Highly-skilled Programmer with 14 plus years in software design, development and integration. Advanced knowledge of Java, AWS and Identity Manager programming languages. Logical and professional with excellent problem-solving skills.
Overview
15
15
years of professional experience
Work History
Senior Software Consultant
CGI Federal
04.2020 - Current
Company Overview: Client: USPTO
Led the successful upgrade of the application from Spring Boot 2.x to Spring Boot 3.4.4, ensuring compatibility with the latest Java 17+ and library dependencies
Conducted thorough testing and debugging to address any compatibility issues, improving application performance and security
Updated and refactored legacy code to adhere to new Spring Boot 3.x features and deprecations, enhancing overall system maintainability and efficiency
Implemented new configuration and annotation-based approaches introduced in Spring Boot 3.4.4 to streamline application setup and optimize resource management
Enhanced build pipelines by upgrading related tools such as Maven, ensuring smooth integration with the Spring Boot 3.4.4 framework
Collaborated with cross-functional teams to ensure seamless transition and reduce downtime during the upgrade process
Identified and resolved deprecated or incompatible libraries, enabling full leverage of new Spring Boot features without compromising system stability
Optimized the application’s startup time by leveraging new Spring Boot 3.x optimizations and configurations for better performance
Reviewed Spring Boot 3.4.4 migration guides and documentation, ensuring adherence to best practices and standards in the upgraded application
Migrated all microservices from oracle database to Postgres database
Led the successful migration of backend microservices from Oracle Database to PostgreSQL, ensuring minimal downtime and seamless service continuity
Designed and implemented data migration strategies, including schema conversion, data transformation, and integrity validation to ensure smooth transition without data loss
Collaborated with cross-functional teams to identify and resolve database-related issues during the migration process, including handling data type discrepancies and optimizing SQL queries for PostgreSQL
Refactored Java-based microservices to integrate with PostgreSQL, modifying data access layers using JPA/Hibernate and ensuring efficient handling of PostgreSQL-specific features
Enhanced microservice scalability and fault tolerance by leveraging PostgreSQL’s advanced features such as JSONB, full-text search, and table partitioning
Collaborated with DevOps teams to update CI/CD pipelines, ensuring automated database migration and deployment processes for smooth integration with PostgreSQL
Conducted comprehensive testing and data verification post-migration, including performance benchmarking and load testing, ensuring system stability and data integrity
Trained team members on PostgreSQL best practices and provided support in troubleshooting database issues post-migration
Developed a reusable Java library to implement OAuth 2.0 authentication and authorization, enabling seamless integration of OAuth security across multiple microservices
Designed the library to support various OAuth flows, including Authorization Code Flow, Client Credentials Flow, and Implicit Flow, ensuring flexibility for different service authentication needs
Implemented JWT (JSON Web Token) generation and validation within the library, enhancing security and enabling stateless authentication across microservices
Integrated the OAuth library with identity providers such as Auth0, Okta, streamlining authentication and reducing dependency on multiple third-party integrations
Automated token refresh mechanisms within the library, ensuring uninterrupted service access by securely refreshing OAuth tokens when they expire
Leveraged Spring Security and Spring Boot to simplify OAuth integration, ensuring the library worked seamlessly with existing enterprise microservices architecture
Successfully migrated source code from SVN to GitHub, ensuring smooth transition by re-structuring repositories, preserving commit history, and minimizing downtime
Setup the AWS code pipeline for all micro services creating build spec, task definition, appspec and report group configuration
Set up and configured an AWS Code Pipeline to automate the build, test, and deployment process for Java microservices, ensuring efficient and streamlined CI/CD workflows
Integrated AWS Secrets Manager into the pipeline to securely manage and inject sensitive configuration data (e.g., database credentials, API keys) into Java microservices during deployment
Utilized AWS Code Build for building and testing Java microservices, ensuring code quality and reducing manual intervention in the development process
Configured AWS IAM roles and policies to ensure secure access to Secrets Manager and other AWS resources during the pipeline execution, maintaining the principle of least privilege
