Summary
Overview
Work History
Education
Skills
Disclaimer
Timeline
Generic

Jabastin D

Chennai

Summary

  • Overall 10+ years of experience, including 6+ years as an IAM engineer with expertise in deploying and managing authentication/authorization solutions using the Ping Identity suite (PingFederate, PingAccess, PingOne MFA, PingID, Ping Directory and Ping DaVinci).
    • Proficient in CIAM strategies, SSO, and MFA implementation to enhance security and user experience across complex infrastructures.
    • Skilled in AWS cloud deployments, SAML, OAuth, and API testing using Postman.
    • Strong background in infrastructure security, auditing, and configuring IAM adapters for compliance in cloud and on-premises environments.
    Linux/Unixapplication support log/infra monitoring-Splunk,backup tools –Autosys, Deployement using CI/CD tools – GIT, Jenkins & Ansible.

Overview

9
9
years of professional experience

Work History

IAM Engineer

Bahwan CyberTek
11.2021 - Current
  • Installing, configuring, administering, maintaining, and upgrading PingFederate, PingAccess and their components to the latest versions
  • Working on CIAM solutions to provide SSO, MFA, access management, authorization, directory services, data access governance, identity orchestration, threat detection, and fraud mitigation
  • Engaging in project proof-of-concepts (POCs) using Ping DaVinci and PingCentral.
  • Implementing self-service solutions and delegate admin consoles through Ping Directory to enhance user autonomy and administrative efficiency
  • Creating and integrating new applications with PingFederate to achieve SSO (IDP/SP) by utilizing industry-standard protocols such as SAML, OAuth, and OpenID
  • Implementing and configuring Ping ID and PingOne MFA across both on-premises and cloud environments
  • Managing data stores such as Ping Directory, LDAP, and SQL databases for applications supported by Ping Identity solutions
  • Troubleshooting SSO issues using tools like SAML Tracer and Postman, and by analyzing PingFederate and PingAccess logs to ensure efficient issue resolution and system performance
  • MQ and idelphe - Configuration of MQ or Ideplhe scripts, Monitoring the flow ,IHS and WAS support patch deployment .
  • Autosys - Cross checking the job of the back up and troubleshooting the Autosys server job
  • Reboot - Rebooting the server according to scheduled uptime
  • Splunk -Monitoring the servers on daily basics report
  • Worked on different integration tools like Git, Jenkins and Ansible CI/CD tools for deployment

IAM Engineer

CSC E-Governance
10.2019 - 08.2021
  • Maintained PingFederate, PingAccess SSO, and associated components to ensure seamless operation and security
  • Collaborated with team members to define workflows, enhance processes, and implement security improvements to protect applications
  • Provided administrative support to colleagues, assisting with complex troubleshooting and administration tasks
  • Installed and configured adapters and created authentication selectors to support user authentication requirements
  • Conducted certificate renewal activities for certificates enabled in PingFederate, ensuring uninterrupted secure communication
  • Worked with Active Directory, SQL databases for user management and authentication
  • Installed, configured, administered, maintained, and upgraded PingFederate, PingAccess SSO, and related components on Windows and Linux servers
  • Configured multiple adapters, such as Integrated Windows Authentication, HTML Form Adapter, Composite Adapter, Reference ID Adapter, and CoreBlox Adapter in PingFederate, to support diverse authentication processes
  • Utilized cloud solutions, including AWS Cloud Platform, for scalable and secure deployments
  • Created and integrated new applications with PingFederate to achieve SSO (IDP/SP) using industry-standard protocols like SAML, OAuth, OpenID
  • Troubleshot SSO issues using SAML Tracer and Postman, as well as by reviewing PingFederate and PingAccess logs to identify and resolve issues efficiently
  • Integrated various data stores, including Active Directory and SQL databases, with PingFederate to authenticate users at the backend, enhancing access security and reliability
  • To deploy scripts on UAT servers and Monitoring Production Server
  • Working in a 24X7 on call rotation to support UAT environments
  • Patch Update on windows and Linux server
  • Deploying HTML and images in Server using Winscp tools
  • Active Directory- Creation/Deletion/Maintenance of Windows Accounts through Active Directory, Should work on BAU to complete the job within SLA, Password Credentials Reset of AD user
  • Package Administration(RPM & YUM) and Schedule Jobs (At & Cron).
  • Veritas Backup Exec -L1 and L2 support for Daily Incremental, Weekly and Monthly Backup, Monitoring and troubleshooting.
  • Squid Proxy Server - Installation, Whitelisting .
  • Git Lab - Installation, configuration and administration of GitLab .

System Engineer

EMPOWER SOLUTION
05.2016 - 01.2019
  • Administered and maintained PingFederate to ensure efficient operation and functionality
  • Worked on cloud solutions, including AWS and served as the primary contact for defining process workflows in AWS IAM
  • Managed the roadmap and operations for Identity Management, Directory Services, Access Governance, and Privileged Account/Password Management services
  • Created and integrated new applications with PingFederate for SSO (IDP/SP) using protocols such as SAML, OAuth, OpenID .
  • Regularly met with application teams to coordinate SSO integration and monitored Go-Live events for smooth deployment
  • Troubleshot SSO issues using tools like SAML Tracer and Postman, and by analyzing PingFederate and PingAccess logs for efficient issue resolution
  • Used ServiceNow as the Incident and Change Management tool, maintaining SLAs for ticket resolution
  • Created, managed, and troubleshooted instances in the AWS Cloud environment, including EC2, VPC, Route 53, Glacier, S3, and ELB
  • Worked with Active Directory and Active Roles Server for user authentication and data management
  • Utilized CI/CD tools like Jenkins to support continuous integration and deployment pipelines
  • Provided L1 and L2-level technical and administrative support to colleagues across projects and troubleshooting needs.
  • Creating ticket and escalate to concern team.
  • Linux File Systems, Process management.
  • Linux Managing User and Group Administration ,Processes administration and Management like monitoring, start/stop/kill various processes

Education

Bachelor of Engineering - Electronics and Communication Engineering

Karpaga Vinayaga College of Technology
04-2010

Skills

  • PingFederate
  • PingAccess
  • PingOne MFA
  • PingID
  • Ping Directory
  • Ping DaVinci
  • Single Sign-On (SSO)
  • Adapters
  • SAML
  • OAUTH
  • AWS
  • Postman
  • Linux
  • Unix
  • RHEL 5/6x/7
  • Ubuntu
  • CentOS 64
  • Veritas Backup Exec
  • Csc cloud
  • Service Now
  • Autosys
  • SPLUNK
  • PRTG
  • GIT
  • Jenkins
  • Ansible

Disclaimer

I hereby declare that the above details are true to the best of my knowledge and beliefs.

Timeline

IAM Engineer

Bahwan CyberTek
11.2021 - Current

IAM Engineer

CSC E-Governance
10.2019 - 08.2021

System Engineer

EMPOWER SOLUTION
05.2016 - 01.2019

Bachelor of Engineering - Electronics and Communication Engineering

Karpaga Vinayaga College of Technology
Jabastin D