7+ years professional experience in Identity and Access Management
Experience in setting up SAML applications in OKTA Installing AD / IWA agents on member domains, validating single sign-on, user provisioning, and troubleshooting password synchronization across multiple Okta platforms.
Expertise in End-to-End deployment of Okta and CyberArk suite
Experience with coding in distributed computing domain using technologies Java, XML, etc. Strong knowledge of Web Access Management and SSO technologies (Okta, SAML, and OAuth)
Expertise in API Access Management, OAG, and Workflows suite
Expertise in ManageEngine Password Manager Pro
Experience in using SiteMinder Federation services and web agent option packs to build and maintain Federation infrastructure to provide SSO functionality to external applications.
Expertise working on Secure Proxy servers and Federation services
Solid understanding of SOX and HIPPA Compliance
Experience in configuring CA Secure Proxy Server to use as SSO and Federation Gateway for the application accessing from the internet
Overview
12
12
years of professional experience
Work History
Okta Engineer
Averity
08.2020 - Current
Designed and Implemented Okta suite from scratch in co-existence mode along with Ping Federate.
Have integrated Okta Internal and Customer applications with Okta B2E and B2B tenants.
Deployed multiple Okta tenants for Normal Users, ADM accounts, service accounts, and craft workers based on business requirements.
Have leveraged Okta API Access Management for securing application APIs and defining custom access policies for managing tokens lifetime.
Installed and Implemented Okta Access Gateway for securing access to on-prem apps and protecting organizations hybrid cloud infrastructure Integrated Okta SSO for more than 170 applications with MFA enabled at Okta level and app-level.
Integrated Okta provisioning for salesforce, BOX, workday, AD, Okta Org2Org and SAP Success Factors.
Integrated Okta provisioning to SAP using OPP agent deployments and SCIM connector to manage user Joiner/Leaver/Mover events.
Integrated Okta to Workday using API credentials for both Real Time Sync and Batch import. Workday would be profile mastered and processes feed that come across to downstream applications.
Integrated Okta with CyberArk. Also, provisioned users into unmanaged endpoints using push groups.
Installed 8 AD agents across multiple AD domains and 4 Radius agents to support VPN and CITRIX related requests.
Integrated various applications like Splunk, workplace, BOX, WebEx and Teem using custom SAML. Among these, few are only SP initiated and few are only IDP initiated.
Defined Okta rules for segregation of duties and birthright provisioning of users into downstream applications.
Have setup MFA for all applications in scope to Okta such as Okta push, Okta verify, SMS authentication, voice call authentication and security questions.
Integrated Okta with O365 provisioning and de-provisioning including assigning/re-assigning licenses.
Have integrated substantial number of applications for Okta provisioning via API. Have created different API tokens and share same with application team to configure at their end for successful integration.
Okta/CyberArk Consultant
Kestra Financial
01.2018 - 07.2020
Responsible for requirement gathering and preparing ROM to application teams as per business needs.
Responsible for providing design documents to application teams based on compatible protocols like SAML 2.0, OIDC, WS-FED, RADIUS Integrated Okta SSO for the inbound federation to third-party applications.
Engaging with application teams to review design documents and expose the challenges/risks.
Designing IAM patterns for the access management team to follow as per application team requirements.
Engaging with security architects periodically to discuss the artifacts and enhancements of Okta and diligently provide insights on the same.
Migrated more than 45 applications from CA SiteMinder to Okta for SSO in one go with Okta-SiteMinder coexistence mode.
Integrated Okta – CITRIX Gateway via RADIUS (UDP) instead of SAML due to certificate discrepancy.
Managed user AD group membership using Okta push groups.
Have created multiple dashboards across the SIEM platform (Splunk) globally and a few dashboards for Admin activities.
Splunk forwarder receives data from all servers and will monitor the logs to identify brute force attacks.
Integrated Okta provisioning for Salesforce, salesforce knowledge applications.
