Quantcast

Project Manager Access Management Resume...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Project Manager Access Management
Target Location US-VA-Sterling
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Patient Access Project Management College Park, MD

Project Manager Access Control Huntingtown, MD

Project Management Program Manager Upper Marlboro, MD

Quality Assurance Project Management Ashburn, VA

Office Manager Project Baltimore, MD

Project Manager Scrum Master Arlington, VA

Administrative Support Project Management Washington, DC

Click here or scroll down to respond to this candidate
Candidate's Name
Risk and Financial Advisory Cyber and Strategic Risk Cross-IndustryMobile: PHONE NUMBER AVAILABLE/Candidate's Name Street Address @icloud.comAn exceptionally skilled Cyber-IT Program-Project Manager, with well over a decade of experience, specializes in a wide array of Program and Project Management domains, encompassing leadership in Identity and Access Management (IAM), adept Risk Management, thorough Compliance, and comprehensive Auditing expertise.Mastery extends to the intricate details of NIST Policies, Governance, Security Planning and Architecture, FISMA, NERC-CIP, SOX, RMF, Incident Analysis, General Security Best Practices, and Identity and Access Management (IAM). Particularly noteworthy is the proficiency in providing audit support, skillfully coordinating the implementation of NIST 800-53 controls, and the meticulous upkeep of security controls and procedural compliance.Technology  Tools  PlatformsOperating Systems & PlatformsWindows (7, 8, 10, Server 2012)UNIX (Solaris, HP, AIX)IBM (AIX)Mainframes (OS/390, zSeries)Cloud (Azure/AWS)Identity & Access Management (IAM) ToolsCyberArk (PSM, CPM, PS MP, CPM)SailPoint Identity (IdentityIQ/IdentityNow)IAM TPAM, IBM IAM, RSA (Archer, SecurID), SIEM/SPLUNKMicrosoft Tools (PowerShell, Office Suite, Access, Visio, Project, Active Directory/LDAP)BMC Remedy, PICCASO, Tivoli, NetOp, NetApp, Open ViewDHCP Support, Basic, DB111, Java, Service-NowSCRUM, JIRA/PMI-ACP, Varonis, HP Open ViewSingle Sign-On (SSO), Multi-factor AuthenticationMainframe TechnologiesDB2, CICS, ADABAS, VTAM, MVSSecurity (SAM, RACF, ACF2, Top-Secret)JCL, TSO, ISPFTCP/IP, TN3270, Telnet, FTPNetworking & SecurityLAN / WAN AdministrationVPN, RSA Authentication Manager, Cisco Routers & SwitchesProgramming LanguagesC, C++, HTML, JavaScript, Visual BasicIAM ExpertiseIAM Architecture, Process Design, System IntegrationChange Management, Communication, TrainingTeam Leadership, Security ComplianceRegulatory Requirements, Cloud TechnologiesCloud TechnologiesGoogle, Azure, AWSProfessional ExperienceDeloitte ProjectsIAM Program Manager  Cyber -Digital McLean, Virginia  Nov 2023  CurrentAs the IAM Program Manager, I lead and support a multi-workstream IAM/SailPointIIQ Program on a federal project, collaborating with cross-functional teams throughout the program lifecycle.Key contributions include SailPoint IdentityIQ Enhancement:Conducted a thorough requirements-gathering process, focusing on precision to enhance and rectify bugs within the SailPoint IdentityIQ system, resulting in a targeted improvement of 15%.Evaluate and document the effectiveness of internal controlsEnsure integrity, confidentiality, and availability of information and systemsRisk Management:Identify, assess, and prioritize risks to organizational assets.Develop strategies to mitigate or manage risks effectivelyComprehensive IAM Program Management:Employed a holistic approach to IAM Program management, overseeing the strategic development aspects and intricate implementation of roadmaps, achieving a streamlined efficiency increase of 20%.Efficient Program Orchestration:Orchestrated program efforts seamlessly by meticulously organizing, planning, staffing, and coordinating various facets, ensuring a synchronized and efficient workflow, resulting in a 25% enhancement in overall program efficiency.Risk Management and Mitigation:Proactively identified, analyzed, and mitigated program risks, implementing decisive corrective measures to ensure program resilience, resulting in a risk reduction of 30%.Evaluate and ensure internal control effectiveness, assess risks using varied methods, maintain compliance, safeguard data privacy, manage infrastructure, implement changes smoothly, evaluate performance, communicate clearly, and foster collaboration for efficient goal achievement.Effective Communication and Collaboration:Demonstrated exceptional communication skills, fostering effective and collaborative engagements with management at various levels, ensuring transparency and alignment with overarching goals, and contributing to a 20% improvement in team collaboration.Innovative Problem-Solving:Showcased a high level of innovation in problem-solving, navigating complex challenges with a forward-thinking approach, leading to the development of creative and effective solutions, resulting in a 25% improvement in problem-resolution efficiency.Robust Monthly Reporting System:Established a resilient monthly program status reporting system, including in-depth metrics analysis, financial forecasting, and meticulous monthly invoice reporting. This transparent communication supports strategic financial planning and facilitates accurate financial reporting, contributing to informed decision-making and overall program