Sign in

Security Management

Little Falls, New Jersey, United States
September 30, 2019

Contact this candidate





Worked on Identity Access Management and Platform Administration (SOC).

•Privilege - user login, User vaulting, analyzing password recoded session, Alerts and taking appropriate actions, Analyzing as is to make recommendations for improvement and working with the team on assigned project tasks (Using Total Privilege Access Management TPAM Quest)

•Security Operations includes Identity Access Management and Vulnerability management, Server Security, Change Management, Incident Management, Root Cause Analyses, governance, risk management and compliance.

• Monitor and record privileged sessions to meet audit requirements and stop suspicious privileged sessions at real-time Privileged Access Management (TPAM)

•Provide SailPoint identity and access management solutions for governance

•Identity Security Audit Management & Issue Remediation, 30 days Inactive user disabling using VB Script


•QUALYS: Advance Vulnerability Management (2014)

•CyberArk Certified Trustee 2019


Completion CyberArk Training: Introduction to CyberArk Privileged Access Security 2018 Course.

Completion AWS Cloud Practitioner Essentials (Second Edition)

Completion AWA Certified Alexa Skill Builder – Specialty


•Server Applications: Microsoft Active Directory, Wintel Sever, Window Server 2003, 2008, 2012

•Sailpoint, HITACHI, ADManager

•Knowledge of JAVA (JDK, JRE Installation), XML, HTML, Web and Application Servers (Apache Tomcat), Database, IIQ 7.2

•Scripting Language: VB Scripts, Java Scripts, PowerShell, UNIX

•Quest Active Role Server (ARS), Quest Change Auditor, TPAM, RSA SecurID, BMC BladeLogic Server Automation Console (BBSA), Qualys/McAfee Foundstone (Vulnerability Management)

•Varonis Data Governance Products "Varonis DatAdvantage & Varonis DataPrivilege"

•Knowledge of CyberArk, CA SSO, and Oracle Identity and Access Management,


•The Maharaja Sayajirao University of Baroda Bachelor of Science - BS, (1985)

•The Maharaja Sayajirao University of Baroda - Unix & C (1989)

•Computer Programming And Management Application - Narsee Monjee Institute of Management Studies Computer Science · (1985 - 1986)

•SAS institute Inc SAS Fundamentals: A Programming Approach · (1999)



Technology Lead

Aug 2019 - Present

•Oversee the security of IAM - Active Directory domains across the enterprise.

•Providing ID and Access Management Solution

•Open tickets and collaborate with Vendor on critical issues when required.

•Work with different teams during Incidents and assist with RCA’s where applicable.

•Access and Security Solution with Active Directory Admin, GPO Admin, PowerShell scripting.

•Solutions that meet the requirements of internal customers and peer Active Directory Engineering and Operations teams

•PowerShell scripting experience and capabilities

•Overall Operational Coordination with SOC team.


Sr. Security Engineer

IAM – Windows Security

Nov 2012 – Oct 2018

•Manage Identity Access Management, Privileged Access Management (PAM), Control Access (Architecture, Compliances, Policy. Audit Reporting and LifeCycle includes Access Request, Provisioning, Password Management.

•Privilege - user login, User vaulting, analyzing password recoded session, Alerts and taking appropriate actions, Analyzing as is to make recommendations for improvement and working with the team on assigned project tasks.

•Provide SailPoint identity and access management solutions for governance, provisioning and access management

•Process improvements utilizing Identity and Access Management platforms

•Manage Escalation of IAM services and related incidents

•Manage RSA technologies including hard tokens, soft tokens and RSA tool

•Manage, administer and operate a Microsoft Active Directory structure in Windows 2003, 2007, 2012

•Worked on to Security audit & Server compliance tools like BMC Blade Logic.

•Generating report for network-based vulnerability scans using Qualys Guard, for Network vulnerability assessments to identify vulnerabilities or confirm compliance to security standards (Using Qualys)

•Managing users’ requests, incidents and audit reports within SLA and continuously improve the daily operational procedure.

•Knowledge of Installing Sailpoint identityiq (Using apache tomcat, JDK, JRE)


Sr. Business Analyst:

Oct 2008 – Jul 2012

•Assisted in the development of project plans, implementation timelines, and deployment schedules relating to Active Directory initiatives.

•Developed, implemented, and documented formal security programs and policies.

•Developed successful programs which reduced operating cost and increased productivity.

•Developed store procedure database triggers and database alerts.

•Assisting of Project Planning, Analysis, Testing and prepare report hypothesis.


Web Developer

July-2000 - Mar 2001

•Web pages created based on the collected information and requirement.

•The system was built using HTML and JAVASCRIPT running on browser side.

•The query builder was built into the browser using JAVASCRIPT and the process engine

•Identify / leverage IT solutions to enable business objectives – analyze technical constraints and communicate alternatives to the business.

•System Configuration – as necessary analyzing and implementing configuration changes. Involvement in Production Support as needed.

Tiffany & Co.

Sr. Business Analyst

Sep 1996 - Dec 1999

•Analyze and evaluated business systems (IMS) and user needs.

•Performed data research, analysis and design for all employees computing systems.

•Design and Manage Warehouse Management System including Productivity Analyses (Daily, Weekly and Monthly).

Contact this candidate