Iam Engineer Resume
Dallas, TX
SUMMARY
- Around 12+ years of experience in Information Technology, which includes demonstrated work experience in design, development, testing and implementation of enterprise wide security applications using CA SiteMinder, Pingfederate, PingAccess, LDAP Directory, CA Directory, Active Directory and other Sun/Netscape/iPlanet/IBM products on Windows, Unix, and Linux.
- Experienced on Cloud based Identity and Access Management Solutions like OKTA and PingOne.
- Experienced in installing Pingfederate and PingAccess on both Linux (RHEL) and Windows Platform.
- Experienced in upgrading of PingFederate from 7.3 - 9.1; PingAccess from 4.0-5.1
- Experienced in creating Polices using selectors in PingFedarate to accomplish various business requirements.
- Experienced in configuring PingID for MFA for sensitive applications
- Experienced in configuring application in PingOne and creating policies on PingOne docker for applications
- Experienced in SiteMinder Test tool and SiteMinder policy server log files for Troubleshooting SiteMinder environment.
- Used Ping API to deploy and create SAML changes.
- Managed projects for design, configuration and implementation of SailPoint IIQ, including coordinating with vendor leadership, technical services leadership, and end user customers.
- Experienced in protecting application using PingAccess; RateLimiting; Step-up legacy applications from HTTP to HTTPS; creating reverse proxy for applications.
- Experienced in SAML based autantication 1.1 and 2.0 using Pingfederate, SiteMinder Federation
- Experienced in writing OGNL expression to meet the vendor requirement for SAML Assertion and experienced in restricting the access for certain users by writing OGNL expression in the Issuance criteria
- Experience in Testing SiteMinder policies using SMTEST tool.
- 8+ years of expertise in Identity Access management tools SailPoint IdentityIQ with (Versions - 6.4, 7.0) and Java technologies. Good understanding of Identity Now for SSO Configuration
- Experience in Identity/Compliance Management Solutions, Lifecycle Manager and User Provisioning.
- Involved in configuring all the SAML apps from Dev to Prod Okta Tenant.
- Configuration & customization of Business Processes/Workflows for Provisioning and de-provisioning accounts across various internal and external systems in SailPoint IdentityIQ.
- Deployed and Architected Identity Management, LDAP Directories, Single Sign-On (SSO), Provisioning and De-Provisioning Identity Workflows, Access Management, RBAC (Role-Based Access Control), Autantication and Authorization as well as Custom-built Security and Technology Frameworks.
- Proficiency in configuration ofSiteminder autanticationforms.
- Experience in information technology with an emphasis on Technical Business Analysis and SDLC, Agile, Unit testing and scrum methodologies.
- Proficient in analysis, design, and development of Identity and Access management solutions using Sail Point IIQ 6.4, 7.x.
- Configured Account Aggregation and Account Group Aggregation in SailPointIdentityIQ.
- Experience in Aggregation and Provisioning Process using various connectors like Active Directory, Database, File Delimiter, and LDAP.
- Developed and customized configurations, Email templates, rules in SailPointIdentityIQ.
- Experience in Identity Management concepts like identity life cycle, identity provisioning and de-provisioning, reconciliation/aggregation etc.
- Worked on OAUTH grant types to get the access token to access the protected API. Supported development with integration of Mobile Apps using OAuth/SAML in Pingfederate
- Integrated PingAccess with Pingf ederate System to get autanticated by Pingfederate and Authorized by PingAccess Servers using the Access Control Lists
- Experienced on application configuration with PingAccess and defining PingAccess Sites, Site Autanticators, Virtual hosts, Policies and Rules.
- Deploy Saviynt Identity Governance solution to meet customer requirements.
- Extensive experience in different Siteminder Web Agents on HTTP Web ServerslikeIIS, Apache, SunOne Web Servers.
- SailPoint Identity Now Implementation strategized and implemented Identity and Access Management solutions for the client to strengtan the security posture and increase usability
- Experienced in performance testing the Ping Engine servers depending on the min and max threads, depending on dat we used to scale the number of engine servers per cluster.
- Migrated SAML Based SSO partners from Ping Federate 7.1 to Ping Federate 7.3 and 7.3 to 8.2.
- Experienced in installing, configuring SiteMinder policy servers, Web agents, Web Agent Option Packs, Secure Proxy servers and various Web & Application servers on Multiple platforms like Windows, UNIX (Solaris), RHEL.
- Provided L-1 support to resolve the tickets raised by Application teams or clients on CA Siteminder, Pingfederate, PingAccess and Okta.
- Experienced in debugging of autantication/authorization related issues and creating Rules, Responses, Realms, and Policies in SiteMinder..
- Experienced in integrating various applications with Okta to provide SSO as well as user provisioning, deprovisioning and reconciliation.
