Summary
Overview
Work History
Education
Skills
Websites
Certification
Timeline
Generic

ASHOK GANGAVARAM

Norcross,GA

Summary

Adept Sr SailPoint Developer with a proven track record at TJX Companies, showcasing expertise in SailPoint IdentityIQ, Okta, and CyberArk integration. Leveraged UNIX and Linux platforms to enhance IAM processes, achieving significant improvements in system security and efficiency. Renowned for exceptional problem-solving abilities and mentoring junior team members, consistently delivering projects that exceed organizational standards.

Overview

13
13
years of professional experience
1
1
Certification

Work History

Sr SailPoint Developer

TJX Companies
03.2024 - Current
  • Led the deployment and engineering of SailPoint IdentityIQ 8.4, integrating new applications using custom connectors and API development
  • Led the design and implementation of SailPoint Identity Now and access management solutions, ensuring they met organizational needs and compliance standards
  • Collaborated with application teams to identify, aggregate, and correlate user accounts to identity cubes within SailPoint
  • Developed and managed web services and SCIM-based connectors for seamless integration with various systems
  • Implemented LCM, Certifications, Provisioning, and Role Management modules within the SailPoint suite
  • Developed plugins for both frontend and backend components, enhancing the functionality and user experience of the SailPoint system
  • Directed system integrations for both internal and external applications, ensuring robust and secure connections
  • Architect and implement SailPoint IdentityIQ solutions for large enterprises with over 50K identities
  • Integrate OOTB connectors including SAP S4, GRC, Hana, Active Directory, Azure, Salesforce, Workday, ServiceNow, REST, and SCIM
  • Lead recertification processes, develop custom rules and workflows, and manage infrastructure maintenance and upgrades
  • Conduct root cause analysis and lead P1/P2 incident bridge calls to resolve critical IAM issues
  • Mentor junior team members, perform code reviews, and enforce coding best practices
  • Develop and maintain technical documentation for IAM processes and configurations
  • Crafted, tested, and troubleshot custom System/Application Connectors within SailPoint IdentityIQ
  • Utilized expertise in IIQ, Microsoft Active Directory, relational databases, Java, BeanShell, REST API, and web services to enhance system performance and security
  • Led the integration of SailPoint into the existing security framework, enhancing identity governance and administration
  • Implemented and maintained SSO solutions using SAML, OAuth, and OIDC protocols, improving user experience and security
  • Managed MFA deployments, ensuring robust security for sensitive applications and systems
  • Administered and optimized Microsoft Active Directory, including user provisioning, group policies, and access management
  • Collaborated with cross-functional teams to design and implement security measures for over 30 new applications
  • Conducted regular security audits and assessments to identify vulnerabilities and recommend mitigation strategies
  • Developed, tested, and troubleshot custom system/application connectors for SailPoint Identity Now
  • Applied understanding of RBAC, Identity Policies, Identity Lifecycle automation, Password Policies, Separation of Duties, and User Provisioning workflows to optimize IAM processes
  • Worked with SSF and rapid setup frameworks to streamline deployment processes
  • Employed SSD deployment framework and managed code using Git repositories
  • Collaborated in cloud environments and leveraged Splunk for effective logging and monitoring
  • Participated in CICD Build Tools and Agile methodologies to support continuous integration and development
  • Worked on for customization for application provisioning
  • Worked on changes for notification templates in workflows
  • Worked on custom rules for updating the identity attributes to provision or deprovision based on the value
  • Worked on debugging the issue with refresh identity tasks, performance tasks and custom tasks
  • Worked on debugging the aggregation and delta aggregation issues
  • Worked on the customized reports for extracting the desired data to analyze
  • Participate in all SailPoint deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration
  • Worked on introduction of new email notifications and change in email change notifications of Life cycle events
  • Provided expert guidance and technical expertise in integrating applications into the ForgeRock platform, including creating journeys, policies, scripting, and implementing using ForgeRock SDKs
  • Demonstrated senior-level IAM knowledge, with experience working on customer-facing applications requiring OAuth2, OIDC, SAML, and certificate-based authentication
  • Designed and deployed Identity & Access Management solution to improve user experience, meets compliance, and reduces costs
  • Worked on account selector rules in case of role provisioning and delegation rules in case of the certifications
  • Worked on Entitlement Analysis and Role Mining to give the proper data to the client to decide on entitlements to bundle
  • Involved in creating Role, Entitlement and Manager certifications to create various data feeds
  • Worked on implementing client specific Quarterly certification processes as per their Auditing needs
  • Worked on debugging the identity access issues with target systems like AD, workday etc
  • Worked on aggregation issues where orphan identities are being created
  • Led the implementation and customization of Okta Identity Cloud for enterprise customers across diverse industries
  • Designed and implemented SSO solutions using Okta for web and SaaS applications, reducing user friction and improving productivity
  • Integrated Okta with on-premises directories (e.g., Active Directory, LDAP) to streamline user provisioning and authentication processes
  • Implemented MFA and adaptive authentication policies to enhance security posture and mitigate identity-related risks
  • Developed custom workflows and automation scripts using Okta APIs to automate identity lifecycle management processes and improve operational efficiency
  • Collaborated with security and compliance teams to ensure Okta configurations aligned with regulatory requirements and industry best practices
  • Integrated CyberArk with identity and access management (IAM) systems, directory services, and enterprise applications to streamline access provisioning and authentication processes
  • Configured policy-based access controls and session monitoring rules within CyberArk to enforce least privilege principles and detect anomalous activities
  • Conducted risk assessments and security audits of CyberArk environments to identify vulnerabilities and recommend remediation measures
  • Environment: SailPoint 8.1, UNIX, HTML, GitHub, Visio, Excel, Postman, Oracle (TOAD), Eclipse and SQL

