Post Job Free
Sign in

Access Management It Security

Location:
Dallas, TX
Salary:
60
Posted:
April 02, 2025

Contact this candidate

Resume:

Samarth Raj Wagle

Email: *************@*****.***

Phone: 972-***-****

Summary:

Over 6 years of experience in IT Security and Identity & Access Management (IAM), specializing in SailPoint IdentityIQ, Oracle Identity Manager, MVC frameworks, and Java.

Spearheaded SailPoint IdentityIQ governance, compliance, and lifecycle management (LCM) initiatives, including the upgrade from version 7.3p1 to 8.2p1, coordinating with teams on OS and database migrations.

Led end-to-end troubleshooting of complex workflows and business rules within SailPoint, ensuring seamless identity governance.

Integrated LDAP directories, Windows & UNIX servers, databases, and networking devices with CyberArk to enhance privileged access security.

Executed SailPoint version upgrades and patching (6.4, 7.0, 7.1, 7.2) while developing IAM applications using J2EE technologies and associated tools.

Managed user and role provisioning, access certification, workflow automation, and governance across LDAP and other directory services.

Designed and deployed identity lifecycle management processes, covering Joiner, Mover, Leaver, and Rehire events, along with role-based access control (RBAC) and group-based provisioning.

Configured custom workflows, rules, and policies in SailPoint IdentityIQ to align with organizational security frameworks.

Architected and implemented solutions for Identity Management, LDAP Directories, Access Management, Authentication, Authorization, and Privileged Access Control.

Integrated CyberArk Enterprise Password Vault with diverse applications, reinforcing privileged account security and compliance.

Delivered knowledge-sharing sessions to enhance internal expertise on SailPoint and IAM best practices.

Led the design, development, and deployment of SailPoint solutions, overseeing code migrations, version control, patch upgrades, and system installations across Windows and Linux environments.

Established connectors and integration protocols to enable secure communication between IdentityNow and Active Directory.

Designed and implemented Privileged Identity & Access Management (PIM/PAM) solutions using CyberArk, ensuring robust security controls.

Automated password management and rotation through custom scripts and RESTful API integrations, reducing manual workload and improving operational efficiency.

Played a key role in deploying and configuring CyberArk Enterprise Password Vault within large-scale enterprise environments.

Extensive experience managing user authentication, password policies, access entitlements, role hierarchies, and web-based identity management solutions.

Successfully onboarded various enterprise applications using out-of-the-box (OOB) connectors, including Delimited, JDBC, Active Directory Direct, LDAP, Logical, and Web Services.

Collaborated with stakeholders on post-implementation support, conducting user testing, debugging, and maintenance.

Strong background in advanced Java development, including JSP, Servlets, Struts, Hibernate, GraphQL, AJAX, XML, Java Beans, and Spring Framework.

Provided Level 3 support, managing ServiceNow ticketing for IAM-related user access issues within IdentityNow.

Technical Skills:

IAM Tools

SailPoint IIQ 6.x, 7.x, Okta, Identity Now, Saviynt Cloud 5.x, AWS IAM, CyberArk Enterprise Password Vault

IDE and Tools

Eclipse, IntelliJ IDEA, NetBeans, Selenium, SoapUI, Postman, Putty, WinSCP, Apache Directory Studio, Jenkins, Maven

Operating System

Linux, Windows, UNIX, MAC.

Programming Language

Python, Linux Shell Script, Java, J2EE Unix,

Methodology

Agile Scrum, Waterfall

Databases

MS-SQL, MySQL, Oracle 10g,11g,11g XE

Web Technologies

HTML, XML, JavaScript, SOAP, REST, WSDL

Web Servers

Apache Tomcat, Web Sphere, Web Logic

Network Protocols

HTTP, HTTPS, DNS, DHCP, FTP, LDAP

Professional Experience:

Capital One, Plano, TX Oct 2023 - Present

Sr. IAM/SailPoint Engineer

Responsibilities:

Partnered with SailPoint IdentityNow and Privileged Access Management (PAM) teams to oversee application onboarding and ensure seamless integration with business requirements.

Led the design and implementation of SCIM APIs, collaborating closely with application developers to enhance identity provisioning.

Engineered custom provisioning rules tailored to application needs, covering pre-provisioning, post-provisioning, and rule-based customization.

Developed Java BeanShell scripts to automate workflows and enforce business logic within SailPoint IdentityNow.

