Dynamic and results-oriented PAM (Privileged Access Management) Architect with a proven track record of designing, implementing,and managing robust security solutions. Skilled in collaborating with cross-functional teams to assess security requirements,architecting scalable PAM frameworks, and overseeing their successful deployment within complex IT environments. Possessingexcellent communication skills, capable of translating technical concepts into actionable insights for stakeholders at all levels.Dedicated to staying abreast of emerging trends and best practices in PAM and cybersecurity to ensure continuous improvement and proactive defense against evolving threats.I have experience in Installation, Configuration, Deployment and Maintenance of Web Application servers, Web servers, LDAP servers. IT Experience in all phases of software development life cycle (SDLC) including information technology, information security, compliance, business, technical, project management, process design. Played the role of architect and implemented the PAM applications for various clients' engagements Strong background in CyberArk administration and implementation. (e.g. EPV,PSM, PSMP, CPM, PVWA, HA, AIM, PTA, EPM). experience in technical support of CyberArk service (BAU Operations, Change implementation: Infrastructure configuration across CPM/PSM and PSMP modules). Specialties: IBM Identity Management and p6, CyberArk Privileged Account security 9.7.2 ,10x,11 x, 12x, Delinea secret server 10.6.000027, Delinea privilege Manager, Beyond Trust Password Safe. Tanium, IBM Tivoli Access Manager 6.1.1, Tivoli Federated Identity Manager 6.2. 2.
· Spearheaded the design, implementation, and maintenance of Privileged Access Management (PAM) solutions across the client's infrastructure, ensuring adherence to industry standards and regulatory requirements.
· Created tailored PSM connectors for unique remote access scenarios, enabling secure and compliant access to target systems.
· Designed, developed, and customized CyberArk Central Policy Manager (CPM) plugins to manage a variety of privileged accounts, including proprietary and third-party applications, and to support non-standard or custom-built applications, ensuring seamless password management.
· Conducted thorough evaluations of existing access controls and privileged account usage patterns to identify vulnerabilities and implement remediation measures.
· Designed and implemented automated workflows and processes for provisioning, monitoring, and revoking privileged access rights, optimizing efficiency and reducing manual errors.
· Created tailored PSM connectors for unique remote access scenarios, enabling secure and compliant access to target systems Integrated third-party applications with CyberArk through custom connectors, enhancing privileged access security across diverse environments
· Spearheaded the integration of SCIM between CyberArk and identity management systems, enhancing automated user provisioning and de-provisioning processes.
· Provided leadership and guidance on PAM best practices, industry trends, and emerging technologies, fostering a culture of continuous learning and improvement within the team.
· Worked with development teams for CyberArk vault integration with Conjur to expand the PAS to DevOps environment and CyberArk Conjur like Secure CI/CD Pipelines, Secure & authenticate containers, etc.
· Developed and delivered training programs and awareness campaigns to educate employees on PAM policies, procedures, and the importance of privileged access security.
· Developed and managed service users in CyberArk, providing necessary administrative rights to handle user management, vault management, and role assignments Senior Information Security Engineer.
• Implemented Delinea secret server and Delinea privileged manager for version 11.5.
• Responsible for the design, testing, implementation, management, and deployment of Privileged Access Management (Delinea) technology used to safeguard the Petco's information assets.
• Developed services for the enterprise in support of the corporate security policies and worked on MS patching and DR drills.
• Configured Distributed engine, & Rabbit MQ servers in Both Delinea Prod and non-prod environment. Worked with windows operation, network operations and information security teams for server developments, opening ports and implementation of
Delinea SS for smooth PAM operations.
• Administration experience of Delinea Secret Server and Delinea Privileged Manager, integration with LDAP and other authentication methods. Installed, managed, and troubleshot DNS in multiple zone environments. Troubleshot DNS integration with Active Directory. Installed, configured, and administered WINS, DHCP, IIS and WSFTP, File and Print servers.
• Installation and configuration of Delinea Connection Manager and Delinea Secret Server web password filter and DR, good understanding of policies in Delinea secret server. Have also enabled Check-in/Check-out for some of the highly volatile secrets in the environment.
• Recommended updates and improvements to existing security protocols based on industry trends and emerging threats.
• Worked with the Delinea Account Manager covering the security aspects of Delinea architecture and development.
• Built the Delinea Architecture for DR purpose(active-active). Created policies and new secret server Templates for the environment.
• Managed user accounts and permissions within organization's Active Directory environment.
• Laying out security infrastructure for client.
• Working with Applications like Cyber ark, Thycotic secret server,Tanium,Opsview(nagios).
• Provide input into architectural design of Access Control, User Entitlements, Application Credentials, User Access Policy Management
• Enhancing security related to Privileged Access Management, Lead requirement elicitation activities.
• Experience deploying Application Identity Manager components;
• Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto upload and User Access Policy Management.
• Experience in performing Privileged Access Reviews, Compliance Reporting, Access Control Processes and other associated tasks with Privileged User Management .
• Implemented CyberArk Privileged Identity management suite and session management suite for version 10.6 .and ready to implement to version 10.10. Prime in providing problem resolution to authentication issues to PVWA and directory sync problems. Worked on Cyber Ark Enterprise Password Vault and PVWA Involved in application-to-application credential management.