SailPoint Developer

Cabot Corp
Alpharetta, GA
08.2021 - 03.2024
  • Worked in changes required for the Mover and leaver life cycle
  • Worked on integration of the BOT accounts to the Sailpoint IIQ
  • Supported the implementation and maintenance of IAM solutions, focusing on SailPoint IdentityIQ
  • Developed custom connectors and APIs to integrate various applications with SailPoint IIQ
  • Enhanced the security and efficiency of user provisioning and approval workflows
  • Managed Active Directory integrations and maintained relational databases to support IAM operations
  • Assisted in the development and enforcement of identity policies, password policies, and RBAC frameworks
  • Provided technical support and troubleshooting for IAM-related issues, ensuring minimal downtime and maximum security
  • Played a key role in the deployment of Ping Identity solutions, providing secure authentication and SSO capabilities
  • Developed and enforced security policies and procedures, aligning with industry standards and regulatory requirements
  • Spearheaded the implementation of MFA, reducing the risk of unauthorized access
  • Monitored and responded to security incidents, performing root cause analysis and implementing corrective actions
  • Educated team members on security best practices and new technologies through workshops and training sessions
  • Contributed to the development and administration of SailPoint IIQ, Microsoft Active Directory, relational databases (Oracle, SQL Server, MySQL, DB2), and REST API/web services
  • Led the implementation and management of SailPoint IdentityIQ for enterprise clients
  • Configured and deployed OOTB connectors to integrate with various enterprise applications
  • Developed and maintained custom workflows, rules, and policies to meet client-specific requirements
  • Managed infrastructure maintenance, including applying patches and performing system upgrades
  • Provided expert troubleshooting and support, leading root cause analysis and incident resolution efforts
  • Guided and advised junior team members, fostering technical growth and ensuring adherence to best practices
  • Developed Quick links for BOT identity creation and for identity account management
  • Worked on changes for notification templates in workflows
  • Worked on debugging the issue with refresh identity tasks, performance tasks and aggregations tasks
  • Worked on Split provisioning on the roles based on the risk levels
  • Worked on integrating of applications to SailPoint IIQ with connectors involving AD, Service Now, Mainframe and JDBC
  • Involved in the developing the customized reports for extracting the desired data to analyze
  • Designed and deployed Identity & Access Management solution to improve user experience, meets compliance, and reduces costs
  • Worked on account selector rules in case of role provisioning and delegation rules in case of the certifications
  • Provided expert guidance and technical expertise in integrating applications into the ForgeRock platform, including creating journeys, policies, scripting, and implementing using ForgeRock SDKs
  • Demonstrated senior-level IAM knowledge, with experience working on customer-facing applications requiring OAuth2, OIDC, SAML, and certificate-based authentication
  • Lead the installation and configuration of SailPoint IdentityIQ on GCP for multiple clients, ensuring secure and efficient IAM processes
  • Developed custom workflows, connectors, and rules within SailPoint IIQ to meet specific business requirements
  • Collaborated with cloud architects to design and implement IAM strategies in hybrid and cloud environments
  • Conducted security assessments and audits to ensure compliance with industry standards and best practices