Leveraged AWS Code Deploy to automate the deployment of Java microservices to Amazon ECS and EC2 instances, ensuring seamless rollouts and blue/green deployment strategies
Fixed all the libraries vulnerabilities using Nexus IQ findings
Using this IQ findings fixed all the log4j security issues
Worked with Oracle PL/SQL including synonyms, database links, views, stored procedures, and triggers and materialized views
Worked with Junit for setting up the test framework and writing unit test cases
Identified and remediated security vulnerabilities in project dependencies by using Nexus IQ to scan and enforce compliance with security standards
Upgraded vulnerable libraries and patched known security flaws in dependencies, ensuring compliance with company and industry security policies
Traced issues through server logs using Splunk
Conducted regular SonarQube scans to identify and resolve code quality issues, reducing technical debt and enhancing maintainability
Addressed SonarQube findings related to code smells, security hotspots, and potential bugs, improving overall code quality and reliability
Increased JUnit test coverage by 80% through writing comprehensive unit tests, achieving a code coverage of 80% for key Java microservices
Integrated JUnit tests into the build pipeline to enforce automated test execution and ensure that all code changes are validated before deployment
Configured build scripts and maintained the automated build process using Jenkins and Maven
Worked on Subversion (SVN) for source code version control, including branching and tagging the code
Used the agile Scrum methodology for development activities on this project
Tracked development tasks under CA Central (Rally)
Client: USPTO
Identity Manager SME & Senior Software Consultant
CGI Federal
02.2020 - 04.2022
Company Overview: Client: USPTO
Install and configured SAILPOINT on tomcat server with MYSQL database
Applied 7.3p3 patch for the existing Sail point
Configured Applications like AD, CEDR, Probaris and CLC in SAILPOINT using AD/LDAP connector and JDBC Connectors
Configured CAPAM application using SCIM 2.0 connector
Configured SSO Login for SAILPOINT login
Developed SAILPOINT PLUGIN to create the web services for IDENTITY, CRED, PRIV, TRUST and Behave MUR reports to pull data from SAILPOINT Applications and Send the data to the Department Of Commerce SAILPOINT
Worked on creating workflow for joiner process to on board USPTO employees and Contractors
Client: USPTO
Senior Software Consultant
CGI Federal
11.2019 - 02.2020
Company Overview: Client: USPTO
Member of backend team for data ingestion module
Worked on processing input source files for processing and storing in Cassandra
Extensively worked on functional programming, lambda expressions, functional interfaces using java 8 and other respective features
Extensively used Scala, Spark API for loading large amount of data sets to Cassandra
Implement spark jobs for writing data to AWS S3
Experience in optimizing the SparkSQL joins to support new business features
Storing understand in spark sql catalyst optimizer & off heap encoders
Experienced in performance tuning of Spark Applications increasing level of parallelism and memory tuning
Expertise in working with NoSQL database Cassandra
Strong understanding in the internal concepts of columnar data store
Implemented data backup strategies for the data in the Cassandra cluster
Worked on Cassandra Data modelling, NoSql Architecture, DSE Cassandra Database administration- Keyspace creation, Table creation, Secondary index and replication factor
Worked with scrum masters in agile methodology
Used rally for tracking development status
Worked in continuous integration, continuous deployment phase of the project
Extensively used subversion, GIT
Worked with product owners, team leads in a test driven agile development
Active team player, work across with the team in resolving the integration issues
Leading and guiding junior developers in the team
Client: USPTO
Senior Software Consultant
CGI Federal
02.2015 - 11.2019
Company Overview: Client: USPTO
Served as a member of the MyUSPTO back-end development team and as the team’s Oracle OIM/OAM subject matter expert
In addition to developing web services to implement MyUSPTO features and OAM/OIM integration, worked with the USPTO RBAC team to configure RBAC servers including OAM 11g, OAAM and OIM 11g (Oracle IAM suite)
Developed the MyUSPTO web application using Java/JEE, Spring 4.x frameworks and Spring MVC design patterns
Used object oriented concepts while developing in Java
Provided Oracle Identity Management (OIM) expertise to the team
Configured host identifiers for the MyUSPTO application in OAM
Configured application resources for the MyUSPTO application in OAM, including configuring proxy configurations and URL redirects
