Quantcast

Access Management Sign On Resume Fort wo...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Access Management Sign-On
Target Location US-TX-Fort Worth
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Access Management Zero Trust Roanoke, TX

Access Management Cycle Irving, TX

Access Management Directory Services Fort Worth, TX

Information Technology Access Management Irving, TX

Access Management Information Systems McKinney, TX

Access Management Solutions Architect Dallas, TX

Disaster Recovery Access Management Fort Worth, TX

Click here or scroll down to respond to this candidate
Candidate's Name
IAM CONSULTANTLinkedIn: https://LINKEDIN LINK AVAILABLEAddress: Fort Worth, Texas, Street Address
Visa: GCObjective:I have 6+ years of experience as a SailPoint/PIM/IAM Developer with proficiency in CyberArk and Okta. I have hands-on experience implementing SailPoint IQ, Sun Identity Manager, Oracle Identity Manager, Oracle Identity Analytics, CyberArk, and Okta. My expertise lies in the design and deployment of Identity & Access Management solutions, LDAP Directories, Single Sign-On, Provisioning and De-Provisioning Identity Workflows, Role-Based Access Control (RBAC), custom-built Security frameworks, etc. Additionally, I possess excellent written and verbal communication skills.Professional Summary:Over 6 years of experience as a SailPoint Developer involved in complete Software Development Life Cycle including implementing user provisioning credential management, workflows, forms, application integration, connectors, reports, roles.Experience in interfering with business groups, gather user requirements and develop Functional, Design and Technical Architecture documents.Experience in identifying defects, problems, suggesting and determining the extent of programming required and performance tuning of the applications.Experience in design & implementation modules of Identity IIQ including roles, onboarding, certification campaigns, provisioning, performance, customization.Expertise in design and deployment of Identity & Access Management (IAM), LDAP Directories, Single Sign-On(SSO), Provisioning and De-Provisioning Identity Workflows, Role-Based Access Control (RBAC), custom-built Security frameworks.Experience in configuring and maintaining critical CyberArk components such as Central Policy Manager (CPM), Password Vault Web Access (PVWA), and Privileged Threat Analytics (PTA) to ensure secure and efficient management of privileged accounts.Designed and implemented RBAC policies in CyberArk to enforce least privilege access across the organization.Strong knowledge of database management systems, including SQL Server, with expertise in writing complex SQL queries and optimizing database performance for CyberArk deployments.Experienced in developing Web Services with Java programming language.Designed and implemented IdentityIQ solutions for application onboarding, including configuration of connectors for Active Directory, LDAP, Oracle, and custom applications.Experience in providing Single Sign-On (SSO) across enterprise applications using Okta and improving technical efficiencies in Identity & Access Management.Implemented OAuth and OpenID Connect protocols within Ping Access to facilitate secure and standardized authorization and authentication processes.Responded to and resolved access-related incidents by analyzing logs and system behavior within Ping Access.Proficient with Bean Shell rules, forms, workflows, policies, and access certifications within the Identity IQ framework.Experience integrating SailPoint with Azure Active Directory, ServiceNow, Cloud systems and PAM integration module.Hands-on experience with industry-standard IDEs like Eclipse and IntelliJ, RAD.Worked on implementing Service Oriented Architecture using related web services and frameworks like WSDL, UDDI, SOAP, and RESTful.Experience with databases like Oracle and SQL Server to manage tables, views, indexes, sequences, stored procedures, functions, triggers, and packages.Proficient in developing web applications with W3C Standards like HTML5, CSS3, XHTML, JavaScript, JSTL, Bootstrap, AJAX, Angular, JSON, and Typescript.Experience in product Ownership develop and communicate the product goal, create and clearly communicate product backlog items and Release Management.Experience in development, deployment and troubleshooting enterprise-based applications on Windows, UNIX and Linux platforms.Experience in Test Driven Development and Agile methodologies like SCRUM.Technical Skills:SailPoint IIQpingOktaLDAPJDBCService NowSAPAzureJavaOIDCHibernateSQL ServerMySQLADSAMLJSPJDBCJavaScriptSOAPRESTHibernatePowerShellXMLGitHub/GitLabHTMLJavaScriptAJAXAngularEclipseCyberArkJBossIBM WebSphereWebLogicOracleProfessional Experience:Client: Fujitsu, Richardson, TX Jan 2024 - NowIAM ConsultantResponsibilities:Effectively followed Agile Methodology with Sprint teams in a highly Dynamic environment.Designed and implemented robust IAM solutions for Fujitsu, incorporating Okta and SailPoint IdentityIQ 8.x to ensure secure user authentication, access control, and compliance.In Okta, I have worked on different features like user creation, IDP and SP initiated SSO flows, ORG2ORG integration, user provisioning using OIN and APIs. Worked on group assignment through manual and rules.Configured and managed CyberArk Central Policy Manager (CPM) in a CyberArk 10.x environment, establishing granular access controls and policy enforcement for privileged accounts.Involved in the development of solution design Overview document and technical document.Development of Identity federation connectors from SailPoint to Target Systems, along with subsequent access control by Secure OAuth.Integrated Okta Single Sign-On (SSO) for enhanced authentication and security, enabling a more user-friendly login experience.Conducted user acceptance testing (UAT) and provided technical support for application onboarding processes.Documented technical architectures, installation guides, and operational procedures for application integration and onboarding.Created Custom tasks, Custom Objects to update the entities in the system which are scheduled every week.Participated in all SailPoint deployment activities  connector configuration, custom rule development, workflow configuration and development, third party system integration.Implemented multi-factor authentication (MFA) solutions within Okta, enhancing security by adding an extra layer of authentication, such as SMS codes or biometrics, for user logins.Implemented and customized IAM solutions such as Okta, Azure AD, or AWS IAM to meet specific organizational needs.Utilized HashiCorp Vault's transit secret engine to implement encryption as a service, securing data at rest and in transit.Collaborated with stakeholders to gather and analyze business requirements related to privileged access management (PAM) solutions, focusing on CyberArk suite of products.Facilitated meetings with cross-functional teams to translate business needs into technical requirements and user stories for CyberArk implementations and enhancements.Collaborated with cybersecurity and compliance teams to ensure that CyberArk implementations adhere to industry regulatory frameworks such as SOX, HIPAA, and GDPR.Managed client requirements and configured SailPoint IIQ connectors.Configuring the Applications (Authoritative and Non-Authoritative) using AD, Flat file, JDBC and LDAP connectors to load the Identity Cubes.On boarded various applications like delimited file, AD etc.Constitute playbooks for integrating client facing application in Okta using federation protocols like SAML and Open ID connect.Implemented and deployed ServiceNow Orchestration with Okta for Automation of Okta operational activities and downstream applications access.Design solution for customer facing applications with Okta, with multiple IDP chaining between Okta and Ping Federate due to multiple databases required for authentication.Maintaining Active Directory groups and users and configure push groups from Okta to Active Directory, Build and maintain multiple clusters of PingFederate SSO Infrastructure on AWS platform.Implement PAM solutions to manage and monitor privileged accounts, and also implement just-in-time access, session recording, and enforcing strong passwords.Install and upgrade OKTA agents in production and lower environments, Password synchronization between OKTA and AD.Performed unit testing and involved in bug fixing of the applications and actively involved in production related issues. Analyze and troubleshoot problems and make recommendations.Deploying SailPoint IIQ Connectors for various target systems.Worked on the product story board, Backlog and Release management.Hands-on with aggregation, workflows, tasks, rules and roles.Understanding of Role Based Access Control (RBAC), Governance and Access Certification in SailPoint.Troubleshooted system failures, identify root cause and fix issues, ensuring the availability of the system.Implemented SailPoint Identity IQ to periodically review employee access to high-risk Sox Applications.Environment: Oracle, SailPoint, HashiCorp, CyberArk, Apache, Linux services, Open IDM, SAML, Open DJ servers, Open AM v13.5, Kerberos, Glassfish, Tomcat, Oracle DSEE, Big F5 load balancers, SSO cookies, PowerShell, OKTA.Client: SWA, Dallas, TX Aug 2022  Dec 2023IAM DeveloperResponsibilities:Worked on HashiCorp for secret management and storing the secrets for critical applications.Implemented ORG2ORG and managing user management lifecycle using Okta.Worked on Agile Methodology to achieve smooth collaboration between