success with a 15% increase in financial accuracy.Deloitte ProjectsSolution Delivery Manager -IAM Cyber - McLean, Virginia - Mar 2021  Nov 2023Cybersecurity Program Management:Oversee daily security operations, enforce policies, and ensure program compliance.Define organization-wide security strategy, reporting to higher-level management.Strategic Leadership:Spearhead Cybersecurity and Identity and Access Management program initiatives.Led cross-functional teams overseeing Identity Governance, Access Management, and Privilege Access Management, implementing solutions with SailPoint and CyberArk.Security Policy and Documentation:Oversee program operations, adhering to security policies, including Assessment and Authorization (A&A).Develop and maintain security documentation aligned with NIST and ISO standards.Achievements:Executed SailPoint Identity Governance, improving program access management by 20%.Led CyberArk Privilege Access Management, reducing vulnerabilities by 30%.Achieved 100% compliance in program audits.Introduced enhancements, reducing operational costs by 15%.Cultivated a collaborative culture, increasing program team productivity by 25%.Education:Led enterprise CyberArk Privilege Access Management (PAM) Program.Supported Disaster Recovery planning.Led large-scale Identity Governance and Administration (IGA) and IAM program implementations.Collaborated to resolve program operational challenges and ensure a secure environment.Owned planning and execution of PAM Governance, enhancing CyberArk Vault stability and performance.Booz Allen Projects / ATA CorpDept of Homeland Security -Lead SME IAM Consultant - McLean VA - Feb 2020 - Dec 2020My strong communication skills, both written and oral, empower me to effectively engage with customers, internal teams, peers, and the public. I excel in simplifying complex technical concepts for diverse audiences and bridging the gap between technical and non-technical stakeholders. With a proven track record in applying regulatory frameworks, including the NIST Cybersecurity framework, I have successfully contributed to the development of Information Security policies and procedures. My extensive experience and proficiency position me as a valuable asset in the realm of cybersecurity and information security management.Key Responsibilities:Risk Assessment: Conducting in-depth risk assessments and devising tailored risk management strategies.Compliance Verification: Ensuring alignment with relevant regulatory requirements, such as FISMA.Plan of Action and Milestones (POAM): Crafting detailed plans for addressing security weaknesses.Documentation: Meticulously contributing to documentation processes.Additional Experience Highlights:Client Support: Providing IAM expertise, with a focus on CyberArk and SailPoint.Multiyear Enterprise IAM Transformation: Aligning operational processes with IAM methodologies and regulatory requirements.Change Management and Training:Managing change within the IAM program and facilitating effective implementation.System Deployment Leadership: Leading IAM engineering teams and coordinating external partnerships.Guidance and Evaluation: Offering ongoing IAM guidance and conducting system evaluations.Identity Governance and Administration (IGA): Managing IGA programs and ensuring compliance.Disaster Recovery Planning: Contributing to disaster recovery planning and implementation.Performance Oversight: Monitoring IAM system performance and stability.System Stability Enhancement: Developing processes and tools to enhance system stability.Digital Identity Support: Leading digital identity support initiatives within an aerospace and defense conglomerate.Supporting Technical Solutions: Assisting onshore and offshore teams in implementing IAM solutions.Performance Management and Improvement: Continuously optimizing IAM system functionality and security.Role Engineering and Access Control: Leading role-based access control initiatives.Documentation and Reporting: Championed documentation efforts that contributed to essential reports and documentation for project tracking.PCM TechnologiesIAM Engineer Tech Program Manager Cybersecurity San Francisco, California - Jan 2019 - Dec 2019Led strategic deployment of CyberArk's Privilege Vault Password Program, seamlessly integrating SailPoint resources, resulting in a 20% boost in password management efficiency. Demonstrated expertise in Identity Access Management solutions and the successful migration of applications, data, and operational policies.Comprehensive CyberArk Management:Oversaw comprehensive CyberArk implementation, including components such as Enterprise Password Vault (EPV), Password Vault Web Access (PVWA), Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Session Manager Proxy (PSMP) for Unix, Application Identity Manager (AIM), and Privileged Threat Analytics (PTA).Cross-Functional Collaboration: Collaborated cross-functionally with Crypto Services, Directory Services, Identity Governance, Access Management teams, application developers, and platform administrators to resolve complex challenges and ensure smooth integration, resulting in a 30% reduction in implementation time.Strategic Privilege Identity Access Management:Spearheaded the primary CyberArk project for Privilege Identity Access Management, focusing on risk mitigation, GDPR and CCPA compliance alignment, data