We provide IT Staff Augmentation Services!

Iam Project Manager Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • More than 12 Years of experience in solution designing, architecting and implementing Identity and Access Governance projects.
  • Expertise of Identity & Access Governance products of SailPoint (IdentityIQ), Oracle (OIM, OIA), Securonix and Sun Identity Manager (Oracle Waveset).
  • Expertise in Access Management, RBAC (Role - Based Access Control), Compliance and Auditing Technologies, Enterprise System Architecture, Security Infrastructure Design, Authentication and Authorization technologies as well as custom-built security and technology frameworks.
  • Expertise in PAM (Privileged Access Management) solutions for critical applications access controls and certification solutions.
  • Implemented large scale PAM solutions (Highly Privileged Access Account management) and monitoring.
  • Expertise of Oracle Identity Analytics and SailPoint Compliance Manager with add-on customized processes for access certifications of SOX and Critical assets accesses.
  • Expertise in Access Risk Management, Access policies management, policies violations detection and reporting solutions.
  • Implemented detective Segregation of Duties (SoD) policies violations reporting solutions.
  • Successfully migrated complex legacy identity management systems to next generation Identity & Access governance solutions (using coexistence and seamless migration approaches).
  • Experience of various business divestitures/mergers/separations and related Identity & Access management Integrations and cutovers projects.
  • Experience in design & implementation of custom frameworks (for approval, provisioning and UI) and custom connectors for Identity & Access management implementations.
  • Excellent technical approach and analytics to prepare appropriate solutions for business requirements.
  • Quick learner and quick adaptability of new environments and technologies. Experience of various Identity & Access governance environments, challenges and best practices.
  • Has planned and managed multimillion-dollar projects aligning business goals with technology solutions to drive process improvements, competitive advantage and bottom-line gains.
  • Expert in agile and waterfall project management methodologies. Able to manage large project teams and known for high-quality deliverables that meet or exceed timeline and budgetary targets.

EXPERTISE:

  • Custom Software Development
  • Database Design (RDBMS)
  • Systems Engineering
  • System Migrations/Integrations
  • Enterprise wide Implementations
  • Requirements Analysis
  • ROI Analysis
  • Costing & Budgeting
  • Project Scheduling
  • Testing/QA/Rollout/Support
  • Cross-Functional Supervision
  • Team Building & Mentoring
  • Business & IT Planning

TECHNICAL SKILLS:

Identity and Access Governance Products: SailPoint Identity and Access Governance, SailPoint Identity Confidential, SailPoint Compliance Manager, Securonix Oracle Identity Analytics, Oracle Identity Governance Suite, Sun Identity Manager, Oracle Waveset, Sun Access Manager, CA Site minder, Directory Services, Sun Role Manager, Oracle Business Intelligence Publisher, Securonix, Privileged Identity Management

Programming Languages: Java & J2EE, Spring, JSP, JMS, Xpress, Shell Scripts, Power shell, AJAX, JSF, ADF, C#, ASP.NET, Web services, PHP, JavaScript, SQL, JSON, XML, C++, C, SPML, SAML

Web/Application Servers: Apache, Tomcat, J-Boss, Web sphere and Web logic

Operation Systems: Unix/Linux, Solaris, Windows, Mac OS, VMWARE

Tools: SVN, CVS, Clear Case, GIT, Putty, SQL Developer, LDAP Administration Tool, NetBeans, Eclipse, FileZilla, WinSCP, SSH

Database: Oracle Database, Microsoft SQL Server, MySQL

Office Management Tools: MS-Project, MS-Word, MS-Excel, MS-Power Point, MS-Visio

EMPLOYMENT SUMMARY:

Confidential

IAM Project Manager

Responsibilities:

  • Initiated, planned and executed the software development projects as scheduled.
  • Coordinating internal resources and third parties/vendors for the flawless execution of projects.
  • Ensure that all projects are delivered on-time, within scope and within budget.
  • Assist in the definition of project scope and objectives, involving all relevant stakeholders and ensuring technical feasibility.
  • Ensure resource availability and allocation.
  • Developing a detailed project plan to monitor and track progress.
  • Manage changes to the project scope, project schedule, and project costs using appropriate verification techniques.
  • Measure project performance using appropriate tools and techniques.
  • Perform risk management to minimize project risks.
  • Establish and maintain relationships with third parties/vendors.
  • Hiring, building and managing team for development and managed support.
  • Conduct performance reviews and appraisals for project teams, set and define goals and review annually.
  • Manage temporary leave approval process and provide promotion recommendations.

Confidential

IAM Project Manager/ Technical Lead

Responsibilities:

  • Plan, schedule, estimate and coordinate activities with different business teams related to system development projects.
  • Design solutions for customer requirements in the Identity Manager System in compliance with the business needs.
  • Provide hands-on technical support for the system and troubleshooting of customer issues.
  • Work with compliance and audit team based on business requirements.
  • Coordinate with different application team to ensure smooth execution of application integrations in the Identity Manager based on the requirements and migration approach.
  • Deployment and configuration management for Identity Manager apps.
  • Determine hardware (servers, test equipment, and so on) needs and Setting up and arrangement of the hardware/software needed for the system based on usage and projection.
  • Consult and mentor technical resources concerning methods, procedures, and standards to be used during design, development, and unit testing phases of system development projects.
  • Work on performance tuning and monitoring of applications.
  • Provide system or technical development expertise to the offshore technical resource team.