- Deploy, implement and integrate Saviynt with critical applications and infrastructure
- Good understanding of Web Technologies like HTTP Protocol, fiddler, SAML Trace, HTML, Web-Form encoding.
- Installed and configured web agents on IIS, Apache, Sun Java System/iPlanet web servers on Multiple Platforms.
- Worked on integrating various applications like Workday, ADP, ZScalar etc. with OKTA to provide them with SAML based Single Sign On.
- Performed Integration with multiple applications such as AD, Exchange, RDBMS, Flat File & LDAP. Upgraded SailPoint from 5.5 to 6.X.
- Excellent communication skills and good Interpersonal skills halped me to keep productive and positive working relationships with staff from varying technical backgrounds and skill levels.
- Integrated feature flags application within SailPoint's SaaS product IdentityNow. The app selectively enables and disables features at a very fine grain as well as enabling features for a percentage of users for operational.
TECHNICAL SKILLS
Identity Access Management tools: SiteMinder (5.x/6.x/12.x), IdentityMinder 12.0/ 12.5,, RiskMinder, Ping Federate, IDMOperating Systems Microsoft Windows NT 4.0, Microsoft Windows 2000/2003, Microsoft Windows XP Pro, Solaris (8x, 9x, 10x). RedHat Linux 6.x
Web Servers: Apache (1.3.x, 2.2x), Microsoft IIS (4.x, 5.x, 6.x), iPlanet (5.x, 6.x), IBM Http Server (1.x, 5.x, 6.x)
Application Servers: WebSphere (5.x, 6.x), BEA WebLogic (6.x, 7.x, 8.x, 9.x), Apache Tomcat (4.x, 5.x)
Programming Languages: Visual Studio 2003, .NET Framework 1.1,, Java and J2EE., C#, Servlets, JSP, JMS, JDBC
Networking and Protocols: HTTP/HTTPS, LDAPv3, SSL/TLS, SSH, TCP/IP, IPv4/IPv6, DHCP, DNS, IPSEC, VPN, SNMP, IPTABLES
Web Technologies: HTML, XML
PROFESSIONAL EXPERIENCE
IAM Engineer
Confidential, Dallas, Tx
Responsibilities:
- Installed, configured and administered CA IDM, CA SiteMinder Policy Server, Web agents, CA Directory and Oracle Directory Server on various platforms for a clustered and HA environment on WebSphere 8.5, JBOSS and various Platform.
- Integrate various applications with enterprise IAM systems to enable Single Sign On using SAML, OpenID and other standards. Maintain system lifecycle software updates and troubleshoot autantication issues.
- Provide production support for MyAccess environments and support system outages.
- Work with the Team Lead to outline the project and product enhancements. Analyze and document system requirements, provide estimates and implement functionality based on a delivery schedule and according to the agile methodology best practices.
- Integrate various IAM products like CA SiteMinder, Okta, and other new technologies under the guidance of the senior team members.
- Integrate various IDM / SSO implementations like Identity based autantication, certificate-based login for integrating with products. Support SAML based autantication guidance to team members integrating with MyAccess.
- OAuth 2.0 SSO Implementation with Microsoft Azure as IDM.
- Experience in SAML based autantication 1.1 and 2.0 using SiteMinder Federation and integrate with SiteMinder autantication and other adapter.
- Installed and configured multiple TAI agents on WebSphere, WebLogic servers to implement SSO.
- Worked on Fine tuning of Web agent and policy servers for optimized performance.
- Configured SiteMinder web agents, Affiliate agents and RADIUS agents to provide federation of webservices in the SSO environment.
- Configured Apache HTTP web server for WebLogic 8.1. Installed Application Server Agents (ASA) for SiteMinder on all Weblogic Servers and Webservers.
- Worked on Open ID Connect for the user Autantication using ping Access.
- Developed Web Services to communicate to other modules using XML based SOAP and WSDL
- Integrated IDM with CA SSO, Providing Autantication and Authorization to IDM
- Used CA Wily Introscope monitoring tool to generate performance reports of SiteMinder policy servers and other Confidential servers
- Configured System objects like Agents, Agent Conf Objects, Host Conf Objects, User Directories, Domains, Administrators and Schemas
- Work on implementing and supporting SAML-based Federation technologies and Active Directory Federated
- Developed multiple Policy Xpress to trigger on various tasks and also to generate standard company requirements like generation of unique ID's, passwords, emails, record entries etc.
- Worked on installation and configuration of Web Servers such as Apache (2.0), IIS (6.0, 7.x), IHS (6.x, 7.0), Domino (8.x) Web servers.
- Worked on implementing the Reverse Proxy on Apache webserves(2.0) from DMZ servers to the internal servers.
- Worked on IP restriction using SiteMinder to autanticate users working from the external company.
- Implemented Federation with the cloud environment (Salesforce.com) for multiple organizations by creating custom domains.
