Quantcast

Access Management Cycle Resume Irving, T...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Access Management Cycle
Target Location US-TX-Irving
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Access Management Information Systems McKinney, TX

Access Management Sign-On Fort Worth, TX

Information Technology Access Management Irving, TX

Life Cycle Credit Management Irving, TX

Revenue Cycle Manager - Anesthesia Garland, TX

Access Management Zero Trust Roanoke, TX

Access Management Directory Services Fort Worth, TX

Click here or scroll down to respond to this candidate
Candidate's Name
EMAIL AVAILABLELINKEDIN LINK AVAILABLEPHONE NUMBER AVAILABLESUMMARY OF EXPERIENCEOver 3+ years of professional IT experience, with those primarily spent working with Identity and Access Management solutions using SailPoint IIQ and Identity Now.Wide-ranging expertise in SailPoint Identity Now, IIQ design, development, deployment, and support.Strong knowledge of various SailPoint / IAM concepts such as identities, account aggregation, identity refresh, rules, correlation, multiplexing, escalations, revocation, certifications/account reviews, SSB, SOD and integration configuration deployment.Strong working knowledge of IAM modules which includes User Management, Account Management, Entitlement Management, Role Management, Password Management, Life Cycle Management, Multi Factor Authentication (MFA), Single Sign On (SSO), and Directory Services.Experienced in crafting end to end IAM solutions using SailPoint IAM suite and Okta that includes requirement gathering, analysis, design, integration, development, testing, maintenance, and upgrades.Responsible for designing and configuring certification and Life cycle Management processes and implementing the solutions using the Provisioning Engine in SailPoint Identity IQ (SailPoint IIQ).Good understanding of SailPoint IdentityNow for SSO configuration.Proficient in leveraging Java programming skills to enhance and customize SailPoint implementations for optimal identity governance.Experience with Identity Now in managing access to information in todays dynamic, user driven business environment using cloud-based services and providing Identity and access management using Identity Now.Responsible for installing, integrate and deploy the Identity IQ and Identity Now product in client environments.Implementation of Role based Access Controls (RBAC), Attribute based Access Control (ABAC), Role mining and entitlement analysis.Strong Experience in ILA (Identity Lifecycle Administration)Utilized Java features like Annotations and Generics to code Action classes, Java Beans, and more.Strong knowledge of Identity Cubes, Identity Attribute Mappings, LCM/LCE Workflows, Role management, SOD policies.Provisioning using Identity Now that ensure users to immediate access to all the applications, they need to perform their jobs and streamlining the onboarding and offboarding process with simple to configure, predefined workflows to speed up deployment process.Responsible for building out the Okta platform in support of customer's cloud architecture.Implemented Single Sign-On for Web applications and integrated SSO with LDAP and MS Active Directory and e-Directory. This also includes Federation both inbound and outbound using SAML 2.0.Experience automating provisioning and deprovisioning with SCIM, implementing Okta lifecycle management LCM workflows.Extensive experience in using agile tools like JIRA.Experience in development of use cases/test cases, participation in SIT/UAT testing.Experience working on SailPoint Identity IQ and worked on different kinds of connectors like Delimited File, JDBC, LDAP, AD, SAP, Oracle Application Direct.Experience in automating your JML processes so that it can help to maintain a strong security posture, lower costs, and reduce identity risk in business.Experience integrating SailPoint with Azure, Active Directory, ServiceNow, SAP, Cloud systems and PAM integration module.Extended SailPoint IdentityIQ capabilities with custom Bean shell scripts to address specific business needs.Experience in building custom workflows, rules, policy, provisioning in IAM.Experience in building quick links and Creating Custom Forms.Experience of creating custom email templates, configuring target applications.Developed Knowledge and understanding of major data compliance standards like SOX, GDPR, HIPAA, PCI, DSS, and CCPA.Developed and customized workflows, configurations, rules in SailPoint IdentityIQVery good with core java concepts and J2EE technologies such as servlets, Struts, JDBC, JSP, JSF, Spring Core, Spring AOP, Spring Security, Spring MVC, Hibernate.Working knowledge on Test Automation and the ability to troubleshoot integrations on the application.Strong understanding and development knowledge of RESTful Web Services and MicroservicesExpertise in design, development and coding skills in computing domain using tools like J2SE, J2EE, and Bean Shell.TECHNICAL EXPERTISEIdentity and access management ToolsIdentity Now, Okta, IIQ, IGALanguages/TechnologiesJava/J2EE, JSP, JDBC, Servlets, XML, HTML, XHTML JavaScript, Bean Shell.DatabasesMySQL, MS-SQL, PostgreSQL, Oracle, MySQL DB2ServersApache web server, WebLogic, Tomcat and WebSphere.Operating SystemsWindows and LinuxAWS Cloud ServicesEC2, System Manager, Elastic Load Balancer, Route 53, ECS, SQS, SNS, AWS VPN, CloudFront, VPC, NACL, S3, EBS, AWS Cost Explorer, Packer, AWS Control Tower, AWS OrganizationsDirectory ServicesActive Directory, LDAP Microsoft Azure ADIDE ToolsEclipse, NetBeansPROFESSIONAL EXPERIENCEBank Of America, Plano, TX Feb 2023  Till DateSailPoint IAM EngineerResponsibilities:Involved in Application On-boarding by using connectors like delimited, JDBC and Active Directory etc.Worked on Identity Access Management and used it effectively in implementation of SailPoint.Working in developing and customizing SailPoint connectors, workflows, and components with the help of Java.Contributed to the design and development of SailPoint Identity Now solutions, utilizing Java programming for customization and enhancement.Developed IIQ rules like build map rule, Creation rule, and exclusion and Correlation rule and Manager correlation rule.Implemented custom Java-based solutions for identity