• Privileged Access Management (PAM) project which includes implementing CyberArk Password Vault, Web Access, Central Password Manager and Privileged Session Management. Monitored Applications and WAS performance through Tivoli Performance Viewer and tuned the system caching, queuing, JVM parameters, DB Connection Pooling. Manage the day-to-day operations of CyberArk solutions including adding and deleting accts.
• Performed Manage, Resume, Release Privileged Credential using Cyberark Privileged Management Vault Administration, configuration, troubleshooting and installation of Windows 2003, 2008, 2008 R2, 2012,2016 worked on Configurations including AD integration and Management of Cyberark.
• Successfully upgraded Cyberark PIM suite from v8 to v8.6, Worked with Cyberark utilities like password upload, PAR explicate, PACLI and PAR client. Installed and Configured IBM Web Sphere Application Server5.0 on Solaris. Installed, configured, and administered Tivoli Access and Identity Manager. Automated Identity Management tasks such as user provisioning and application access based on each user's role within our organization
• Knowledge in setting up multi factor authentication (RSA, RADIUS, SAML)
• Knowledge of one or more Identity and Access Management (IAM) tools such as Oracle Identity Manager
• Experience with auto discovery and automatic password management Skilled in Active Directory concepts, including users, computers, groups, policies·
• Solid understanding of protocols, services, and traffic flows for authentication
• Implemented CyberArk Privileged Identity management suite and session management suite for version 9.7. Prime in providing problem resolution to authentication issues to PVWA and directory sync problems. Worked on Cyber Ark Enterprise Password Vault and PVWA Involved in application to application credential management.
• Experienced in day to day operational support in adding and deleting accounts, applying policies, assigning safes, synchronizing failed accounts, Password rotations. Managing, monitoring and Supporting systems hardware, software, and applications. Resolved CyberArk issues in CPM communicate with host to reconcile credentials
• Experience in Implementation, installation and maintenance of CyberArk 9.6 & 9.8 PIM Suite, Experience in implementing application account management by CyberArk on Windows, Data bases and Linux servers using AIM module.
• Administration experience of Cyber Ark vault with Safe creation, integration with LDAP and other authentication methods. Installed, managed and troubleshot DNS in multiple zone environments. Troubleshot DNS integration with Active Directory. Installed, configured and administered WINS, DHCP, IIS and WSFTP, File and Print servers
• Ability to install, configure and support identity and access management related tools such CA SiteMinder, CA Identity Manager (IDM), and Oracle Internet Directory (OID). Created the Federation service between SiteMinder federated web services to Ping federate for classic migration of applications that are SAML and WS-FED based applications.
• Installed, configured, and integrated Web servers (plug-in file), SiteMinder agents and LDAP user directory with WebLogic Server V10. Experienced in installing and configuring Siteminder Policy Server and Web Agents on Solaris, Red Hat Linux and Windows environment.
• Patching & Monitoring Vault, Central Password Manager, Two-factor authentication, Privileged Session Manager, Password Vault Web Access servers and services.
• Creating PAS solution architecture and implementation of the Vault, CPM, PSM, PVWA, AIM, OPM, PSMP and PTA.
• Creating Master policy and Safe.
• Onboarding of centralized authenticated Unix and Windows accounts into PAS.
• Onboarding of accounts using PVWA, Password Upload Utility, Account Discovery, Rest API and PACLI.
• Implemented DR environment and successfully carried out Failback and Failover meeting the Business Continuity as per the security standards and best practice.
• Connection component development using AutoIT script
• CPM Plug-in customization and development using process and prompts files
• Managing account lifecycle of CyberArk Local and Active Directory users and groups.
• Checking and rectifying the errors in log file
• Configuring workflow for accounts by enabling dual control
• Multiple CPM, PSM, PVWA installation.
• Implemented use cases of Credentials provider (CP), Central Credentials Provider (CCP) and Application server credentials provider (ASCP)
• Successfully on-boarded and managed Windows Scheduled Task Accounts in PAS.
• Successfully on-boarded and managed Windows Service Accounts in PAS.
• Consulted with clients to assess their authentication and access management requirements, providing tailored solutions to streamline user authentication processes and enhance security through Single Sign-On (SSO) implementations.
• Conducted in-depth analysis of client environments, including existing authentication systems, user directories, and application landscapes, to identify integration points and develop comprehensive SSO strategies.
• Designed and implemented SSO solutions using industry-leading identity and access management (IAM) platforms such as Okta,Azure Active Directory, and Ping Identity, ensuring seamless integration with client infrastructure and applications.
• Led SSO deployment projects from inception to completion, collaborating closely with client stakeholders, IT teams, and third-party vendors to define project scope, timelines, and deliverables.
• Monitoring and analyzing all relevant cyber security event data and other information sources for suspicious network traffic, attack indicators and potential security breaches.
• Support customer communications to coordinate security posture and application of WAF policies.
• Performing daily intrusion detection and intrusion prevention analysis/monitoring in order to generate technical and executive summary reports.
• Determining true threats, false positives, and mitigating them. Perform deep packet analysis to identify DDoS/Cyber attack vector and apply mitigation strategy.
• Proactive research and identification of security anomalies. Create and implement custom web application firewall rules.
• Provide guidance and support to SOC analysts in analyzing security incidents. Perform deep level packet analysis.
editdeletemove