self-organizing, cross functional teams.Created, Configured and Administered Profiles, Clusters, Nodes and Node Groups for WebSphere Application Server.Worked on onboarding the different applications like AD, JDBC and LDAP connectors to load the Identity Cubes.Developed and implemented automated workflows and scripts using CyberArk's REST API and CyberArk PACLI (PrivateArk Command Line Interface) to streamline and optimize privileged account lifecycle management processes.Participated in penetration testing exercises to evaluate the effectiveness of CyberArk controls and identify potential vulnerabilities, resulting in the implementation of additional security measures and enhancements.Actively participated in CyberArk user community forums and conferences, staying up to date with the latest product features, best practices, and emerging trends in privileged access managementProgramming tools using Perl, Bean shell, Unix Shell Scripts, Java, Jason etc.Participated in daily Scrum and weekly meetings with the project manager and architects to meet expectations and deadlines.Experience in installing Okta s Lightweight agent to integrate with Active Directory.Set up Certification Campaign in Identity Now and created Business Requirement Document and Functional Req document.Provided technical support and troubleshooting for application onboarding issues, ensuring minimal disruption to business operations.Implemented SailPoint IdentityIQ solutions for onboarding various applications, including Active Directory, JDBC, LDAP, and custom connectors.Developed other lifecycle manager workflows which included Access Request and Manage Passwords.Installed Okta Radius Agent to enable MFA for Cisco AnyConnect VPN and Citrix NetScaler thereby migrating functionality from CA Advanced Authentication to Okta.Configured Manager Certification, Application Owner Certification and Targeted Certifications.Onboarded flat file application such as HR application into SailPoint IIQ.manager for administration of Managed servers.Configured two levels of approvals for access request workflow.Onboarded RACF application into SailPoint IIQ.Configured custom scopes and claims in OKTA to be used by applications to authorize the users.Some Roles are entitled with LDAP and AD. So, need to validate whether roles are creating accounts in LDAP and AD or not for the Users.Designed the overall architecture of Identity Now implementation including the setup of VAs and connecting the Identity Now SaaS.Created Filters in Identity Now for inclusion and Exclusion based on the membership criteria for Roles.Application integration using SAML, OIDC.Created Identity Profiles and set up Birth Right Provisioning by enabling an Access profile at the identity Profile level.Implement and configure OKTA MFA solution.Experience in Okta Provisioning and SSO.Worked on AD app rules like correlation rule, customization rule, before provisioning rule, after provisioning rule, account customization rule and group customization rule.Set up the Access request Module for the auto approvals flow of user provisioning and De-provisioning.Implemented Self-service feature, Password feature, Provisioning feature and policies in SailPoint.On board the applications and provided seamless authentication and SSO using OKTA.Maintained user account workflows using form Joiner, Mover, and Leaver in SailPoint.Involved with existing Provisioning Team for the application to make it fit into IIQ and to get the existing User Access Management (UAM) model.Environment: SailPoint IdentityIQ 8.X, BeyondTrust, LDAP, CyberArk, Active Directory, Java 1.8, IntelliJ, My SQL, XML, WebSphere 8.0, UNIX, Log4J, Okta, Maven 2.0.4, REST Web services.Client: AT&T, Plano, Texas May 2021- July 2022IAM DeveloperResponsibilities:Worked on PingFederate in this project, and I have integrated 30+ applications with Ping Federate which supports SAML2.0 protocol. Also, integrated application which supports OIDC.Experience on different oAuth grant flows like Client Credentials, implicit, Authorization code and Authorization code PKCE.Involved in analyzing business requirements and prepared detailed specifications that follow project guidelines required for project development.Developed REST API for Connect and Traxx Application in NodeJS.Followed Agile methodology with daily Scrums and Sprint planning meetings.Involved in the design and implementation of SailPoint IIQ in both Production and Non-Production environment.Developed custom connectors using JAVA and Web Services to integrate with target application.Setup applications Active Directory, LDAP, Oracle, and Flat Files.Created a run book based on - Okta deployment process, AD installation and Troubleshooting guide.Configured and executed SailPoint IIQ connectors for different target systems.Implemented the provisioning