Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Tony Salerno

Dallas

Summary

Identity and Access Management Business Architect with over 25 years of experience in software development and consulting. Expertise in architecting and implementing solutions tailored to client business needs. Proficient in various Identity Service platforms, including Okta, Oracle, and SailPoint, with a strong focus on Okta, supported by Okta Certified Professional certification. Proven track record of delivering effective identity management solutions that enhance security and streamline access processes.

Overview

2026
2026
years of professional experience
1
1
Certification

Work History

IAM Third Party Risk and Management Consultant

BCForward at JPMorgan Chase
07.2024 - 03.2025
  • Working across multiple systems of record identified areas of IAM technical risk to the business by analyzing IT architectures, security controls, evolving industry practices, etc. and documenting where controls do not exist or need improvement. These technical deep-dive reviews were then evaluated and assistance with designing and implementing remediation plans was provided.

Principal Solutions Architect / IAM Consultant

Evolved Identity
01.2023 - 06.2024
  • Led the deployment, configuration and testing of the IdentityRM solution for Evolved Identity clients. Worked with the client team to design, architect and customize the IdentityRM solution to match the client business needs.
  • Environment: Used the following technologies as part of the software deployment and configuration of the IdentityRM product: AWS EC2, AWS EKS, Azure AKS, SQL, SSO, MFA, OIDC, OAuth, Okta, ForgeRock OpenAM, Azure Active Directory, Azure Kubernetes Service.

Product Manager / IAM Consultant

ICSynergy LLC/Evolved Identity
06.2019 - 01.2023
  • Led the design and development of an Identity Management product (IdentityRM) that manages identities in the context of a business relationship model for B2B scenarios. Worked with ICSynergy CTO to develop requirements, design and architect the product. Hired, onboarded and managed a team of onshore and offshore developers to implement the solution. Worked with sales and marketing teams to provide demonstrations and gather business requirements to enhance the solution. Managed development team on a daily basis to provide direction, clarify requirements and design and troubleshoot issues.
  • Environment: IdentityRM is Developed mainly in Python Django and Angular 8. Product is deployed to a Docker image that could be easily deployed on any Docker container. Used PyCharm as IDE for source code development. Also used the following technologies as part of the software development, deployment and configuration of the IdentityRM product: AWS EC2, AWS EKS, Azure AKS, SQL, SSO, MFA, OIDC, OAuth, Okta, ForgeRock OpenAM, Azure Active Directory, Azure Kubernetes Service.

Specialist Leader

Deloitte LLP
01.2014 - 06.2019
  • Led the design and implementation of an improved User Access Management solution for a large Financial Services company that is migrating its current solution from Oracle Waveset. This involved reimplementing lifecycle management of thousands of roles and application entitlements. Worked with the Security Authorization and the User Access teams to implement both Role/Entitlement lifecycle management and User lifecycle management. Used Peoplesoft as authoritative source and controlled automated access provisioning to connected applications and workflows for provisioning to disconnected applications.
  • Environment: This project used the Oracle 12cPS3 OIG Suite.

Universal Identity Service Advanced Engineering Support – Apex Systems
04.2013 - 01.2014
  • Worked in the Advance Engineering group to resolve application issues related to Verizon’s Universal Identity Service. Verizon UIS is a platform for providing Authentication, ID Proofing and Digital Signing services to customers as a cloud service offering.
  • Environment: The following tools and technologies were used during this engagement: Oracle Exadata, Exalogic including Oracle DB and Weblogic AppServer. OpenAM, LDAP, Nagios, OEM.

Oracle WAM Consultant

ICSynergy International, LP
Plano
10.2012 - 04.2013
  • Architected, deployed and configured the WAM solution for ESI. This included prototyping, designing and integrating with ESI’s existing security solutions and developing an implementation roadmap and strategy for WAN adoption.
  • Environment: The following tools and technologies were used during this engagement: Oracle OAM, OIF, OES, OVD MS Active Directory

Oracle OVD Consultant

ICSynergy International, LP
Plano
07.2011 - 10.2012
  • Architected, deployed and configured the OVD solution to merge the ESI and Medco AD domains.
  • Environment: The following tools and technologies were used during this engagement: Oracle Virtual Directory

IAM Consultant

ICSynergy International, LP
Plano
09.2010 - 07.2011
  • Deployed ICSynergy icRARE application in American Airlines’ Identity Management infrastructure. Responsible for design, development and testing of solution
  • Environment: The following tools and technologies were used during this engagement: Oracle/Sun Identity Manager