Configured authentication and authorization polices in the OAM console
Developed RESTful services using Oracle API’s for programmatic login and logout
Developed WAM-OIM services using OIM APIs to connect to the OIM client, create and update users, change passwords, to lock/unlock accounts, and to search in OIM
Developed RESTful services to connect to Oracle Unified Directory (OUD) and retrieve the lock attributes for an account
Developed authentication/authorization web services for Role Based Access Control (RBAC)
Configured Oracle Adaptive Access Manager (OAAM) in the development environment and supported the RBAC team with the configuration of higher environments
Developed an OAM client and OAAM client services to connect to OAM and OAAM
Developed RESTful web services to create, update and delete security questions using OAAM APIs
Participated in implementing the MyUSPTO single sign on feature and integrating with other applications
Developed services to retrieve the activity log from RBAC views using Hibernate 4.0
Developed Search Services for FPNG to bulk read user accounts from OAM and IP database
Developed code to change the user login in OIM and the MyUSPTO database
Developed services supporting widgets for users to add to their MyUSPTO homepage dashboards, using the Java Futures concept for fast response times
Developed the backend services for the Trademark Application Docket widget
Developed the backend services for the Trademark Post-Registration Docket widget
Developed the backend services for the Trademark Official Gazette widget
Developed XML parsing code for patent widgets
Supported the project’s deployment processes, including deployments to the development and test environments and the project’s monthly Production deployments
Deployed to WebLogic servers and JBoss EAP servers using builds created with Jenkins
Used Subversion (SVN) for source code version control, including branching and tagging the code
Worked with Junit for setting up the test framework and writing unit test cases
Analyzed SONAR automated code review reports and addressed findings
Traced issues through server logs using Splunk
Configured build scripts and maintained the automated build process using Jenkins and Maven
Monitored server performance using AppDynamics
Worked with Unix to access and execute operations on application servers
Worked with Oracle PL/SQL including synonyms, database links, views, stored procedures, triggers and materialized views
Used the agile Scrum methodology for development activities on this project
Tracked development tasks under CA Central (Rally)
Client: USPTO
Sr. Security Engineer
Elicere, Inc.
12.2012 - 02.2015
Company Overview: Client: FDIC
Led the transition from the Sun Identity Manager platform to the Oracle Identity Manager platform at FDIC
Installed and configured the new OIM software for FDIC’s IAMS authentication system
Configured Sun Identity Manager 8.1 with Oracle as its repository
Researched and presented a decision analysis and estimation to replace Sun Identity Manager with Oracle Identity Manager (OIM) at FDIC
Installed and configured OIM 11g on a WebLogic server, including: Installation of the generic OIM connectors for LDAP, database and AD, Configuration of LDAP and database connectors, Configuration of the reconciliation policy for the database and LDAP
Installed and configured OAM 11g on a WebLogic server, including: Development of custom web services to get the headers (such as user id, first name, last name) from OAM, Configuration of password policy and custom authentication policy for users through the OAM console
Developed custom workflows and forms in Java, Spring frameworks and Spring MVC design patterns, XML and SOA for several IAMS features and releases: provision users with basic and full access, Unix access requests, Network access requests, Reinstate a separated user, Create a mainframe (ACF2) account for an examiner user
Developed web applications (custom workflows and forms) for extranet user ETS application access
Developed for cross-browser support, including current and recent previous versions of Internet Explorer, Chrome and Firefox
Developed and modified custom Java classes for Unix access requests, fetching data from a SQL database
Used object oriented concepts while developing in Java
Defined new table structures including entity relationships between new and existing database structures
Developed custom Oracle SQL queries, LDAP/OUD queries and Oracle PL/SQL (stored procedures, triggers) for production support
Wrote web services to read attributes from the Sun ONE Directory Server (later renamed Oracle Unified Directory or OUD)
Developed scripts to automate the build process using Ant (similar to Maven)
Used Subversion (SVN) for source code version control, including branching and tagging the code
Client: FDIC
Sr. Security Engineer
Genentech
02.2011 - 12.2012
