Summary
Overview
Work History
Education
Skills
Websites
Certification
Timeline
Generic

Teja Sreekar Dara

Milwaukee,WI

Summary

Experienced Identity and Access Management (IAM) Security Engineer with around 2 years of proven engineering experience in administering identity and security access. Strong knowledge of identity management best practices and IAM solutions such as Okta, SailPoint and ForgeRock. To secure a position as an IAM Engineer, utilizing my experience in identity and access management, single sign-on, federation, multi-factor authentication, policy, and system design technologies to ensure the safety and security of business systems and applications.

Overview

2
2
years of professional experience
1
1
Certification

Work History

Identity Access Management Security Engineer

Cognizant Technology Solutions, CTS
Chennai, Tamilnadu
08.2021 - 07.2023

• Integrated cloud-based Single Sign-On (SSO) and enterprise software as a service technology into intricate IT systems across different operating systems and provided the support.

• Installed OKTA’s lightweight (LDAP) agent to integrate with Active Directory and upgraded Okta AD Agents on a quarterly basis.

• Collaborating with applications and business stakeholders to remove roadblocks during the design and deployment stages.

• Integrated over 150 applications with OKTA using federated, agent-based, and secure proxy-based methods and protocols like OAuth, OIDC, SAML 2.0, WS-Fed, SWA and RADIUS following continuous integration/continuous deployment pipeline (CI/CD) and Agile/SDLC methodology.

• Integrated header-based applications in the Okta Access Gateway (OAG) build and application support.

• Created API keys and supplied them to application teams for integration with Okta via OpenID. And integrated Okta provisioning for applications such as BOX and AWS using API calls.

• Setting up Okta Workflow to gather user lists and attributes from multiple data sources and using Just-In-Time (JIT) Provisioning to create new user profiles. And automating access control processes such as User Provisioning, Onboarding, Role-Based Access Control (RBAC), authorization models, Single Sign-On(SSO), LDAP and Active Directory.

• Configured multi-factor authentication policies and factors for application access including Okta Verify, SMS authentication, and voice call authentication. Configuring and maintaining network rules within Okta, including both IP-based and dynamic zones.

• Developed password and sign-on policies as requested by customers and implemented self-service features such as password reset and account unlocking for end users.

• Monitored and analyzed Okta failed logins and performed the annual SOX audit. Conducted an Active Directory clean-up by removing disabled users, service accounts, mailboxes, and distribution lists using reports generated with PowerShell scripts to identify the usage.

• Developed and managed service accounts in Active Directory for application teams, supported application migration and enabled multi-factor authentication for the applications.

• Managed and maintained security technologies that focused on privileged access and information security solutions and ensured compliance with internal policies and regulatory requirements through monitoring and training programs and provided expert advice on federal compliance matters.

• Contributed to the engineering and architectural design of access control systems, user entitlements, application credentials, and user access policy management, improving security in privileged access management, high availability, and disaster resiliency.

• Developed and executed action plans based on audit findings and compliance violations. Conducted regular reviews and audits of company procedures, practices, and documents to detect potential weaknesses or risks and made updates as needed.

Configured and managed risk-based authentication, certificate-based authentication, and smart authentication policies in Okta while monitoring and adjusting as needed policies and certificates as needed, based on specific requirements and security policies.

Identity Access Management Security Intern

Cognizant Technology Solutions, CTS
Chennai, Tamilnadu
02.2021 - 07.2021

• Installed and configured the ForgeRock OpenDJ, OpenAM and OpenIdM using the Apache Tomcat in the respective business servers.

• Implemented IAM systems and processes, such as setting up user and application life cycle management, access and permissions which includes authentication and authorization, and designed multi-factor authentication workflows in ForgeRock using the Authentication Trees and Nodes .

• Integrated over 35 applications using SSO and Federation protocols like OIDC and SAMLv2 and designed multi-factor authentication and created security policies for user authentication.

• Implemented complex multi-factor authentication patterns using ForgeRock Authenticator App, push notifications and other digital devices.

Created password and security policies for furlough users and assigned the necessary access to the SSO applications.

Education

Master of Science - Computer Science

University of Wisconsin - Milwaukee
Milwaukee, WI
05-2025

Bachelor of Science - Computer Science

GITAM UNIVERSITY
Visakhapatnam
07-2021

Skills

OKTA

Sailpoint

Forgerock

NET (MVC/ ASP)

MS SQL SERVER

JavaScript

XML JSON

Angular

C

C

Java JSP

Python

NodeJS

MongoDB

Azure

Logic App

Azure Functions

Azure Datalake

Agile Git Redis

Restful APIs

AWS

AWS Lambda

AWS S3

AWS EC2

AWS LightSail

API Endpoint Gateway

Certification

  • Python for Everybody
  • Introduction to JAVA
  • Artificial Intelligence (A.I.) and Machine Learning (ML)

Timeline

Identity Access Management Security Engineer

Cognizant Technology Solutions, CTS
08.2021 - 07.2023

Identity Access Management Security Intern

Cognizant Technology Solutions, CTS
02.2021 - 07.2021

Master of Science - Computer Science

University of Wisconsin - Milwaukee

Bachelor of Science - Computer Science

GITAM UNIVERSITY
Teja Sreekar Dara