  • Provided training and mentoring to junior engineers on SailPoint IIQ and GCP security best practices
  • Worked on Entitlement Analysis and Role Mining to give the proper data to the client to decide on entitlements to bundle
  • Worked on support tickets (L3 and L2) and as onsite coordinator distributing incidents and tickets among the team members
  • Worked on debugging the identity access issues with target systems like Azure AD , SharePoint etc
  • Worked on aggregation issues where orphan identities are being created
  • Provided operational support for Okta Identity Cloud, including user administration, application onboarding, and access troubleshooting
  • Participated in the design and implementation of IAM policies and procedures to enhance security and compliance
  • Conducted access reviews and audits to ensure adherence to least privilege principles and regulatory requirements
  • Acted as a subject matter expert on Okta, providing guidance and training to IT staff and end-users on identity and access management best practices.

SailPoint Developer

FIS Global
Dallas, TX
08.2019 - 07.2021
  • Involved in moving the applications to Saviant tool to rely as per the FEDRAMP regulations
  • Working on the upgrade of the SailPoint from version 7.1 to 8.1
  • Worked in Identity Now (SAAS)Platform with transforms using rest API calls (v1,v2, v3)
  • Worked in configuration of Identity Now for VA deployment with AWS
  • Worked in Event trigger services in both Identity IQ and Identity Now
  • Worked on Split provisioning on the roles based on the risk levels
  • Mainly involved in design and development of life cycles like Joiner, Rehire and mover
  • Involved in the cleanup of production data through Batch requests and one-time rule to update the application, Identity, managed attribute objects as per the requirement
  • Worked on the quick link to create the GCP group projects and respective server login groups
  • Worked on the custom workflow to trigger the leaver on the identities which are failed to trigger as per the status form the authoritative system
  • Involved in the developing the customized reports for extracting the desired data to analyze
  • Worked on application onboarding with connectors like AD-logical, ServiceNow, SharePoint, JDBC, Delimited, proxy, CyberArk connectors and worked on the roles design and implementation
  • Designed and deployed Identity & Access Management solution to improve user experience, meets compliance, and reduces costs
  • Participate in all SailPoint deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration
  • SailPoint IIQ Installation and Configuration as required by the design solution
  • Involved in designing and implementing AD logical applications to pull data from AD
  • Frame set up for Role mining, Role Based Access Control (RBAC), Entitlement Management and Identity Management
  • Worked on account selector rules in case of role provisioning and delegation rules in case of the certifications
  • Worked on Entitlement Analysis and Role Mining to give the proper data to the client to decide on entitlements to bundle
  • Provided expert guidance and technical expertise in integrating applications into the ForgeRock platform, including creating journeys, policies, scripting, and implementing using ForgeRock SDKs
  • Demonstrated senior-level IAM knowledge, with experience working on customer-facing applications requiring OAuth2, OIDC, SAML, and certificate-based authentication
  • Worked on support tickets (L3 and L2) and as onsite coordinator distributing incidents and tickets among the team members
  • Environment: SailPoint 8.1, UNIX, HTML, Bit Bucket, Visio, Excel, Postman and Oracle (TOAD)