Provided Level 3 support, proactively managing ServiceNow ticketing to resolve user identity-related issues in IdentityNow.

Delivered knowledge transfer sessions and offered post-production support, ensuring smooth system transitions.

Worked alongside business analysts to gather and refine IAM requirements, aligning solutions with business objectives.

Authored comprehensive integration and configuration documentation, facilitating clear implementation guidelines for clients.

Performed extensive workflow testing in both development and QA environments to validate functional accuracy.

Designed custom integration solutions to link legacy systems with SailPoint IdentityNow, addressing unique organizational needs.

Configured Joiner, Mover, and Leaver workflows to automate user lifecycle events, ensuring seamless access management.

Leveraged Postman for API validation and testing, utilizing mock servers to simulate real-world scenarios.

Managed source code repositories using Git and Subversion, ensuring streamlined version control.

Scheduled and automated identity-related tasks using Cron expressions to optimize process efficiency.

Developed and executed run rule tasks within IAM frameworks to manage identity data effectively.

Mapped user attributes between IdentityNow and SAP R3, ensuring data consistency and synchronization across systems.

Established access certification campaigns in IdentityNow, enabling periodic audits to validate and enforce security compliance in SAP R3.

Installed and configured the SAP HANA connector within IdentityNow to manage identity and access data extraction seamlessly.

Gained deep expertise in Infrastructure as Code (IaC) methodologies, enabling automated infrastructure provisioning and deployment.

Fujitsu Network Communications, Richardson, TX Feb 2021 - Aug 2023

IAM/SailPoint Developer

Responsibilities:

Worked with SailPoint IdentityNow and Privileged Access Management teams to streamline application onboarding and fulfill identity governance requirements.

Led access certification campaigns in IdentityNow, ensuring periodic audits of SAP R3 user access for compliance enforcement.

Developed custom Java BeanShell scripts to define identity management rules and automate provisioning workflows.

Managed version control for identity-related configurations using Git and Subversion, maintaining structured development processes.

Configured and fine-tuned Joiner, Mover, and Leaver workflows within IdentityNow, ensuring seamless user lifecycle management.

Played a key role in SCIM API development, collaborating closely with application teams to enhance user provisioning mechanisms.

Led knowledge transfer sessions and provided post-production support, ensuring smooth operational transitions.

Utilized Postman for API testing and validation, employing mock server functionality to replicate real-world API interactions.

Authored detailed integration and configuration documentation, aligning solutions with unique client business needs.

Integrated ServiceNow with SailPoint IdentityIQ, enabling automated user access reviews and streamlined IAM processes.

Conducted end-to-end workflow testing across development and QA phases, ensuring functionality met business requirements.

Customized SailPoint IdentityNow to support legacy system integrations, addressing specific organizational security needs.

Leveraged Google Cloud Platform (GCP) networking services to optimize cloud resource management and integrate on-premise IAM systems.

Designed and implemented application-specific provisioning rules, including pre-provisioning, post-provisioning, and custom business logic.

Deployed out-of-the-box SailPoint connectors to facilitate secure integration with various systems, including DBC, LDAP, Active Directory (AD), and Delimited Files.

Ensured data consistency between IdentityNow and SAP R3 by mapping user attributes and refining synchronization processes.

Installed and configured the SAP HANA connector within IdentityNow, optimizing identity and access management data extraction.

Engaged with business analysts to define IAM requirements, ensuring technical implementations aligned with enterprise policies.

Automated task scheduling using Cron expressions, optimizing background identity processes.

Developed expertise in Infrastructure as Code (IaC) principles, enabling automated IAM deployments and infrastructure provisioning.

Implemented ForgeRock IAM solutions, securing user authentication, authorization, and identity lifecycle management.

Designed and executed run rule tasks within IAM frameworks, automating identity and access workflows.

Provided Level 3 support, overseeing ServiceNow ticket resolution for IdentityNow-related user access concerns.

InfoVision, Richardson, TX Aug 2020 – Feb 2021

SailPoint IDN Developer

Responsibilities:

Managed integration with SEIM tools via APIs, optimizing the transmission of IdentityNow cloud logs to a centralized logging platform.

Expanded SailPoint IdentityIQ/IdentityNow functionality to unify identity governance across hybrid cloud and on-premises environments.

Automated user provisioning, de-provisioning, and access certifications by integrating SailPoint with enterprise and cloud platforms, reducing operational risks and manual intervention.

Managed Google Workspace identity synchronization with SailPoint, enforcing security and compliance policies across multi-cloud environments.

Configured and fine-tuned SailPoint connectors to enable seamless identity synchronization and enforce Role-Based Access Control (RBAC) across hybrid infrastructures.

Developed automated identity lifecycle workflows, streamlining user, application, and cloud service access management.

Integrated CyberArk for privileged access management, securing and managing high-privilege accounts across cloud and on-premise environments.

Deployed federated identity solutions for Single Sign-On (SSO), integrating with identity providers such as Azure AD and Okta for secure authentication and access control.

Implemented SAML and OAuth-based authentication protocols, ensuring seamless and compliant access to cloud-based applications.

Designed and enforced Segregation of Duties (SoD) policies, mitigating security risks by preventing excessive access privileges.

Automated bulk provisioning and de-provisioning workflows, enhancing operational efficiency and strengthening access control mechanisms.

Established compliance-driven access review processes, ensuring adherence to security policies and regulatory standards.

Built custom SailPoint reports and dashboards, providing real-time insights into access certifications, policy enforcement, and user activity analytics.

Integrated SailPoint with AWS IAM and Azure AD, enabling centralized identity governance across cloud and on-prem environments.

Resolved identity-related incidents, including SSO failures and provisioning errors, minimizing business disruptions and optimizing IAM performance.

Strengthened security posture by collaborating with IT and security teams, addressing vulnerabilities within hybrid IAM frameworks.

Developed custom IAM workflows and rules using Groovy and PowerShell, tailoring solutions to unique identity management needs.

Led IAM training sessions for IT administrators and end-users, enhancing understanding and adoption of identity governance best practices.

Maintained and optimized SailPoint environments, applying updates, patches, and new features to enhance security, compliance, and performance.

Created and maintained comprehensive IAM documentation, covering identity configurations, workflows, and governance best practices to ensure standardized IAM operations.

7 Eleven, Irving, Texas April 2019 - July 2020

Sailpoint Developer

Responsibilities:

Engineered solutions to ensure SailPoint services met defined policies and complied with relevant information security requirements.

Deployed Okta for identity authentication, enabling secure access management across enterprise applications.

Utilized IBM Security Identity Manager (ISIM) to streamline identity lifecycle management and integrated Single Sign-On (SSO) and OAuth 2.0 to enhance authentication security.

Configured FMA and Kerberos authentication protocols, ensuring compliance with enterprise security policies and industry standards.

Developed Python-based automation scripts to streamline IAM workflows, reducing manual intervention and improving efficiency.

Designed and maintained identity data structures in MongoDB, enabling scalable and high-performance access management for large-scale environments.

Implemented Privileged Identity Management (PIM) solutions, securing elevated accounts through enhanced monitoring and accountability.

Partnered with business units to optimize identity lifecycle processes, ensuring seamless access while minimizing provisioning delays.

Applied Zero Trust Architecture principles, strengthening security posture by enforcing continuous user verification and minimizing attack surfaces.

Configured Azure Active Directory (AAD) conditional access policies, integrating Multi-Factor Authentication (MFA) for enhanced security.

Developed Java-based applications to integrate identity data processing workflows and customize authentication mechanisms for enterprise requirements.

Created secure REST APIs to facilitate identity provisioning, deprovisioning, and data synchronization between IAM systems and external applications.

Automated access reviews, policy enforcement, and identity validation using Groovy scripting, optimizing IAM workflow execution.

Collaborated with DevOps teams to deploy IAM infrastructure using Infrastructure as Code (IaC), ensuring rapid, error-free deployments.

Managed GitHub repositories for IAM script version control, enabling efficient change management and collaborative development.

Debugged and resolved SailPoint IdentityIQ lock issues, preventing access bottlenecks and ensuring uninterrupted identity processes.

Identified and resolved identity conflicts in SailPoint, improving system stability and reducing downtime during critical operations.

Enhanced IBM Security Identity Manager (ISIM) by integrating OAuth 2.0 authentication, expanding flexible access across multiple platforms.

Configured role-based access controls (RBAC) in Azure Active Directory, optimizing resource allocation and security compliance.

Education:

Masters in Information Technology, University of Cumberlands, 2025



Contact this candidate