Identity and Access Management (IAM) professional with 8+ years of experience designing and implementing enterprise-grade identity solutions that achieve the optimal balance of security, compliance, and seamless user experience. Specializing in SailPoint Identity Security Cloud (ISC), IdentityNow (IDN), and IdentityIQ (IIQ), I have architected and integrated IAM platforms across complex hybrid and multi-cloud environments, connecting with Azure AD, Okta, Workday, SAP, ServiceNow, and other mission-critical enterprise systems.
My expertise also includes automating the full identity lifecycle (joiner/mover/leaver processes), enforcing governance with Role-Based Access Control (RBAC) and Segregation of Duties (SoD), and delivering compliance-ready architectures that meet stringent regulatory frameworks such as SOX, PCI-DSS, NERC-CIP, and FFIEC.
Responsibilities and Achievements:
• Automated lifecycle management for 50+ Okta-integrated platforms — including internal applications, B2B portals, and field service tools — using SailPoint IIQ Rules (BeanShell/Java), Workflows, and REST-based integrations to eliminate manual provisioning and reduce fulfillment time. Defined and implemented role-based access control (RBAC) for 100+ business units, including Corporate IT, Network Engineering, Customer Service, Retail Operations, and Media divisions — mapping entitlements from Siebel CRM, Amdocs, SAP, Oracle Databases, and UNIX/Linux platforms into IIQ roles.
• Designed and executed compliance certification campaigns within IIQ for high-risk systems, such as network management platforms, ERP, HR systems, and customer data repositories — implementing automated approval, escalation, and revocation workflows, with policy violation tracking. Built and optimized aggregation and correlation jobs in IIQ to synchronize identity and entitlement data from multiple authoritative sources (PeopleSoft HRMS, Oracle HCM, Active Directory, Azure AD, and telecom operational databases).
• Developed dashboards, reporting frameworks, and compliance audit outputs using SailPoint reporting functions, SQL Server Reporting Services (SSRS), and SQL Server Analysis Services (SSAS) for SOX and internal security audits. Created and enforced Segregation of Duties (SoD) policies within IIQ, especially in ERP and finance modules, to prevent fraudulent billing, unauthorized network configuration changes, and customer data misuse—leveraging access simulation to validate changes before deployment.
• Partnered with Verizon’s Global Security, Audit, and Compliance teams to ensure IIQ governance aligned with regulatory controls such as CPNI, PCI-DSS, HIPAA, and data retention mandates for telecom and customer data systems.
Executed application onboarding into IIQ, including requirements gathering, authoritative source identification, entitlement cataloging, connector configuration, attribute mapping, provisioning policy setup, and Access Request Center (ARC) implementation for self-service access requests.
Responsibilities and Achievements:
Responsibilities and Achievements: • Collaborated with Fannie Mae Development, QA, and Release Management teams to design and implement secure, highly available CI/CD pipelines for deploying Java/Spring Boot, .NET Core, and Node.js-based enterprise applications into AWS, Kubernetes (EKS), and on-premises OpenShift clusters. Worked extensively with Fannie Mae internal platforms such as Loan Delivery (LD), Collateral Underwriter (CU), EarlyCheck, and Desktop Underwriter (DU), ensuring their integration pipelines were automated, monitored, and met security/compliance requirements.
• Performed advanced root cause analysis (RCA) for complex production incidents within Fannie Mae’s highly regulated mortgage-finance ecosystem, leveraging centralized logging (ELK Stack – Elasticsearch, Logstash, Kibana), Dynatrace, Prometheus, and Splunk to identify bottlenecks and compliance risks.
Architected and configured monitoring and alerting systems using Graphite, Graf, Prometheus, and integrated alerting with PagerDuty for proactive incident management aligned with Fannie Mae InfoSec SLA requirements.
• Designed and implemented containerized microservices using Docker with multi-stage builds, orchestrated via Kubernetes (Helm charts, Custom Resource Definitions) for multiple non-prod and prod environments; ensured namespace isolation and enforced Pod Security Policies to comply with Fannie Mae’s NIST cybersecurity framework. Automated build, test, and deployment processes using GitLab CI/CD, Jenkins pipelines, and Maven/Gradle; integrated SonarQube for code quality analysis, Fortify, and Black Duck for static application security testing (SAST/DAST) to meet mortgage industry compliance standards.
• Administered Elastic Cloud on Kubernetes (ECK) clusters for log aggregation, performance analysis, and compliance audits; fine-tuned Logstash pipelines, and configured Elasticsearch index lifecycle management for optimized storage usage. Managed deployments and upgrades for WS components, APIs, and microservices across dev, QA, UAT, Performance, Disaster Recovery, and Production environments, ensuring rollback strategies and zero-downtime releases via blue/green and canary deployment models.