Post Job Free
Sign in

Active Directory Security

Location:
Austin, TX
Salary:
$65/Hr
Posted:
May 16, 2018

Contact this candidate

Resume:

Prasanna Kalluri

Career Objective

To join an organization which gives me an opportunity for a global career and utilize my skills to work on cutting edge technologies thereby gaining personal and professional growth.

Certification: ISO 27001 Certified as a Lead Auditor.

Highlights:

Over 6+ years of technical experience in the Information Security Domain.

Strong customer service skills and professional ethics.

Ability to work in new technologies, environments and translate business requirements into IT solutions.

Skilled technologist that thrives in a fast paced, rapidly changing environment and always brings an uncompromising commitment to customer satisfaction.

Goal oriented and self-starter.

Self-motivated, dependable, hardworking, team player.

Effectively prioritizes activities and achieves defined objectives with high quality and standards.

Technical Summary:

Experience in provisioning and de provisioning/Identity Workflows, Access Management, RBAC (Role-Based Access Control), Authentication and Authorization technologies like OIM Oracle Identity Manager.

Processed User Access Management (UAM) requests by provisioning through Active Directories. Grant and remove access to the network and the required applications for all users within the company. Provided support to the user community being customer focused.

Strong experience with technologies such as Active Directory, Oracle Single Sign-On, SailPoint, Unix and Windows Server Platforms.

In-depth knowledge in Identity and Access Management.

Conduct internal and external security audits.

Anticipate security alerts, incidents and disasters and reduce their likelihood.

Analyse security breaches to determine their root cause Recommend and install appropriate tools and countermeasures.

Worked as a SailPoint Administrator to automate the user account creations and terminations.

Implemented and supported IAM technologies in a large complex environment.

Knowledge on PowerShell scripting.

Applications:

Active directory Users and Computers, Oracle Identity Manager (OIM), Identity Management, Access Management, SAP, Sailpoint, SharePoint, Siebel, Oracle Single-sign on, NetSuite, Salesforce, Lease plus, BAAN, Putty.

Work Experience:

JP Morgan Chase, Columbus, OH

Identity & Access Management Sr. Analyst

May 2017- present

Responsibilities:

Administer user access across multiple platforms such as Windows 2003, Active Directory, Microsoft SQL Server, and UNIX while adhering to SAS70 and SOX404 requirements.

Manage Windows NTFS and UNIX NIS permissions on shared folders and shared

drives.

Administered creating and maintaining mailboxes, distribution lists, contacts and

public folders and SMTP addresses.

Define, implement and maintain corporate security policies.

Responsible for Health Checking, Patch Management as well as Activation’s & Decommissions of client environment.

Coordinate security plans with outside vendors.

Train fellow employees in security awareness and procedures.

Perform vulnerability testing, risk analyses and conducting security risk

assessments.

Identifying potential threats to each resource and Developing a strategy to deal

with the most serious potential problems first.

Defining and implementing ways to minimize the consequences if an attack

occurs.

Establish plans and protocols to protect digital files and information systems

against unauthorized access, modification and/or destruction.

Security operations skills in assessment, design, architecture, management.

Conduct internal and external security audits.

Anticipate security alerts, incidents and disasters and reduce their likelihood.

Analyse security breaches to determine their root cause Recommend and install appropriate tools and counter measures.

Responsible for compliance with applicable corporate and divisional policies and procedures.

Worked with business and solution owners to identify and maintain user role definitions.

Worked as a Sailpoint administrator, migrated the applications to the Sailpoint and automated the process of provisioning and de-provisioning to avoid manual errors.

Assisted in documenting and maintaining the effective internal RBAC control processes and procedures in accordance with the company standards.

Diebold Nixdorf, North Canton, OH

Identity & Access Management Analyst

October 2016 – April 2017

Responsibilities:

Played a major role in migrating the user accounts in the integration of Diebold Systems pvt ltd and Wincor Nixdorf.

Added, deleted and modified user ids.

Troubleshooting access issues in various applications and databases like Oracle, SAP and Windows.

Prepared detailed reports/work papers.

Analysed Application User Access Privileges and Realignment with Business

Objectives and Operations.

Continued to demonstrate expertise in Mainframe (ACF2) and Windows (Active Directory) technologies.

Created new security groups in Active Directory environment and applied appropriate security permissions.

Created, modified, and terminate Linux/UNIX and Oracle database accounts.

Supported Microsoft Exchange servers by creating, modifying, deleting, or disabling user Outlook accounts.

Worked as a SailPoint Admin, migrated the applications to the SailPoint and maintained them.

Automated the process of provisioning and de-provisioning in various applications within the Organization and maintained it using the SailPoint.

Created, maintained and disabled Salesforce accounts.

Documented new security administration procedures and processes and informed all team members to ensure consistency in execution.

Trained other information security analysts on creating, deleting, or modifying user ids’ and their respective access to several applications by explaining reference manuals and conducting on-the- job training.

Provide support to users on applications (like BAAN, mainframes, Salesforce, NetSuite) accounts lock out, password reset.

Problem Management - Analyzed processes/desktop procedures and suggested improvements.

Provided audit support in security investigations to Internal Audit, General Motors, Human Resources, the Information Security Office, and outside vendors (e.g. KPMG).

Assisted in the testing of business application modifications and implementations after normal business hours to reduce security problems.

Anticipate security alerts, incidents and disasters and reduce their likelihood.

Maintained complete confidentiality when dealing with customer information and data by adhering to Diebold Nixdorf corporate and security policies.

Provided timely execution of all Diebold Nixdorf associates terminations as per Human Resources requests.

Worked with various internal business groups and IT application owners in order to define Role base access templates for implementing RBAC for multiple applications.

Worked on quotes, incidents using the Service Manager tool and resolved user issues maintaining the SLA following the ITIL foundations.

Fulfilled on-call duties for seven (7) days a week on a rotational basis.

Diebold Systems Pvt Ltd, India

Identity & Access Management Analyst

June 2013 – September 2016

Responsibilities:

Reviewed, analyzed and processed security access request for new hires, transfers

and terminations.

Added, deleted and modified user ids.

Active Directory Management including: user management, Groups and Shares management.

Security Management - Configuring Account policy, Access rights and Password control.

Responsible for Active Directory deployment, management, and troubleshooting (Windows 2000 & 2003).

Access provisioning for different platforms like Windows, Midrange, AS400, Mainframes, & UNIX across worldwide.

User provisioning for applications, Shared Drives, Creating New shares through Active Directory.

Provide phone support to users on applications, accounts lock out, password reset.

Responsible for the day-to-day maintenance and AD operation.

Worked in the AD FS Single Sign on environment.

Ensure effective authentication methods are used to restrict system access to both users and applications.

Provide remote assistance and support to IT staff in the different regions and end-users when necessary.

Continued to demonstrate expertise in Mainframe (ACF2) and Windows (Active Directory) technologies.

Created new security groups in Active Directory environment and applied appropriate security permissions.

Created, modified, and terminate Linux/UNIX and Oracle database accounts.

Supported Microsoft Exchange servers by creating, modifying, deleting, or disabling user Outlook accounts.

Worked as a SailPoint Admin, migrated the applications to the SailPoint tool and maintained.

Documented new security administration procedures and processes and informed all team members to ensure consistency in execution

Expertise in both Administration & Monitoring level for all Platforms.

Anticipate security alerts, incidents and disasters and reduce their likelihood

Analyze security breaches to determine their root cause

Maintained complete confidentiality when dealing with customer information and data by adhering to Diebold Systems Pvt Ltd corporate and security policies.

Worked on quotes, incidents using the Service Manager tool and resolved user issues maintaining the SLA.

Provided timely execution of all Diebold Nixdorf associates terminations as per Human Resources requests.

Fulfilled on-call duties for seven (7) days a week on a rotational basis.

Fisheye Analytics, India

Identity & Access Management Analyst

June 2012 – May 2013

Responsibilities:

Provide phone support to users on applications, accounts lock out, password reset.

Install hardware and software to client PC.

Maintained accounts on Active Directory, NT, Mainframe, UNIX and Console One.

Reviewed, analyzed and processed security access request for new hires, transfers

and terminations.

Added, deleted and modified user ids.

Created users’ account on Active Directory.

Provided remote access support.

Educational Qualifications

Bachelors in Technology in Electronics & Communication Engineering.



Contact this candidate