Name: Jagadish V
Sr. IAM/ Ping Federate
Contact No: 848-***-****
Email ID: *********@*****.***
PROFESSIONAL SUMMARY
8+ years of strong Access and Directory Server implementation and consulting experience.
Being involved in the entire software development life cycle processes and IAM implementation Life cycle such as requirements study and specification, analysis, designing, coding, integration, testing, implementing and supporting software systems.
Manages the daily operations of the identity and access management processes, technologies and partners with peers and clients to assess business processes to better utilize the automated service
Supervises the support and maintenance for the enterprise information security monitoring, firewall policy and traffic analysis, vulnerability scanning, risk assessments, and penetration testing
Plans, supervises, and participates in every project within the environment to assure that security standards are maintained while meeting the business requirements
Communicated with client and demonstrated expertise of Persistent IDM Practice
Utilized knowledge and skills to provide right solution and available products to customer, Created RFP for the IdM Projects and PoCs.
Exceptional communication skills, strong presentation, Problem solving and interpersonal skills.
Solid conceptual understanding and knowledge and hands-on experience on Federation service, OAUTH, OpenID connect, Access Management, LDAP Directory Virtual Directory and Active Directory.
Solid knowledge of Directory Server Administration ODSEE, Sunone, iPlanet, OVD, OID, OpenLDAP, OUD and Radiant Logic.
Deployment environment Analysis.
Estimation of proposed system and discuss the Proposal with Client.
Strong knowledge of QA processes.
Proficient in Detailed Test cases preparation, execution of test cases & defect logging.
Test/Dev/Stage and prod Environment creation and maintaining.
Ability to overcome integration hurdles and foresee deployment pitfalls.
Ability to handle pressure and get the job done on time.
Architected and implemented QA
Develop test Plan and test cases for the IdM, Security and IAM Projects.
Execution of Interoperability testing, E2E testing, integration and Functional testing.
Documentation of Design, Integration, Installation.
Customization and Plugin development using necessary tools.
Participated in training activities in Security and Identity management domain.
Test Environment creation and maintaining.
EDUCTATION
Master’s in applied engineering technology and Management (AETM) from Murray State University 2017, Kentucky, USA.
Master’s in business information systems (MBIS) from University of Ballarat 2011, Melbourne, Australia.
Bachelor’s in computer science from Anna University 2006, Chennai, India.
TECHNICAL SKILLS SUMMARY
Operating Systems
:
Windows, Linux, Solaris, AIX, HPUX, Oracle Linux, Hypervisor, Oracle VM Server/Manager.
Directory Servers
:
Ping: Ping Directory
SUN: SunOne/ iPlanet Directory Server, Sun Proxy Server
Oracle: Virtual directory, OID, OUD, ODSEE
IAM Tools: DIP, Password Filter, OAM, OIM
Radiant Logic VDS
Database Servers
:
Oracle, MySql, MS SQL
Standards& Protocols
:
LDAP, FIPS 140-2, SSL/TLS, SASL, IP
Middleware Application
:
Oracle Authentication Service for Operating System
Oracle Directory Integration Platform
Vulnerability testing
:
LDAP Injection, DoS etc
Application Servers
:
WebLogic, Apache,
PROFESSIONAL EXPERIENCE
Client: Walgreens, Illinois.
Role: LDAP Engineer
Duration: April 2019 – Till Date
Description
Deployment of OUD, ODSEE, OID, Ping Directory, Ping Data sync, Ping federation and OID, Radiant Logic VDS to provide SSO to end users for one of the largest Retail organization.
Responsibilities
Responsible for Installing, Configuring Ping Federate for the Enterprise.
Responsible for integration of applications using SAML, OAUTH and OpenID for SSO using Ping Federate.
Responsible for managing Ping Dev, QA and PROD Cluster environment.
Responsible for Installing, Configuring OUD Directory Server 6.3 for the Enterprise.
Responsible for creating and maintaining the new LDAP OU, Groups, Schema, and attributes.
Responsible for setup up the Multi-Master replication across the data centers.
Responsible for designing, administrating creating and documenting the new ACL policies enterprise LDAP.
Communicate with client to understand the pain-point
Improvise strategic solutions for the client needs
Understanding architecture of Client environment.
Understanding requirements and prepare the design detail and low-level design and documentation.
Setup the environment in HA and replication for ODSEE, OID and VDS.
Configure DIP to sync the data between different target systems.
Developed plugin to customize the data and password sync.
Deployment of OAM in HA and Scale out mode.
All products performance tuning and Performance load and stress testing.
Worked on the Development, UAT, and Production environment.
OAM DRM, OBIEE, BPM, EBS, Cognos integration etc.
OAM and Ping federate integration with Java development.
Preparation of Test Plan and test strategy, and Performance test plan.
Development of Test cases, Test plan and Test data.
Ping Infrastructure development and maintain
Ping ID, Ping access, Ping federate integration
Evaluation of PAM products
Bio matrix and multi factor authentication.
Client: Wellmark Blue Cross Blue Shield, Iowa
Role: Ping Administrator/ SSO Developer
Duration: May 2018 – March 2019.
Responsibilities:
Involved in SSO portal implementation using Ping Directory Server and Ping Federate.
Involved in capacity planning, implementation of Ping Directory server, Ping Federate,
Responsible for setting up highly available Ping environment and development included.
Responsible for application changes across different platforms - dev, testing, UAT and production.
Responsible for Configuring LDAP and JDBC connection pools.
Maintaining updated documentation of all the Servers, installed applications and updates.
Providing 24/7 on call support for deployments as well as application support
Involved in troubleshooting and performance tuning using Resource Analyzer and Log Analyzer.
Security, users, groups administration and daily backup and restore operations.
Active involvement in monitoring server performance, network traffic to reduce performance bottleneck.
Ensure application dependencies are integrated on system level components such as database, Data Source Name, and Application Server connection pooling including identification and documentation.
Installed upgrades and fix packs to the runtime environment as required decreasing vulnerability to production environment.
Client: Deutsche Bank, New Jersey
Role: IAM/ Sr Ping Consultant
Duration: May 2017 – April 2018
Responsibilities:
Responsible for Installing, Configuring Ping Federate for the Enterprise.
Responsible for integration of applications using SAML, OAUTH and OpenID for SSO using Ping Federate.
Responsible for managing Ping Dev, QA and PROD Cluster environment.
Responsible for Installing, Configuring OUD Directory Server 6.3 for the Enterprise.
Responsible for creating and maintaining the new LDAP OU, Groups, Schema, and attributes.
Responsible for setup up the Multi-Master replication across the data centers.
Responsible for designing, administrating creating and documenting the new ACL policies enterprise LDAP.
Responsible for 24*7 production support for 3rd tier application supporting on Single Sign On/User Authentication environment across multiple geographies
Responsible for directory architecture and schema to implement the enhancements to existing business rules and to incorporate fault tolerance and loud balancing technologies
Responsible for setting up SSL communication and renewing SSL certificates in production and non-production environments.
Responsible for LDAP LOAD testing on OUD Directory with 50K users, analyzing the bottlenecks and debugging the logs and performance tuning.
Upgrading/Migrate from ODSEE to OUD.
Production support activities includes application availability management, alert investigation, recovery/ restart of application servers, web servers, policy servers, log analysis for troubleshooting user authentication and authorization problems
Installed, configured, administered OEM on the Windows platform Implementing single sign on.
Setting up reverse proxy in the client environment.
Preparation of Test Plan and test strategy.
Development maintenance of Test cases, Test plan and Test data.
Test Environment creation and maintaining.
Client: Krishnapatnam Pvt Ltd, India
Role: Ping Federate Consultant
Duration: Feb 2014 – Nov 2015
Responsibilities:
Configuring SSO using Ping Federate. Understanding requirements, implementing and testing of AAA, RADIUS and identity modules for the internal External customers.
Integration of LDAP, TLS, SASL, SAML and other security protocols in the existing environment.
Integrate applications from development to production, assist development teams in identifying and resolving various issues related to Ping Federate.
Created Rules, Rule groups, Response, Response groups, Realms and Policies for Directory Server users.
Managing LDAP directory Servers like Microsoft Active Directory, ADAM, Oracle Virtual Directory Server (OVD), Oracle Internet directory Server (OID) and OpenLDAP.
Understanding architecture of Client environment.
Provide solution and fix the problem for the ticket raised by the customer.
Preparation of Test Plan and test strategy.
Development maintenance of Test cases, Test plan and Test data.
Test Environment creation and maintaining.
Client: Somerville Retail Services, Melbourne, Australia
Role: Ping Federate Engineer
Duration: Oct 2011- Dec 2013
Responsibilities:
Working with application's business and technical teams to gather requirement to integrate application with PingFederate for Single Sign On.
Designing and implementing applications integration with PingFederate in both Non-Production and Production.
Creating SP /IdP connections in Ping Federate using SAML2.0 protocol based on applications details or metadata.
Worked on Ping Federate Clustering with Engine and console servers being part of cluster by maintaining multiple clusters for the high availability.
Configured Ping Federation Environment for SAML Federated Authentications for users coming from partner sites by configuring ID Provider/Consumer using SAML 2.0 POST binding.
Integrated Ping with common identity stores like LDAP, relational databases, application servers, virtual directory servers, physical access management systems.
Involved for automating various tasks with Shell scripting, maintaining log files, backup of LDAP schema and data files, handling downtime activities.
Worked on OAUTH to allow access to Protected API's for OAuth Clients by getting Access Token from Authorization Server using various Grant Types. Used OAuth play ground to retrieve access token and refresh token.
Client Optimus Global Services, India
Role: System Network Administrator
Duration: March 2007 – March 2009
Responsibilities:
Administered Windows Server Active Directory, including Group Policy, creation and deletion of user accounts, managing access controls, and domain structure configuration.
Performed cross platform audits of Active Directory (AD) objects and user permissions.
Developed organizational units in Active Directory (AD) and managed user security with group policies.
Managed user moves including exchange mailbox, person network folder, AD organizational Unit relocation through Active directory and Exchange.
Compiled data to assist technical writers with IT new hire manuals and prepared data to report to testers for system enhancements.
Experienced with Microsoft Windows Server OS and network services (e.g., DHCP, DNS, File and Print Services, Remote Desktop Services)
Responsible for maintaining server systems and software
Maintains and grow technical expertise in all areas of networks, systems, and software
Develops and monitors systems group policies as required to mitigate IT security vulnerabilities
Maintained servers, workstations, laptops, printers and multimedia equipment.
Assisted in the installation of new software releases, system upgrades, evaluate and install patches and resolve software related problems.