Supported Genentech’s identity management systems, including workflow and web application development using Unix scripts, Java and XML
Configured Sun Identity Manager 7.1 with Oracle as its repository
Provided 24/7 production support: Solved issues regarding password synchronization, user provisioning failures, and external business partner provisioning
Resolved RBAC issues, VPN connection issues, and user access issues
Developed custom Oracle SQL queries and LDAP/OUD queries for production support
Participated on agile Scrum teams for workflow and web application development
Developed Unix shell scripts for day-to-day automated tasks and to resolve data issues
Developed custom workflows and forms for the CHRIS project, which merged two identity manager tools, Roche’s Enroll and Genentech’s Sun IDM
Created database tables and defined entity relationships for loading data from HR systems into CHRIS
Developed custom workflows and forms using Java, XML and SOAP for updating Genentech and Roche users, managing vendors through IDM, and onboarding Clarity users
Used object oriented concepts while developing in Java
Developed and modified web applications (custom Java classes) for provisioning user workflows
Developed for cross-browser support, including current and recent previous versions of Internet Explorer and Safari
Configured resources on CA SiteMinder for single sign on capability, including defining policies for authentication and authorization
Configured URL redirects and reverse proxy settings in web servers using CA SiteMinder
Upgraded Sun IDM 7.1 to Sun IDM 8.1
Developed scripts to automate the build process using Ant (similar to Maven)
Used Subversion (SVN) for source code version control, including branching and tagging the code
Sr. System Developer
2020 Company
03.2010 - 02.2011
Company Overview: Client: CMS
Supported CMS’s QIMS identity management system
Developed custom workflows using Java and XML
Configured Sun Identity Manager 8.1 with Oracle as its repository
Developed custom workflows and forms using Java and XML for four features of the QIMS identity management and authentication system: Change End User Manager Request – QIMS User, Change End User Manager Request – Security Official, QIMS User Updates Profile, and Update QIMS User – Completed by Security Official
Used object oriented concepts while developing in Java
Fixed defects for the Anonymous Enrollment use Case and for Password Policy requirements
Developed custom email notifications to appropriate organization levels for approvals during the self-service process
Deployed war files on WebSphere 6.1 servers
Configured Anakam.TFA for two factor authentication
Client: CMS
Sun IDM Developer
Rockwell Automation
10.2009 - 03.2010
Supported Rockwell’s identity management system, build using the Sun Identity Manager platform
Developed custom workflows using Java and XML
Configured Sun Identity Manager 7.1 on a Sun ONE application server with Oracle as its repository
Developed stored procedures and triggers in Oracle PL/SQL to generate ROCKID
Populated ROCKID for new users in AD, LDAP/OUD, Prowatch, SAP and Domino resources
Developed custom workflows and forms for create service accounts, modify/terminate service accounts and recertify service accounts features
Used object oriented concepts while developing in Java
Prepared technical documents, RFC’s for pre-implementation test plans, post-implementation test plans and back out plans
Education
Master of Science - Computer Engineering
International Technological University
San Jose, California
05-2009
Skills
Highly skilled Senior Java Developer with extensive experience in designing, developing, And deploying enterprise-level applications using Java And Spring Boot Over 15 years of expertise in building robust, scalable, and high-performance microservices architectures Proficient in leveraging Spring Boot for creating RESTful APIs, integrating with various databases (SQL/NoSQL), and implementing best practices in DevOps, CI/CD, and cloud technologies Expertise in leveraging Amazon Web Services (AWS) to build cloud-based solutions, optimize infrastructure, and implement best practices for cost-effective and resilient architectures Proven track record in using AWS services such as EC2, S3, Lambda, RDS, and Cloud Formation to enhance system performance and scalability
With 10 years of hands-on experience in identity And access management (IAM) tools such as Okta, Active Directory, And LDAP, I have a deep understanding of securing user identities, integrating authentication protocols like OAuth20, SAML, and OpenID, and implementing role-based access control (RBAC) Adept at architecting and implementing IAM solutions in complex enterprise environments, ensuring regulatory compliance and safeguarding sensitive data
My passion for problem-solving and innovation drives my ability to lead teams, mentor junior developers, and deliver solutions that meet client and business needs efficiently