OpenSSO Consultant

Apex Systems
05.2010 - 09.2010
  • Redeployed Sun Access Manager (OpenSSO) and Sun Communications Suite for Alico Japan as part of AIG/Alico separation activities.
  • Environment: The following tools and technologies were used during this engagement: Sun OpenSSO, Sun Communications Suite, Glassfish Application Server

IAM Consultant

ICSynergy International, LP
Plano
05.2004 - 05.2010
  • Identity and Access Management technical lead. Lead the design, development and deployment of the Identity and Access Management portion of the MATRX project to modernize the DMV’s IT offerings. Designed and deployed the Access Management solution using OpenSSO and participated in the design and development of the provisioning solution using Sun Identity Manager.
  • Environment: The following tools and technologies were used during this engagement: Sun OpenSSO, Sun Identity Manager

  • Led the design and development of an Identity Management product (IdentityRM) that manages identities in the context of business relationship model for B2B scenarios. As the Principal Solution Architect, was responsible for determining client business needs and providing a solution that met those needs
  • Led the design and implementation of an improved User Access Management solution for a large Financial Services company that was migrating its current solution from Oracle Waveset. This involved re-implementing lifecycle management of thousands of roles and application entitlements. Worked with the Security Authorization and the User Access teams to implement both Role/Entitlement lifecycle management and User lifecycle management. Used Peoplesoft as authoritative source and controlled automated access provisioning to connected applications and workflows for provisioning to disconnected applications.
  • Led the implementation of an Identity Services solution for an independent Oil & Gas company. Implemented Single Sign-On, provisioning and access certification. Migrated legacy applications to the new Identity Services solution while integrating with the Oracle ERP solution being deployed as part of the company’s financial transformation project.
  • At a large state university, led the implementation of the Federated SSO integration between Oracle Cloud ERP and their on-premises Shibboleth SAML Identity provider.
  • Led a strategy engagement to plan how a large financial service subsidiary’s proprietary and complex Identity and Access Management related applications could be aligned with the corporate IAM deployment.
  • Led the implementation of a large bank’s Identity Services solution for their corporate customers. The solution allowed corporate clients to have delegated administrators control access to the bank’s applications.
  • Led the production transition effort for a large telecom provider’s Identity as a Service (IDaaS) solution which provides Identity Proofing, Strong Authentication, PKI Digital Signing and other identity services to global clients in a wide range of industries.
  • Led the implementation of an Identity Services solution at a large online prescription provider. This included SSO enabling of hundreds of applications for both the provider’s own applications and the applications belonging to a recent acquisition.
  • Architected and developed Identity and Access Management applications for a major airline using the Oracle Waveset application suite.

Pioneer Natural Resources
Irving
  • Implemented Single Sign-On, provisioning and access certification. Migrated legacy applications to the new Identity Services solution while integrating with the Oracle ERP solution being deployed as part of the company’s financial transformation project.
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, and OUD.)

Whirlpool
Benton Harbor
  • Designed and implemented a solution to integrate SAP GRC (Governance, Risk, and Compliance) into Whirlpool’s ISIM (IBM Security Identity Manager) environment. The goal of the integration is to require new users requesting access via ISIM to have the access request in question checked for Segregation of Duty compliance by the GRC application, prior to granting access to SAP resources.

Texas Department of Motor Vehicles
Austin
  • Led the design and implementation of a solution that integrated SalesForce with the TXDMV’s ForgeRock identity and access management system
  • Environment: This project uses the ForgeRock OpenAM and OpenIDM products.

State of Tennessee
  • Led the design and implementation of the TennCare Identity and Access Management system. This system used the Oracle IAM solution to provide self-service user registration, password management and access management capabilities
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, and OUD)

State of Delaware
  • Led the design and implementation of an Identity and Access Management system for the Department of Social Services (DSS). This system used the Oracle IAM solution to provide self-service user registration, password management and access management capabilities
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, and OUD)

Rutgers University
  • Led the design and development of the Single Sign-On (SSO) integration between the Rutger’s Shibboleth Identity Provider and the Oracle ERP Cloud application. This included MFA with the Duo MFA solution
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, and OUD)

McGraw Hill Financial Incorporated
Hightstown
  • Worked with MHFI and Standard and Poors Ratings teams to implement an updated Identity and Access Management Strategy. This included planning and implementation of the migration of applications from the Oracle IAM 10g environment to the Oracle 11g environment as well as designing new strategies for providing a centralized mechanism for implementing fine-grained entitlements to hundreds of S&P Ratings’ applications.
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, OAAM, OUD and OES). The custom development uses Java.