Integrated O365 with the latest Microsoft ADFS plug-in instead of SAML as per business requirements.
Integrated with Okta to enable Single Sign-on and Multi-Factor Authentication.
Engaged with firewall team to define IP zones for internal & external networks and blocked blacklisted IPs.
Defined Okta rules for segregation of duties and birthright provisioning of users into downstream applications.
Managed user AD group membership using Okta push groups.
Integrated Okta provisioning for Salesforce, salesforce knowledge.
Implemented automatic password vaulting with the help of PACLI and using API calls to PVWA.
Implemented Cyber-Ark AIM solution and integrated with different applications.
Implemented RHEL IDM solution to provide user authentication through AD and centralized sudo policy management.
Defined On-Boarding rules in 10.3 version to automatically onboard privileged accounts into appropriate safes.
Configured DR with automatic failover and failback manually after complete replication safes are transformed to primary Vault server.
Involved in Architectural discussions of Cyber-Ark implementation.
Engaged with Cyber-Ark Professional Services to review and approve the architecture before deployment.
Enabled transparent connect to Windows and RHEL servers from Cyber Ark PVWA.
IAM Engineer
Fastly
09.2014 - 12.2017
Integrated various applications like Splunk, Nexpose, Dome 9, workplace, BOX, WebEx and Teem using custom SAML. Among these, few are only SP initiated and few are only IDP initiated.
Defined Okta rules for segregation of duties and birthright provisioning of users into downstream applications.
Imported all AD groups into Okta defining rules and manage user group membership via Group Rules.
Have used both expression editor and expression builder based onrequirementst. Have defined rules to updatea few attributes and groups.
Have setupp MFA for all applications in scope to Okta such as Okta push, Okta verify, SMS authentication, voicecall authenticationo,n and security questions.
Integrated Okta with O365 provisioning and de-provisioning including assigning/re-assigning licenses.
Haveintegrate a substantial number of applications for Okta provisioning via API. Have created different API tokensand sharede same with the application team to configure at their end for successful integration.
Splunk forwarder receives data from all servers and monitors the logs to identify brute force attacks.
Integrated Okta provisioning for Salesforce, salesforce knowledge applications.
Integrated O365 with latest Microsoft ADFS plug-in instead of SAML as per business requirement.
DeployeRoleBasedd Access Provisioning for CA Identity Minder and CA Identity Governance.
Developed batch scripts to extract data from both managed and unmanaged endpoints in incremental fashion.
Migrated applications from Sun IDM to CA IDM on different framework-based processes depending on application criticality.
IAM Administrator
Oncor Electric Delivery
08.2012 - 08.2014
Configured provisioning manager to connect to the CA Identity Minder Server.
Developed workflows for Identity provisioning and access to manager accounts functionality.
Worked on Enterprise-wide integration and provisioning &, de-provisioning of employees and contractors.
Designed custom login pages to IDM using JSP scripts and customized connectors are designed apart from OOTB connectors.
Onboarding new applications for access request management within Identity Minder.
Created Policies through policy express as per Business Logic.
Created customized reports for Business Objects and scheduled through Central Management Console.
Created snapshot definition to generate customized reports for PCI and SOX Audits.
Configured the SiteMinder Policy servers for failover to multiple user directories and policy stores.
Developed a POC to Upgrade SiteMinder 6.5 to R12 SP2 and succeeded in completion.
Managed documentation for application configurations, business input, and deployment procedures.
Developed custom login forms & web pages for CA SiteMinder. Authentication using Java, JSP, HTML code.
Implemented different vendors SSO using SAML 2.0 in CA Federation security services.
Policy Server Optional Pack and Web Agent Optional Pack for Federation web services.
Assist new applications with SSO integration, including configuring Secure Proxy Server configuration.
Education
Master of Science -
Concordia University Wisconsin
Mequon, WI
Skills
Identity and Access Management
Okta, CyberArk 93,10x, Identity Now
CA User/Provisioning Directories, Microsoft AD, Azure AD