SailPoint Developer

Bridgestone
Nashville, TN
08.2018 - 07.2019
  • Worked on automation of delimited applications for automatic provisioning through custom connector
  • Worked on developing the quick links as per the requirements in the environment
  • Worked on development of plugins as an enhancement for the approval of access reviews
  • Worked on pre validations on the access requests and other validations on the provisioning fields
  • Involved in the development of workflow for transfer of service accounts for the custom connector
  • Worked on application onboarding with connectors like AD, Delimited, multiplex applications, JDBC and Rest connector applications
  • Worked on leaver lifecycle event
  • Worked on the provisioning automation of mainframe applications
  • Worked on adding the additional attributes to the managed attributes which are updated in frequent intervals
  • SailPoint IIQ Installation and Configuration as required by the design solution
  • Involved in designing and implementing AD connectivity in order to pull data from AD
  • Worked in roles design and configuration for various applications
  • Worked as SME for business-critical tasks for data migration and business process testing
  • Frame set up for Role mining, Role Based Access Control (RBAC), Entitlement Management and Identity Management
  • Worked on account selector rules in case of role provisioning and delegation rules in case of the certifications
  • Worked on Entitlement Analysis and Role Mining to give the proper data to the client to decide on entitlements to bundle
  • Worked on support tickets (L3 and L2) and as onsite coordinator distributing incidents and tickets among the team members
  • Developed a custom form in the SailPoint UI so that various admins can create user accounts manually through UI and provision users
  • Provided operational support for CyberArk Privileged Access Security solutions, including user administration, access provisioning, and incident response
  • Participated in the development and implementation of IAM policies and procedures to enhance security posture and regulatory compliance
  • Collaborated with cross-functional teams to investigate and resolve security incidents and access-related issues within CyberArk environment
  • Delivered training sessions and knowledge transfer to IT staff and end-users on CyberArk best practices and security controls
  • Environment: SailPoint 7.1, UNIX, HTML, GIT, Visio, Excel and Oracle (TOAD)

SailPoint Engineer

Deutsche Bank
Cary, NC
06.2016 - 11.2017
  • Mainly involved in design and development of life cycles like Rehire and mover
  • Involved in the cleanup of production data through Batch requests and one-time rule
  • Involved in the developing the customized reports for extracting the desired data to analyze
  • Worked on application onboarding with connectors like AD, ServiceNow, LDAP, SharePoint, JDBC, Delimited, proxy, CyberArk connectors and worked on the roles design and implementation
  • Designed and deployed Identity & Access Management solution to improve user experience, meets compliance, and reduces costs
  • Participate in all SailPoint deployment activities - connector configuration, custom rule development, workflow configuration and development, third party system integration
  • SailPoint IIQ Installation and Configuration as required by the design solution
  • Involved in designing and implementing AD logical applications to pull data from AD
  • Set up SailPoint IIQ policy server on 4 environments (Dev, QA, UAT & Production)
  • Worked as SME for business-critical tasks for data migration and business process testing
  • Frame set up for Role mining, Role Based Access Control (RBAC), Entitlement Management and Identity Management
  • Developed a custom form in the SailPoint UI so that various admins can create user accounts manually through UI and provision users
  • Provided use cases and business processes for support groups on role, entitlement, provisioning and deprovisioning
  • Involved in working with creating and changing Job change certification workflow and NCD workflows
  • Provisioning and access governance experience with and understanding of security on systems such as AD, LDAP/Unix, Oracle, Sybase, and manual provisioned applications
  • Involved in documentation of Sop for the various failure reports
  • Involved in the incorporating the third-party functions into IIQ
  • Environment: SailPoint 7.1, UNIX, HTML, Bit-Bucket, Visio, Excel, and Oracle (TOAD)