Confidential

Onshore Technical Lead

Responsibilities:

  • Design solutions for customer requirements in the Sun Identity Manager System in compliance with the business needs.
  • Provide hands-on technical support for the system and troubleshooting of customer issues.
  • Coordinate with different application team to ensure smooth execution of application integrations in the Identity Manager based on the requirements and migration approach.
  • Work with engineering team where required ensuring timely issue resolution to the system issues.
  • Determine hardware (servers, test equipment, and so on) needs and Setting up and arrangement of the hardware/software needed for the system based on usage and projection.
  • Plan, schedule, and coordinate activities related to system development projects.
  • Consult and mentor technical resources concerning methods, procedures, and standards to be used during design, development, and unit testing phases of system development projects.
  • Provide system or technical development expertise to the offshore technical resource team.
  • Manage an offshore team of more than 20 members in the current engagement including development, support processes and RTS.
  • Working with the customers for major migration activities as part of a separation plan for Confidential from old parent business.
  • Provide new solution designs during migration and new product integrations do POC on those and work through the life cycle till go live.
  • Plan, schedule, estimate and coordinate activities related to system development projects.
  • Work with compliance and audit team based on business requirements.
  • Communicate issues and status information between Offshore and Client concerning system development activities and work as a communication channel between Customer and vendor team.

Confidential

Offshore Technical Lead

Responsibilities:

  • Educate the team regarding the core functionality of the project flows.
  • Analyze the critical issues as per the priorities. Implementing best practices in the work processes.
  • Determine hardware (servers, test equipment, and so on) needs and Setting up and arrangement of the hardware/software needed by the project team.
  • Confer with the testers and include projected needs for in-house testing equipment.
  • Provide technical leadership to technical resources and client to meet project deadlines and ensure project objective are met.
  • Plan, schedule, and coordinate activities related to system development projects.
  • Consult and mentor technical resources concerning methods, procedures, and standards to be used during design, development, and unit testing phases of system development projects.
  • Provide system or technical development expertise to the technical resource team.
  • Communicate issues and status information to the PM and Client concerning system development activities.

Confidential

Environment: Sun’s Identity Manager ( Confidential ) 7.1, Web logic 9.2, Oracle10g.

Technical Lead

Responsibilities:

  • This module is the core module of the project where we invite the new users and admins through the user interface to create those in Confidential and simultaneously giving them the access of the core portal i.e. Confidential Application on which basically the project is developed for.
  • There are three types of users like internal admins, external admins and external users. For the internal admins we must get the users from corporate LDAP and give them all the capabilities required during the login to user page.
  • Each user is authenticated and authorized by SSO (Single Sign on) for application security. This not only authenticates the user but also updates the user attributes in Confidential as per the LDAP (Site minder) attributes.
  • Once the internal admin logs on the user interface it can invite new users i.e. external admins which are basically B2B users and we create them in corporate as well as the local LDAP (Site minder).
  • And once the user accepts the invitation that received through email notification it can log on to the user page and invite the external users which are basically the users who access the core portal under same supplier.
  • During invitation procedure we get the supplier details through web services
  • During the invitation process the external users and admins get the access to “ Confidential ” application directly. So, for the internal admins we have to assign the application through another process by which they too call access the core portal.
  • In this process any internal admin can request for “ Confidential ” for itself either or for another internal admin.
  • Disable access is just for the de-provision of the “ Confidential ” application from any internal admin
  • In this module we have taken care for multiple invitations at a time.
  • We must create a Confidential file with all the details for the user, supplier details which can be imported by the user having the specific capability for batch invitation.
  • Once imported the invitation process goes on separately for each user except the invalidated ones.

Confidential

Environment: Sun’s Identity Manager ( Confidential ) Server 7.1, Jboss, Oracle10g.

Developer/Designer

Responsibilities:

  • For the first phase implementation this is for the AD provisioning of the users through end user requests.
  • Each and every user is authenticated and authorized by SSO (Single Sign on) for application security.
  • Digital provisioning is implemented for AD trough native adapter.
  • The provisioning includes creating AD account, assigning with the requested groups and at the same time creating shared folders for the user accounts in the remote server.
  • Two phases of approvals are there i.e. manager approval/ (escalated manager approval) and functional owner approval/ (escalated functional owner).
  • As the Treasury Confidential data needs to be synchronized with corporate centralized data the active sync is customized accordingly as per the requirement.
  • A Confidential job is implemented which will read a file from remote server twice daily and insert the updated data in to a database table.
  • Active sync is configured with that specific database table from where it will fetch data as per 6 conditions like transfer in, transfer out, move, delete, new hire and job change based upon the user whether it is an employee or a contractor when a new employee or a contractor joins Treasury then through ActiveSync the user account is auto created in Treasury Confidential and the user needs some basic facilities like email, phone etc. so we provide all these through On-boarding for the first time.
  • When a user is already in Treasury and it needs updating for these basic official requirements or needs an additional facility which was not provided during on-boarding then it is achieved through services and connectivity phase.
  • The on-boarding process automatically starts after the user is created in Confidential through active sync and the task is being created in the manager’s queue.
  • The services and connectivity can be started at any time when the user or manager feels like.
  • The processes for both these include same procedures once started after
  • In this module the task includes are contractor creation, updating and de-provisioning of resource.
  • We use SPML calls for these tasks as the user needs to be created in Confidential Corporate Confidential .
  • We only call corporate API already defined before through SPML

We'd love your feedback!