- Implementation of federation Services (SAML 2.0) through Netegrity/CA SiteMinder with third party vendors for Single-Sign-On both as Service provider and Identity provider.
- Good experience in analyzing SiteMinder logs, IDM application server logs, provisioning server logs to troubleshoot various autantication/endpoint related issues
Sailpoint
Confidential, Riverview, Florida
Responsibilities:
- Design, implemented a solution which manage the Identity lifecycle of almost all applications with the enterprise, without directly controlling the identity store within the application.
- Development of identity federation connectors from SailPoint to target systems, along with subsequent access control by SecureAuth.
- Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization as much as possible
- Develop SailPoint deployment and solution architectures
- Participate in all SailPoint deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration.
- Involved in creating custom reports, certifications to cater various data feeds.
- Achieved SOX and PCI compliance by building a flexible and scalable framework to provide autantication and authorization services while supporting rules/roles/languages requirements for various International countries.
- Design and Implement data import of various types of data files from internal and external target sources for validating access levels.
- Created a Registry for important information on all applications.
- Participate in and/or User Acceptance Testing and bug-related reengineering efforts
- Perform Installation and configuration of SailPoint IdentityIQ
- Develop custom SailPoint BuildMap Rules and Workflows as per the business needs.
- Setup applications Active Directory, LDAP, Oracle and Flat Files.
- Providing solutions for the changing business requirements.
- Implement REST classes using SailPoint Rest Application.
- Using IIQ Console for operations such as checkout, import, connector Debug etc.,
- Used IQ Service as part Identity IQ for Active Directory (AD) provisioning.
- Setup direct connectors for AD, LDAP, MySQL, Oracle, EPIC
- Configuration of Roles, Policies and Certifications for governance compliance
- Build and Configure SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
- Configuration and development of SailPoint Life Cycle Events (LCM)
- Customizing and branding of SailPoint solution.
- Provide noledge transfer and post production support activities, as necessary.
- Coordinating with business analysts on collecting requirements
- Involved in Requirements Gathering, Design, Build and Test phase of the project
- Involved in setting up the environment OIM with AD, MS Exchange, and Oracle DB.
- User Provisioning/Groups and Organization Level Provisioning to OID and AD with Exchange from OIM;
- Initial Reconciliation done from Trusted Source of PeopleSoft.
- Developed Complex Approval & Involved in developing Multilevel Approval tasks.
- Designed Roles, Rules, Workflows routes involving enable - disable user, and audit report, delegation.
- Added Custom attributes for both Reconciliation and Provisioning.
- Customized OIM From on the basis of Roles like Full-time and Contractor.
- Developed Entity, Prepopulate, Process task and Rule generator adapters to support the workflows.
- Created Password policies in AD and OID
- Integrating OIM and OAM applying Single-Sign on.
- Involved in the creation of tasks for lifecycle management of users.
- Configuring and customizing self-registration forms.
- Developed technical documents and test cases for SIT/UAT.
Siteminder Engineer
Confidential, Atlanta, GA
Responsibilities:
- Created policies, realms, rules, responses in Siteminder Policy Server to protect the applications and validate the users to work under SSO environment.
- Upgraded SiteMinder from r12SP3 to r12 SP5 and implemented SSO across multiple domains.
- Installed and Configured CA Siteminder Web Agent on IIS 6.x/7.x, Apache 2.x, SunOne Web Servers.
- Experience in configuring Siteminder Policy/Key Stores on Oracle DSEE 11G.
- Installed and configured CA Siteminder Federatoin User Autantication services using SAML 2.0 Post and creating the policies for Identity Provider and Service Provider in Siteminder Policy Server.
- Developed Custom Login Forms for user autantication.
- Analyzed the existing configuration and provided the road map to integrate the CA SiteMinder with several web applications.
- Experience in halping the application team troubleshoot errors when integrating with SSO.
- Perform Functional, Regression, Stress and Certificate-based Autantication tests.
- Conduct proactive and reactive performance tuning for Web Agents, Policy Servers, Policy Stores, User Stores to meet and maintain operational requirements process, thread, connection, cache .
- Determine the root cause, implement solutions, and apply patches to resolve autantication, authorization, and performance issues, as well as provide feedback to CA Siteminder product bugs.
- Created documentation for Change Requests, Service Requests, and upgrading processes for support purposes.
- Experience in troubleshooting urgent priority tickets wit minimum response time.
- Documented technical specifications and procedures for Siteminder best practices.
- Installed SiteMinder policy server 5.5 and upgraded from Siteminder 5.0.
- Upgraded web agents for Apache IIS web servers.
- Upgradation and migration Policy Store from Sun One directory server from 5.1 to 5.2.
- Created Realms, Rules, Response and Policies in policy server.
- Troubleshoot Siteminder and User issues.
- Provide support on rotation basis.
- Analyzing and troubleshooting Sitminder operational issues, resolve performance problems, outages and forecasting for capacity.