Middleware Engineer

Eton Technologies- Ind
02.2012 - 06.2016
  • Collaborated with project stakeholders to understand business requirements and translate them into middleware architecture designs
  • Designed scalable and resilient middleware solutions to support Deutsche Bank's applications and services
  • Evaluated existing middleware technologies and recommended enhancements or alternative solutions to meet project objectives
  • Led the implementation and configuration of middleware components, including application servers, message brokers, and integration platforms
  • Installed and configured middleware software according to best practices and security guidelines
  • Customized middleware configurations to optimize performance, reliability, and resource utilization
  • Designed and implemented middleware-based integration solutions to enable seamless communication between disparate systems and applications
  • Developed integration interfaces, message formats, and protocols to facilitate data exchange and interoperability
  • Configured middleware adapters and connectors to integrate third-party systems and services with Deutsche Bank's infrastructure
  • Monitored the performance of middleware components and identified opportunities for optimization
  • Analysed system metrics and logs to troubleshoot performance bottlenecks and scalability issues
  • Implemented security measures and access controls to protect middleware infrastructure from unauthorized access and cyber threats
  • Ensured compliance with regulatory requirements and industry standards for data protection and privacy
  • Designed and implemented high availability (HA) and disaster recovery (DR) solutions for middleware components
  • Configured clustering, failover, and load balancing mechanisms to ensure continuous availability of critical services
  • Developed and documented recovery procedures and contingency plans to minimize downtime and data loss
  • Implemented monitoring and alerting systems to proactively detect and respond to middleware-related issues
  • Configured performance monitors, event triggers, and automated notifications to notify stakeholders of abnormal conditions or failures
  • Developed dashboards and reports to provide visibility into middleware health, performance, and utilization metrics.

Education

MBA -

JNT University
01.2011

B.Sc. -

SV University
01.2009

Skills

  • UNIX
  • Linux
  • Windows Server
  • MacOS
  • Microsoft Azure
  • Amazon Web Services (AWS)
  • SailPoint IdentityIQ
  • JML Event and Workflow Configuration
  • Okta Administration
  • CyberArk
  • Splunk
  • IBM QRadar
  • Active Directory
  • LDAP
  • Firewalls
  • Intrusion Detection/Prevention Systems (IDS/IPS)
  • Beanshell
  • Core Java/J2EE
  • WebLogic
  • WebSphere
  • Apache-Tomcat
  • JRun
  • AD
  • SAP
  • Salesforce
  • Oracle
  • JDBC
  • Webservices
  • Office365
  • Snowflake
  • SCIM
  • RSA
  • Custom connectors
  • Requirement Gathering
  • Design Documentation
  • Apigee
  • Ws02
  • Test-Driven Development (TDD)
  • Automated Testing
  • DB2
  • MySQL
  • Hibernate
  • JPA
  • SAFe
  • Scrum
  • IDN
  • RSA IGL
  • IBM Tivoli Identity Manager
  • Grafana
  • Prometheus
  • Datadog
  • CloudWatch

Certification

SailPoint IdentityIQ Certification

Timeline

Sr SailPoint Developer

TJX Companies
03.2024 - Current

SailPoint Developer

Cabot Corp
08.2021 - 03.2024

SailPoint Developer

FIS Global
08.2019 - 07.2021

SailPoint Developer

Bridgestone
08.2018 - 07.2019

SailPoint Engineer

Deutsche Bank
06.2016 - 11.2017

Middleware Engineer

Eton Technologies- Ind
02.2012 - 06.2016

MBA -

JNT University

B.Sc. -

SV University
ASHOK GANGAVARAM