governance processes, contributing to the overall efficiency of the IAM system.Developed and customized SailPoint connectors using Java to facilitate seamless integration with diverse applications, ensuring accurate user provisioning and de-provisioning processes.Conducted comprehensive system analysis, identifying areas for improvement and implementing Java-based enhancements to optimize SailPoint performance.Automated the request flow by populating basic information from Identity Cube by creating provisioning policies.Configured Event based provisioning and Role based provisioning into downstream applications like Okta and Active Directory.Implementation of Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) through Role assignment and Access Profile assignment criteria.Experienced in using the Audit Configuration to specify the actions that are collected for audit logs.Developed custom workflows according to the customer's requirements.Involved in configuration and development of SailPoint Life Cycle Events (LCM).Implemented SailPoint Identity Now for a large enterprise, customizing connectors and workflows using Java to meet specific business requirements.Addressed challenges in Java development associated with integrations and customizations within the SailPoint framework.Assisted in updating SailPoint IIQ work groups and monitor SailPoint IIQ product functionalities.Integrated SailPoint Identity IQ with multiple external databases and applications for provisioning and de-provisioning using Active Directory and LDAP.Build and configure SailPoint in-built tasks like aggregation, ID, refresh, Schedule tasks, Correlation etc.Implemented application connectors, certifications, workflows, rules, provisioning policies, e-mail templates, reports and tasks using SailPoint Identity IQ.Performed installation and configuration of SailPoint identity IQ.Contributed to the development of documentation and best practices for SailPoint and Java troubleshooting.Managed client requirements and configure SailPoint connectors for various applications.Setting up integration of ServiceNow with SailPoint IIQ to retrieve the user ad group data.Built LCM workflows to maintain user accounts.Utilized Bean shell scripting to automate provisioning workflows in SailPoint IdentityIQ.Built RESTful APIs using Java for seamless integration between IAM solutions and external systems.Extended SailPoint IdentityIQ capabilities with custom Bean shell scripts to address specific business needs.Participated in all SailPoint deployment activities like connector configuration, custom rule development, workflow configuration and development, third party system integration.Handling Life Cycle Management workflows.Expertise with SAML and OIDC / OAuth
Implemented certifications like Application Owner, Entitlement owner and Advanced Certifications.Developed custom reports like application data validation to validate the account, entitlements, and account status after aggregation.Environment: SailPoint IIQ, Apache Tomcat, Oracle, MySQL, Java, Eclipse IDECognizant Technology Solutions, Hyderabad, India June 2021  Dec 2022IAM EngineerResponsibilities:worked on SailPoint IIQ and worked on different kinds of connectors including custom connector and its Integration into SailPoint.Implemented custom solution for end users to request Identity IQ.Had great involvement in SailPoint IdentityNow for SSO configuration.Extensively gathered requirements from all users, experts, and key personnel to understand the current functionality of the existing system.Implementing the provisioning feature of SailPoint IIQ by using various connectors like LDAP, Azure AD, Workday.Implemented multi-factor authentication (MFA), Single Sign-On (SSO), access management, and all identity management aspects.integrated and deploying the Identity IQ and Identity Now product in client environments as per Client Requirements.Implemented PAM service through SailPoint.implemented Access Certification, Automated Provisioning and Governance aspects of Identity nowCreated user and container from SailPoint into the CyberArk.Configuration of Roles, Policies and Certifications for governance compliance enhancing rules, aggregation, workflows, entitlements, groups, workgroup, etc.Designed and implemented Windows Power Shell scripts for Active Directory using SQL and SailPoint to meet client needs for audit, and cleanup of stale and inactive accounts.Installed Okta AD agents in Active Directory domains as part of AD domains integration with Okta and imported all AD groups to Okta to automate user group membership via Group Rules.Worked with application teams to integrate Okta for SSO, MFA and provisioning.Designed and implemented custom solution for end users to request Identity IQ capabilities following proper approval and auditing process. This feature is not available to end users by out of box.Monitor user access for suspicious activity in real-time and prevent unauthorized access from external networks, users and services using Azure.Experience with SSO and federation using SAML 2.0, OAuth 2.0, OpenID connect (OIDC) and WS-Federation.Integrated cloud-based application with Azure Active Directory and utilizing azure enterprise applications per business needs.Managed client requirements and configured SailPoint connectors for various applications.Setting up the integration of ServiceNow with SailPoint to retrieve the user AD group data.Built Life Cycle Management workflows to maintain user accounts.Participated in all SailPoint deployment activities like connector configuration, custom rule development, workflow configuration and development, and third-party system integration.Handling Life Cycle Management workflows.Implemented certifications like Application Owner, Entitlement owner, and Advanced Certifications.Involved in Configuration and development of SailPoint Life Cycle Events (LCM).Configuring various roles and policies in SailPoint.Implemented Restful web services to connect the AC and SailPoint applications and fetch the data into portal application.Environment: SailPoint IIQ, Apache Tomcat, Oracle, MySQL, Java, Eclipse IDEEDUCATIONMaster of Science in Information Technology  Clark University, Massachusetts May - 2024

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise