Design, develop, test, implement, integrate IAM systems solutions like PAM, Provisioning workflow engine and Customer IAM tools
Work on Risk Management, Information Security strategy, technologies and tools, identity lifecycle management of user identities, including onboarding, offboarding, transfers, ensuring adherence to security policies and compliance requirements, access issues troubleshooting
Worked on drive management and security, Active directory Operations, Workflow Creation, Desktop Services, Enterprise information management for end users
Worked on security incident response related to IAM security incidents, investigating and remediating security breaches or unauthorized access attempts or suspicious activities, security applications/tools administration support
Detect and respond to security incidents
Review and triage information security alerts, provide analysis, determine, and track remediation, monitor logs on daily, weekly, monthly bases and escalate as appropriate
Provide technical leadership for the vulnerability management program, ensure authorized access by investigating improper access; revoking access; reporting violations; monitors information requests; recommend improvements, maintained SLA with tickets and service requests to complete tasks before deadlines
Manage, update, and implement the Info-security policy, procedures, standards, and guidelines to ensure information assets and related updates are secure
Provide training on bulk scripting
Customizing and creating alerts, reporting options for auditing, incident response, compliance purposes, creation of custom parsers, use cases, and extensions to adapt to specific security needs with QRadar
Work on documenting IAM processes, procedures, and policies, generating reports on access activities, development, and implementation of identity governance strategies, including defining and enforcing access controls, segregation of duties and least privilege principles
Work with internal and external team to update and develop policies in Microsoft Azure
Collaborating with stakeholders, including clients, IT administrators, security teams, and application owners, to align IAM initiatives with their business objectives.
Cloud /System Admin
Optimal Answers
02.2017 - 02.2018
Managed active directory responsibilities using Azure, Created and Migrated virtual machines in Microsoft azure
Security threat detection and countermeasures, protect from enumeration and scanning
Cross forest/domain migration of users for acquisition and removal from the enterprise
Replicated machines to Resource Manager storage accounts using Azure portals to make it available in the nearest datacenter
Deployed and monitored azure web apps and worked on installations on virtual machine
Worked on creating and validating the Power BI reports for optimal reports connecting it to SQL Azure
Migrated the entire infrastructure from Optimal desktop to Azure
Deployed their applications on Azure IaaS and configured other required component DNS service, database, load testing of their application
Created databases in SQL Azure, migrated databases from SQL Server 2016 to SQL azure, stored on elastic pool and given permissions to specific users
Created Databases on SQL Server and managed them from both SQL Server Management Studio and Optimal web page
Worked on Setting up Connection Strings, connecting SQL Server AZURE Databases from Installed SQL Server Management Studio (SSMS) for Developers
Responsible for creation, setup and maintenance of new users and assigning user accounts and grant permissions to shared resources
Monitored the performance of different resources including physical and virtual machines using log analytics
Worked on configuration of VM automatic shutdown and restart using PowerShell scripting
Migrate VMWare VM servers to Azure and automated VM deployment through scripting.
Active Directory Specialist
Spica Computers LLC
09.2016 - 01.2017
Worked on Domain Controller Management, Promotion of the DC, Demotion of the DC, upgrading to higher level and configure new domain controller via change controller procedures
Group policy Management like Cleanup of the stale GPO's and Deploying the GPO's
Worked on AD Hardening project like Cleaning Impersonation Accounts, Upgrading Domain controller
Designed Sysvol migration from FRS to DFSR in production environments
Build application servers based on the business requirements and assisted various test teams in preproduction environments to validate the application functionality
Provided Tier-2 Support for production environments and trouble shoot critical issues at minimal business impact
Worked on Active Directory design and support (GPOs, AD Schema, OUs, LDAP, Sites, Replication, etc.) Experience in Migrating Group and Exception Policies from one domain to another domain in AD forest using Quest Migration Manager Tool for Active Directory
Experience in creating Service Accounts to have Log on as a Batch and Service Jobs, Create and Link Exception policy to windows Application Servers
Proficiency in VMware
Installation and monitoring Virtual environments with ESX 4.x/5.x Servers and Virtual Center
Used VMware for testing various applications on different operating system
Assisted in designing, implementing, and evaluating applications, systems and utilities relevant to Active Directory services
Experience in Migrating Users, Groups, Workstations, and Application window Servers from Source Domain to Target Administration of user Accounts, Groups, Resources, Security, Backup strategies in window Servers.
Education
Masters of Business Administration in Cybersecurity -
NEW ENGLAND COLLEGE
Henniker, New Hampshire
Masters in Electrical Engineering -
UNIVERSITY OF TEXAS AT SAN ANTONIO
San Antonio, Texas
Bachelor of Science in Electronics and Communication Engineering -