Regions Bank
  • Worked with Regions Application Development team to architect, design and implement an SSO solution using the Oracle IAM Suite. The project involves integration of the Oracle IAM components with custom Java development. Implementation is currently in progress.
  • Environment: This project uses the Oracle IAM Suite (including OAM, OIM, OAAM, OUD). The custom development uses Java, Spring MVC and Thymeleaf.

Advertising.com (AOL)
  • Worked with Advertising.com development team to implement a custom OpenSSO solution to implement SSO and Web Services Security for their enterprise applications. Mentored the development team, advised them on their architectural decisions and provided ongoing support for their production roll-out.
  • Environment: The following tools and technologies were used during this engagement: Sun OpenSSO on various web and application servers.

CMS (Center for Medicare and Medicaid Services)
  • Lead technical resource in a major upgrade and optimization effort of the CMS Identity and Access Management solution. Provided architectural, S/W and H/W recommendations and lead the stress testing and deployment effort to prepare CMS for anticipated user loads.
  • Environment: The following tools and technologies were used during this engagement: Complete Java Enterprise Identity Management Suite (Identity Manager, Access Manager, Directory Server). Also used LoadRunner for load testing the environment.

GMAC
  • Lead technical resource in the implementation of an Identity and Access Management POC. This POC was a complete implementation of the integrated Java Enterprise System stack. In addition to acting as Solutions Architect and technical lead, implemented custom Identity Manager and Access Manager solutions to meet the customer specific requirements. This included building custom workflows and forms in IdM and developing custom authentication and authorization modules for Access Manager.
  • Environment: The following tools and technologies were used during this engagement: Complete Java Enterprise Identity Management Suite (Identity Manager, Access Manager, Directory Server). Sun Federation/Access Manager

Sabre
  • Worked as Solutions Architect in the implementation of Sun’s Access Manager solution in Sabre’s first federated identity solution.
  • Environment: The following tools and technologies were used during this engagement: Complete Java Enterprise Identity Management Suite (Identity Manager, Access Manager, Directory Server). Sun Federation/Access Manager.

American Express
  • Acted as Identity and Access Management consultant in large IAM infrastructure deployment.
  • Environment: The following tools and technologies were used during this engagement: Complete Java Enterprise Identity Management Suite (Identity Manager, Access Manager, Directory Server).

PepsiCo
  • Designed, developed and deployed Directory Administration tool. This tool provisioned applications that used the Directory Server for authentication and authorization so that Application Administrators could grant and control access to their applications. The tool was implemented using Java Server Faces and Java Studio Creator.
  • Environment: The following tools and technologies were used during this engagement: WebLogic Application Server, HP-UX OS, AIX, Sun Directory Server, IBM Directory Server, JNDI, Sun Identity Manager, SiteMinder, Oracle, Java Server Faces, Java Studio Creator

Education

M.S. - Systems Engineering

University of Houston
12.1992

B.S. - Aerospace Engineering

University of Texas at Austin
12.1984

Skills

  • Identity management and access control
  • User provisioning
  • Client relationship management
  • Project leadership
  • Business analysis
  • Team collaboration

Certification

Okta Certified Professional (expired 2024-03-31)

Timeline

IAM Third Party Risk and Management Consultant

BCForward at JPMorgan Chase
07.2024 - 03.2025

Principal Solutions Architect / IAM Consultant

Evolved Identity
01.2023 - 06.2024

Product Manager / IAM Consultant

ICSynergy LLC/Evolved Identity
06.2019 - 01.2023

Specialist Leader

Deloitte LLP
01.2014 - 06.2019

Universal Identity Service Advanced Engineering Support – Apex Systems
04.2013 - 01.2014

Oracle WAM Consultant

ICSynergy International, LP
10.2012 - 04.2013

Oracle OVD Consultant

ICSynergy International, LP
07.2011 - 10.2012

IAM Consultant

ICSynergy International, LP
09.2010 - 07.2011

OpenSSO Consultant

Apex Systems
05.2010 - 09.2010

IAM Consultant

ICSynergy International, LP
05.2004 - 05.2010

Pioneer Natural Resources

Whirlpool

Texas Department of Motor Vehicles

State of Tennessee

State of Delaware

Rutgers University

McGraw Hill Financial Incorporated

Regions Bank

Advertising.com (AOL)

CMS (Center for Medicare and Medicaid Services)

GMAC

Sabre

American Express

PepsiCo

M.S. - Systems Engineering

University of Houston

B.S. - Aerospace Engineering

University of Texas at Austin
Tony Salerno