feature of SailPoint IIQ by using various out-of-the-box connectors.Using IQ Service to perform installations of IIQ Provisioning to Active Directory.Developing and implementing custom connectors based on client's needs.Validated Rules such as Build Map, Creation, Customization and Merge Map Rules.Developed a custom form in the SailPoint UI so that various admins can create user accounts manually through UI and provision users.Provided use cases and business processes for support groups on role, entitlement, provisioning and deprovisioning.Manage client requirements and configure SailPoint IIQ connectors for different applications in our company.Developed RESTful Web Services as End point to share the data with the other products using JSON as messaging medium.Configured SAML assertion attributes using regular expression for the app team.based on requirements and created SAML apps using Okta API.Enabled self-service password reset feature to reduce help desk calls for end-users using Okta MFA.Performed OOTB Integration with multiple applications such as AD, Exchange, LDAP, Delimited File, Workday Files and Mainframe RACF etc.Collaborated with client post implementation for user testing, debugging, support, and maintenance.Environment: SailPoint IdentityIQ 7.0, LDAP, Active Directory, Java 1.8, IntelliJ, My SQL, XML, WebSphere 8.0, UNIX, Log4J, Maven 2.0.4, REST Web services, OKTA, Azure, Oracle.Client: Kisan-Coop LTD June 2018  Mar 2021SailPoint DeveloperResponsibilities:Worked in an Agile Development Team to deliver regular updates to business team and project managers.Gathered compiled, documented, and analyzed requirements and converted them to functional and technical specifications.Integrated Ping Identity with cloud-based services, ensuring secure authentication and authorization for applications hosted in cloud environments.Worked with an offshore team and coordinating the daily deliverables, testing, and operations.Established the OIM environment, integrating seamlessly with AD, MS Exchange, and OracleDB for efficient system operations.Implemented User Provisioning, Groups, and Organization Level Provisioning to OID and AD with Exchange from OIM, optimizing identity management processes.Designed Roles, Rules, and Workflow routes, addressing functionalities such as user enablement-disablement, audit reporting, and delegation.Successfully implemented and configured Ping Access to provide fine-grained access controls for web applications and APIs.Developed and enforced access policies within Ping Access, defining rules based on user attributes, device characteristics, and contextual information.Implemented OAuth and OpenID Connect protocols within Ping Access to facilitate secure and standardized authorization and authentication processes.Introduced Custom attributes for Reconciliation and Provisioning, tailoring the system to specific organizational needs.Customized OIM forms based on distinct roles, such as Full-time and Contractor, improving user experience and system relevance.Engineered Entity, Prepopulate, Process task, and Rule generator adapters to support complex workflows efficiently.Implemented Password policies in AD and OID, enhancing security measures across the system.Integrated OIM and OAM to achieve seamless Single-Sign-On, promoting a cohesive user experience.Developed Java based API (RESTful Web Service) to track sales and perform sales analysis using MySQL.Customized the SailPoint IIQ product to implement enterprise security and access control.Performing integrations with different application types such as AD, Exchange, RDBMS, and Flat File & LDAP.Involved in knowledge sharing sessions for SailPoint Compliance Manager component and involved in creation of design documents, code reviews.Assisted in executing the implementation of IAM systems and upgraded systems as needed.Build resource adapters, Identity Management, Single Sign-On (SSO), Provisioning and Identity Workflows, Access Management, RBAC (Role-Based Access Control), Authentication and Authorization technologies.Design and develop Provisioning polices, SOD, various approval workflows, Provisioning Policy Forms as per client requirements.Worked on various Certifications, developed custom tasks and reports.Developed Custom Connectors, Logical, Multiplex applications, REST API and Web Service applications.Worked with SailPoint APIs to develop custom functionalities to suit business requirements.Environment: Windows 2012 R2, RHEL 7.0, Ping federates 6.0, 8.0, Ping Access 4.1, AD (LDAP) as User Store, Oracle Database as Policy store, Ping Access, Ping directory, Bean shell scripting, Apache Web Server, IBM Http Web Server.Educational Qualifications:Bachelors in science (BS)- 2018Boston Intl College, Chitwan Nepal

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise