Summary
Overview
Work History
Education
Skills
Websites
Timeline
Generic

Sree Rama Sagar Pithani

CHANTILLY,VA

Summary

Highly-skilled Programmer with 14 plus years in software design, development and integration. Advanced knowledge of Java, AWS and Identity Manager programming languages. Logical and professional with excellent problem-solving skills.

Overview

15
15
years of professional experience

Work History

Senior Software Consultant

CGI Federal
04.2020 - Current
  • Company Overview: Client: USPTO
  • Led the successful upgrade of the application from Spring Boot 2.x to Spring Boot 3.4.4, ensuring compatibility with the latest Java 17+ and library dependencies
  • Conducted thorough testing and debugging to address any compatibility issues, improving application performance and security
  • Updated and refactored legacy code to adhere to new Spring Boot 3.x features and deprecations, enhancing overall system maintainability and efficiency
  • Implemented new configuration and annotation-based approaches introduced in Spring Boot 3.4.4 to streamline application setup and optimize resource management
  • Enhanced build pipelines by upgrading related tools such as Maven, ensuring smooth integration with the Spring Boot 3.4.4 framework
  • Collaborated with cross-functional teams to ensure seamless transition and reduce downtime during the upgrade process
  • Identified and resolved deprecated or incompatible libraries, enabling full leverage of new Spring Boot features without compromising system stability
  • Optimized the application’s startup time by leveraging new Spring Boot 3.x optimizations and configurations for better performance
  • Reviewed Spring Boot 3.4.4 migration guides and documentation, ensuring adherence to best practices and standards in the upgraded application
  • Migrated all microservices from oracle database to Postgres database
  • Led the successful migration of backend microservices from Oracle Database to PostgreSQL, ensuring minimal downtime and seamless service continuity
  • Designed and implemented data migration strategies, including schema conversion, data transformation, and integrity validation to ensure smooth transition without data loss
  • Collaborated with cross-functional teams to identify and resolve database-related issues during the migration process, including handling data type discrepancies and optimizing SQL queries for PostgreSQL
  • Refactored Java-based microservices to integrate with PostgreSQL, modifying data access layers using JPA/Hibernate and ensuring efficient handling of PostgreSQL-specific features
  • Enhanced microservice scalability and fault tolerance by leveraging PostgreSQL’s advanced features such as JSONB, full-text search, and table partitioning
  • Collaborated with DevOps teams to update CI/CD pipelines, ensuring automated database migration and deployment processes for smooth integration with PostgreSQL
  • Conducted comprehensive testing and data verification post-migration, including performance benchmarking and load testing, ensuring system stability and data integrity
  • Trained team members on PostgreSQL best practices and provided support in troubleshooting database issues post-migration
  • Developed a reusable Java library to implement OAuth 2.0 authentication and authorization, enabling seamless integration of OAuth security across multiple microservices
  • Designed the library to support various OAuth flows, including Authorization Code Flow, Client Credentials Flow, and Implicit Flow, ensuring flexibility for different service authentication needs
  • Implemented JWT (JSON Web Token) generation and validation within the library, enhancing security and enabling stateless authentication across microservices
  • Integrated the OAuth library with identity providers such as Auth0, Okta, streamlining authentication and reducing dependency on multiple third-party integrations
  • Automated token refresh mechanisms within the library, ensuring uninterrupted service access by securely refreshing OAuth tokens when they expire
  • Leveraged Spring Security and Spring Boot to simplify OAuth integration, ensuring the library worked seamlessly with existing enterprise microservices architecture
  • Successfully migrated source code from SVN to GitHub, ensuring smooth transition by re-structuring repositories, preserving commit history, and minimizing downtime
  • Setup the AWS code pipeline for all micro services creating build spec, task definition, appspec and report group configuration
  • Set up and configured an AWS Code Pipeline to automate the build, test, and deployment process for Java microservices, ensuring efficient and streamlined CI/CD workflows
  • Integrated AWS Secrets Manager into the pipeline to securely manage and inject sensitive configuration data (e.g., database credentials, API keys) into Java microservices during deployment
  • Utilized AWS Code Build for building and testing Java microservices, ensuring code quality and reducing manual intervention in the development process
  • Configured AWS IAM roles and policies to ensure secure access to Secrets Manager and other AWS resources during the pipeline execution, maintaining the principle of least privilege
  • Leveraged AWS Code Deploy to automate the deployment of Java microservices to Amazon ECS and EC2 instances, ensuring seamless rollouts and blue/green deployment strategies
  • Fixed all the libraries vulnerabilities using Nexus IQ findings
  • Using this IQ findings fixed all the log4j security issues
  • Worked with Oracle PL/SQL including synonyms, database links, views, stored procedures, and triggers and materialized views
  • Worked with Junit for setting up the test framework and writing unit test cases
  • Identified and remediated security vulnerabilities in project dependencies by using Nexus IQ to scan and enforce compliance with security standards
  • Upgraded vulnerable libraries and patched known security flaws in dependencies, ensuring compliance with company and industry security policies
  • Traced issues through server logs using Splunk
  • Conducted regular SonarQube scans to identify and resolve code quality issues, reducing technical debt and enhancing maintainability
  • Addressed SonarQube findings related to code smells, security hotspots, and potential bugs, improving overall code quality and reliability
  • Increased JUnit test coverage by 80% through writing comprehensive unit tests, achieving a code coverage of 80% for key Java microservices
  • Integrated JUnit tests into the build pipeline to enforce automated test execution and ensure that all code changes are validated before deployment
  • Configured build scripts and maintained the automated build process using Jenkins and Maven
  • Worked on Subversion (SVN) for source code version control, including branching and tagging the code
  • Used the agile Scrum methodology for development activities on this project
  • Tracked development tasks under CA Central (Rally)
  • Client: USPTO

Identity Manager SME & Senior Software Consultant

CGI Federal
02.2020 - 04.2022
  • Company Overview: Client: USPTO
  • Install and configured SAILPOINT on tomcat server with MYSQL database
  • Applied 7.3p3 patch for the existing Sail point
  • Configured Applications like AD, CEDR, Probaris and CLC in SAILPOINT using AD/LDAP connector and JDBC Connectors
  • Configured CAPAM application using SCIM 2.0 connector
  • Configured SSO Login for SAILPOINT login
  • Developed SAILPOINT PLUGIN to create the web services for IDENTITY, CRED, PRIV, TRUST and Behave MUR reports to pull data from SAILPOINT Applications and Send the data to the Department Of Commerce SAILPOINT
  • Worked on creating workflow for joiner process to on board USPTO employees and Contractors
  • Client: USPTO

Senior Software Consultant

CGI Federal
11.2019 - 02.2020
  • Company Overview: Client: USPTO
  • Member of backend team for data ingestion module
  • Worked on processing input source files for processing and storing in Cassandra
  • Extensively worked on functional programming, lambda expressions, functional interfaces using java 8 and other respective features
  • Extensively used Scala, Spark API for loading large amount of data sets to Cassandra
  • Implement spark jobs for writing data to AWS S3
  • Experience in optimizing the SparkSQL joins to support new business features
  • Storing understand in spark sql catalyst optimizer & off heap encoders
  • Experienced in performance tuning of Spark Applications increasing level of parallelism and memory tuning
  • Expertise in working with NoSQL database Cassandra
  • Strong understanding in the internal concepts of columnar data store
  • Implemented data backup strategies for the data in the Cassandra cluster
  • Worked on Cassandra Data modelling, NoSql Architecture, DSE Cassandra Database administration- Keyspace creation, Table creation, Secondary index and replication factor
  • Worked with scrum masters in agile methodology
  • Used rally for tracking development status
  • Worked in continuous integration, continuous deployment phase of the project
  • Extensively used subversion, GIT
  • Worked with product owners, team leads in a test driven agile development
  • Active team player, work across with the team in resolving the integration issues
  • Leading and guiding junior developers in the team
  • Client: USPTO

Senior Software Consultant

CGI Federal
02.2015 - 11.2019
  • Company Overview: Client: USPTO
  • Served as a member of the MyUSPTO back-end development team and as the team’s Oracle OIM/OAM subject matter expert
  • In addition to developing web services to implement MyUSPTO features and OAM/OIM integration, worked with the USPTO RBAC team to configure RBAC servers including OAM 11g, OAAM and OIM 11g (Oracle IAM suite)
  • Developed the MyUSPTO web application using Java/JEE, Spring 4.x frameworks and Spring MVC design patterns
  • Used object oriented concepts while developing in Java
  • Provided Oracle Identity Management (OIM) expertise to the team
  • Configured host identifiers for the MyUSPTO application in OAM
  • Configured application resources for the MyUSPTO application in OAM, including configuring proxy configurations and URL redirects
  • Configured authentication and authorization polices in the OAM console
  • Developed RESTful services using Oracle API’s for programmatic login and logout
  • Developed WAM-OIM services using OIM APIs to connect to the OIM client, create and update users, change passwords, to lock/unlock accounts, and to search in OIM
  • Developed RESTful services to connect to Oracle Unified Directory (OUD) and retrieve the lock attributes for an account
  • Developed authentication/authorization web services for Role Based Access Control (RBAC)
  • Configured Oracle Adaptive Access Manager (OAAM) in the development environment and supported the RBAC team with the configuration of higher environments
  • Developed an OAM client and OAAM client services to connect to OAM and OAAM
  • Developed RESTful web services to create, update and delete security questions using OAAM APIs
  • Participated in implementing the MyUSPTO single sign on feature and integrating with other applications
  • Developed services to retrieve the activity log from RBAC views using Hibernate 4.0
  • Developed Search Services for FPNG to bulk read user accounts from OAM and IP database
  • Developed code to change the user login in OIM and the MyUSPTO database
  • Developed services supporting widgets for users to add to their MyUSPTO homepage dashboards, using the Java Futures concept for fast response times
  • Developed the backend services for the Trademark Application Docket widget
  • Developed the backend services for the Trademark Post-Registration Docket widget
  • Developed the backend services for the Trademark Official Gazette widget
  • Developed XML parsing code for patent widgets
  • Supported the project’s deployment processes, including deployments to the development and test environments and the project’s monthly Production deployments
  • Deployed to WebLogic servers and JBoss EAP servers using builds created with Jenkins
  • Used Subversion (SVN) for source code version control, including branching and tagging the code
  • Worked with Junit for setting up the test framework and writing unit test cases
  • Analyzed SONAR automated code review reports and addressed findings
  • Traced issues through server logs using Splunk
  • Configured build scripts and maintained the automated build process using Jenkins and Maven
  • Monitored server performance using AppDynamics
  • Worked with Unix to access and execute operations on application servers
  • Worked with Oracle PL/SQL including synonyms, database links, views, stored procedures, triggers and materialized views
  • Used the agile Scrum methodology for development activities on this project
  • Tracked development tasks under CA Central (Rally)
  • Client: USPTO

Sr. Security Engineer

Elicere, Inc.
12.2012 - 02.2015
  • Company Overview: Client: FDIC
  • Led the transition from the Sun Identity Manager platform to the Oracle Identity Manager platform at FDIC
  • Installed and configured the new OIM software for FDIC’s IAMS authentication system
  • Configured Sun Identity Manager 8.1 with Oracle as its repository
  • Researched and presented a decision analysis and estimation to replace Sun Identity Manager with Oracle Identity Manager (OIM) at FDIC
  • Installed and configured OIM 11g on a WebLogic server, including: Installation of the generic OIM connectors for LDAP, database and AD, Configuration of LDAP and database connectors, Configuration of the reconciliation policy for the database and LDAP
  • Installed and configured OAM 11g on a WebLogic server, including: Development of custom web services to get the headers (such as user id, first name, last name) from OAM, Configuration of password policy and custom authentication policy for users through the OAM console
  • Developed custom workflows and forms in Java, Spring frameworks and Spring MVC design patterns, XML and SOA for several IAMS features and releases: provision users with basic and full access, Unix access requests, Network access requests, Reinstate a separated user, Create a mainframe (ACF2) account for an examiner user
  • Developed web applications (custom workflows and forms) for extranet user ETS application access
  • Developed for cross-browser support, including current and recent previous versions of Internet Explorer, Chrome and Firefox
  • Developed and modified custom Java classes for Unix access requests, fetching data from a SQL database
  • Used object oriented concepts while developing in Java
  • Defined new table structures including entity relationships between new and existing database structures
  • Developed custom Oracle SQL queries, LDAP/OUD queries and Oracle PL/SQL (stored procedures, triggers) for production support
  • Wrote web services to read attributes from the Sun ONE Directory Server (later renamed Oracle Unified Directory or OUD)
  • Developed scripts to automate the build process using Ant (similar to Maven)
  • Used Subversion (SVN) for source code version control, including branching and tagging the code
  • Client: FDIC