integration, migration, and remediation, resulting in a 25% improvement in compliance adherence.Enabling Secure Environments:Designed and implemented secure, risk-based control solutions, enhancing security posture, and resulting in a 15% increase in system security.End-to-End Implementation Management:Managed on-site and remote implementations, successfully delivering multiple application implementations across various departments, reducing implementation time by 20%.Architectural Design and Development:Led the selection, architectural design, and development of the Privileged Account Management (PAM) program, enhancing security posture and reducing the risk of privilege misuse.Technical Issue Resolution and Training:Addressed technical issues and developed training programs, increasing staff knowledge and comfort level during the transition, resulting in a 30% reduction in technical issues.Driving CyberArk Adoption:Promoted the adoption of CyberArk Privilege Security Solution management across the IT landscape, leading to a 25% increase in adoption rates.Documentation and Policy Development:Developed technical designs, documentation, drawings, and policies, resulting in streamlined processes and policies aligned with regulations, improving compliance adherence by 20%.Bank of America ProjectsIAM Engineer - Tech Program Consultant  GRC  Charlotte - North Carolina Dec 2017 - Dec 2018Served as a Cyber Security ambassador within Bank of America's IAM Global Information Technology division, supporting regions in the US, UK, and APAC. My role focused on governance, risk management, and policy applications, particularly in the GIS Cybersecurity project. This project aimed to address compliance and audit challenges, especially for critical infrastructure, including SOX audits and compliance checks. As an IAM Engineer Consultant, I strategically emphasized governance, risk management, and policy applications with a global impact on compliance, audits, and cybersecurity within critical infrastructure.Driving Governance and Compliance:Led governance, risk management, and policy applications for the GIS-Cybersecurity project, achieving substantial compliance and audit enhancements, particularly for critical infrastructure through SOX audits and compliance checks.Strategic Learning and Expertise:Strategically committed to continuous learning, enabling me to architect and mitigate cyber threats effectively. My focus remained on staying attuned to the latest technological control tools and strategic best practices.Architecting Cybersecurity Initiatives:Played a pivotal strategic role in architecting the Cybersecurity Mainframe z/OS security initiative, reducing risks, and ensuring meticulous compliance in a large-scale banking environment, resulting in a 20% risk reduction.Expertise in Risk Management:Leveraged extensive expertise in risk management and internal controls, aligning policies with ISO 27001 and NIST frameworks.Enhancing GRC Program Efficiency:identified strategic gaps within the GRC program, orchestrating enhancements aligned with key business processes and industry best practices, resulting in a 30% improvement in program efficiency.Data-Driven Risk Analysis:Applied strategic data interpretation for risk analysis and control recommendations, particularly in the context of audit and access control, achieving a 25% reduction in cybersecurity breaches.Designing Secure Environments:Led the strategic design and implementation of secure environments and technologies, balancing technical acumen with business insight, resulting in a 15% increase in system security.EducationPfeiffer University - Master of Science - Business Administration January 2009 August 2015Pfeiffer University - Master of Science - Organization Leadership August 2008 December 2014University of Phoenix - Bachelor of Science in Information Systems April 2006 August 2008Professional Certification / Certificates & TrainingCertificates  Project Management Courses, Workshop August 2008 December 2010Certified Technical Courses January 2001 August 2003CSM  Certified Scrum Master September 2018 September 2018JIRA -Certificate (Workshop) September 2018 September 2018PMI-ACP March 2019 March 2019CISSP - Certified Information System Security Professional July 2024 Upcoming ExamIBM Certified Technical Training CoursesSystem Operations for OS/390, Systems/390 HMC zSeries 900 April 2001 - October 2006s/390 Parallel Sysplex Operations, CMOS CSAR April 2001 - October 2006Internetworking Fundamentals: Hands-on Workshop April 2001 - October 2006Basic TCP/IP Skills: Hands-on Workshop April 2001 - October 2006z/OS and OS/390 Facilities April 2001 - October 2006Fundamental System Skills in z/OS and OS/390 April 2001 - October 2006AIX Version 5L Basics April 2001 - October 2006AIX Version.5L System Administration I: Implementation April 2001 - October 2006Professional organizationsInformation Systems Audit and Control Association (ISACA)  Charlotte NCBlack Data Processing Associates (BDPA) - Charlotte NCPFEIFFER University Alumni AssociationUniversity of Phoenix Alumni AssociationIdentityIQ Provisioning Training Virtual 2020SCRUM Master Methodology Virtual Training - 2020CyberArk Impact Conference in 2017, 2018, 2019 Boston /Chicago.LanguagesProficient in English (Native Speaker)  Basic Spanish - Hindi Speaker

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise