Enterprise User Management) and performed procedures to ensure the safety of information system assets and to protect systems from intentional/inadvertent access.
  • Managed help desk systems and user support, maintained and supported the IT infrastructure, delegated all 500+ incoming daily e-mails, and monitored/reported enterprise-wide security activity with 100% accuracy.
  • Provided management with accurate status reports that led to improvements in the system
  • Performed user account administration, file-level security administration, and e-mail account administration functions including, but not limited to: Microsoft Outlook e-mail accounts. Microsoft Outlook Web Access accounts. Microsoft Windows 2000 Active Directory accounts. UNIX accounts. Mainframe (ACF2) accounts. Virtual Private Network (VPN) accounts. Citrix Metaframe accounts.
  • Reviewing and monitoring access administration on a quarterly basis across the enterprise
  • Provided support on compliance initiatives PCI, SOX etc
  • Responded to service requests and support change management
  • Created operational documentation and processes
  • CICS Mainframe Systems
  • On call, respond to after hour support issues and, work extended hours
  • Provided security risk assessments and project security support

We'd love your feedback!