Sr. Security Engineer

Genentech
02.2011 - 12.2012
  • Supported Genentech’s identity management systems, including workflow and web application development using Unix scripts, Java and XML
  • Configured Sun Identity Manager 7.1 with Oracle as its repository
  • Provided 24/7 production support: Solved issues regarding password synchronization, user provisioning failures, and external business partner provisioning
  • Resolved RBAC issues, VPN connection issues, and user access issues
  • Developed custom Oracle SQL queries and LDAP/OUD queries for production support
  • Participated on agile Scrum teams for workflow and web application development
  • Developed Unix shell scripts for day-to-day automated tasks and to resolve data issues
  • Developed custom workflows and forms for the CHRIS project, which merged two identity manager tools, Roche’s Enroll and Genentech’s Sun IDM
  • Created database tables and defined entity relationships for loading data from HR systems into CHRIS
  • Developed custom workflows and forms using Java, XML and SOAP for updating Genentech and Roche users, managing vendors through IDM, and onboarding Clarity users
  • Used object oriented concepts while developing in Java
  • Developed and modified web applications (custom Java classes) for provisioning user workflows
  • Developed for cross-browser support, including current and recent previous versions of Internet Explorer and Safari
  • Configured resources on CA SiteMinder for single sign on capability, including defining policies for authentication and authorization
  • Configured URL redirects and reverse proxy settings in web servers using CA SiteMinder
  • Upgraded Sun IDM 7.1 to Sun IDM 8.1
  • Developed scripts to automate the build process using Ant (similar to Maven)
  • Used Subversion (SVN) for source code version control, including branching and tagging the code

Sr. System Developer

2020 Company
03.2010 - 02.2011
  • Company Overview: Client: CMS
  • Supported CMS’s QIMS identity management system
  • Developed custom workflows using Java and XML
  • Configured Sun Identity Manager 8.1 with Oracle as its repository
  • Developed custom workflows and forms using Java and XML for four features of the QIMS identity management and authentication system: Change End User Manager Request – QIMS User, Change End User Manager Request – Security Official, QIMS User Updates Profile, and Update QIMS User – Completed by Security Official
  • Used object oriented concepts while developing in Java
  • Fixed defects for the Anonymous Enrollment use Case and for Password Policy requirements
  • Developed custom email notifications to appropriate organization levels for approvals during the self-service process
  • Deployed war files on WebSphere 6.1 servers
  • Configured Anakam.TFA for two factor authentication
  • Client: CMS

Sun IDM Developer

Rockwell Automation
10.2009 - 03.2010
  • Supported Rockwell’s identity management system, build using the Sun Identity Manager platform
  • Developed custom workflows using Java and XML
  • Configured Sun Identity Manager 7.1 on a Sun ONE application server with Oracle as its repository
  • Developed stored procedures and triggers in Oracle PL/SQL to generate ROCKID
  • Populated ROCKID for new users in AD, LDAP/OUD, Prowatch, SAP and Domino resources
  • Developed custom workflows and forms for create service accounts, modify/terminate service accounts and recertify service accounts features
  • Used object oriented concepts while developing in Java
  • Prepared technical documents, RFC’s for pre-implementation test plans, post-implementation test plans and back out plans

Education

Master of Science - Computer Engineering

International Technological University
San Jose, California
05-2009

Skills

  • Highly skilled Senior Java Developer with extensive experience in designing, developing, And deploying enterprise-level applications using Java And Spring Boot Over 15 years of expertise in building robust, scalable, and high-performance microservices architectures Proficient in leveraging Spring Boot for creating RESTful APIs, integrating with various databases (SQL/NoSQL), and implementing best practices in DevOps, CI/CD, and cloud technologies Expertise in leveraging Amazon Web Services (AWS) to build cloud-based solutions, optimize infrastructure, and implement best practices for cost-effective and resilient architectures Proven track record in using AWS services such as EC2, S3, Lambda, RDS, and Cloud Formation to enhance system performance and scalability
  • With 10 years of hands-on experience in identity And access management (IAM) tools such as Okta, Active Directory, And LDAP, I have a deep understanding of securing user identities, integrating authentication protocols like OAuth20, SAML, and OpenID, and implementing role-based access control (RBAC) Adept at architecting and implementing IAM solutions in complex enterprise environments, ensuring regulatory compliance and safeguarding sensitive data
  • My passion for problem-solving and innovation drives my ability to lead teams, mentor junior developers, and deliver solutions that meet client and business needs efficiently

Timeline

Senior Software Consultant

CGI Federal
04.2020 - Current

Identity Manager SME & Senior Software Consultant

CGI Federal
02.2020 - 04.2022

Senior Software Consultant

CGI Federal
11.2019 - 02.2020

Senior Software Consultant

CGI Federal
02.2015 - 11.2019

Sr. Security Engineer

Elicere, Inc.
12.2012 - 02.2015

Sr. Security Engineer

Genentech
02.2011 - 12.2012

Sr. System Developer

2020 Company
03.2010 - 02.2011

Sun IDM Developer

Rockwell Automation
10.2009 - 03.2010

Master of Science - Computer Engineering

International Technological University
Sree Rama Sagar Pithani