Emiliana Sena
Professional Summary:
•Strong IT Experience with major portion on IAM, specialized in SailPoint IdentityIQ. Information Security professional with over 8+ years of experience in identity management, access management, role management, compliance management, solution design, system integration, implementing and deploying large-scale identity management solutions for large enterprises using SailPoint, Oracle, and Sun products.
•Involvement in installation, configuration, deployment, troubleshooting, and implementation of SailPoint Projects.
•Experience in Compliance Management Solutions, Lifecycle Manager, and User Provisioning.
•Integrating SailPoint IIQ into Active Directory and bulk loaded all users from a flat-file dump from their source.
•Develop and customize configurations, Email templates, rules in SailPoint IdentityIQ.
•Creating and modifying workflows for implementing business flows, and performance tuning and problem determination for IAM solution.
•Experience integrating IIQ with ServiceNow for service desk module.
•Developed a custom form in the SailPoint UI so that various admins can create user accounts manually through UI and provision users.
•Strong experience in Quick link configuration and dynamic scoping in IIQ.
•Customized workflows based on customer requirements.
•Experience in developing custom workflows and rules in BeanShell.
•Designed and implemented SailPoint build processes, code migration, and source control use.
•Experience in developing and configuring custom SOD policies using rules.
•Continuous Improvement, Customer-focused and highly organized.
•Exceptional analytical, oral, written, interpersonal, and troubleshooting skills.
•Ability to handle multiple tasks and work independently as well as in a team.
•Ensure requirements gathered, processes defined, and use cases documented follow out-of-the-box configuration vs. customization as much as possible.
Technical skills:
Identity and Access Management: SailPoint IdentityIQ 6.x, Oracle Identity Manager, Sun Identity Manager, Sun Access Manager, Sun OpenSSO, Oracle Access Manager, Oracle Entitlement Server, Oracle Identity Federation, Sun Role Manager, Oracle Identity Analytics, Kerberos and PKI, Site Minder, ForgeRock OpenAM, ForgeRock OpenIDM, ForgeRock OpenDJ
Integrated Applications: AD, Exchange, Lotus Notes, Sun Directory Server, Oracle Internet Directory, Oracle Virtual Directory, Novell eDirectory
Languages: Java, JavaScript, PL/SQL, Perl, Ruby, Unix Shell Scripting, XML, SOAP, Web Services
Operating Systems: Sun Solaris, AIX, Windows NT/2000, UNIX, Linux, RHEL
Application Servers: WebLogic, WebSphere, Apache Tomcat, JBoss, Oracle Application Server
(OAS, OC4J)
Design/Build/IDE Tools: Eclipse, JDeveloper, NetBeans, Apache Ant
Configuration Management: Perforce, CVS
Database Technologies: Oracle, MS SQL, MySQL
Education:
Master of Science (MSc), Computer Systems Networking and Telecommunications, 2010
Polytechnic University of Tirana
Bachelor (BSc), Telecommunications Engineering, 2006
Polytechnic University of Tirana
Professional experience:
Raytheon Technologies, NYC, New York Aug 2021 - Sep 2024
IDM Engineering (SailPoint Identity Now)
Responsibilities:
•Demonstrated expertise in SailPoint IIQ and Identity Now by building and configuring aggregation tasks, customizing workflows using Java, onboarding applications with provisioning requests, and integrating ServiceNow connectors to automate identity processes.
•Support on SailPoint Identity Now tool.
•Evaluated SailPoint-IIQ by Life Cycle Management, Access Review/Certifications, Policy Management, Role-Based Access Control, and Connector modules.
•Utilized Azure AD for synchronization of user identities, ensuring consistency across multiple identity management systems and enabling automation of user lifecycle events within SailPoint IIQ.
•Handled end-to-end development, configuration, and administration of Identity and Access Management (IAM) processes by implementing SailPoint Identity Now features such as aggregation, provisioning workflows, access certifications, and ServiceNow integrations.
•Utilized Java for customizing workflows, developing SailPoint tasks, and integrating ServiceNow web services into SailPoint Identity Now.
•Build and Configure SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
•Configuration and implementation of ServiceNow web service, and its Integration into SailPoint.
•Assisted in configuring and supporting PAM tools, specifically CyberArk, to manage and safeguard access to highly sensitive resources, ensuring proper policies and workflows were in place for privileged user access within the SailPoint Identity Now platform.
•Implemented Self-service feature, Password feature, Provisioning feature, and policies in SailPoint.
•Maintained user account workflows using form Joiner, Mover, Rehire, and Leaver.
•On-boarded applications using Provisioning Birthright application’s requests in IIQ.
•Implemented and scheduled various types of User Entitlement Reviews for applications and databases in a timely manner to all the business areas across the organization.
•ServiceNow Ticket management, manage user access on SailPoint Identity Now tool.
Shelter Insurance NYC, New York Nov 2019 – July 2021
SailPoint Developer
Responsibilities:
•Installation and configuration of SailPoint IIQ as required by design solution.
•Created various reports like Role composition report, Identity Reports, and Application attribute reports for IIQ.
•Evaluated SailPoint-IIQ by Life Cycle Management, Access Review/Certifications, Policy Management, Role-Based Access Control, and Connector modules.
•Utilized SailPoint IIQ and IDN features like Life Cycle Management, Role-Based Access Control, and provisioning workflows to streamline user access management, while integrating data feeds and customizing connector configurations for efficient identity automation across applications.
•Supported Identity and Access Management (IAM) functions by configuring SailPoint IIQ features such as Life Cycle Management, Access Reviews, Role-Based Access Control, and provisioning workflows to streamline user access management across the enterprise.
•Analyzed the application before onboarding to get extract of application with the user unique ID, access levels, and permission and do deep dive sessions.
•Directory services such as Active Directory and LDAP, and proficient in scripting languages including PowerShell, Python, Bash, and JavaScript.
•Collaborated with the provisioning team to onboard applications into SailPoint IIQ, integrating Azure AD for streamlined user account management and improved role-based access control across enterprise applications.
•Implemented Self-service feature, Password feature, Provisioning feature, and policies in SailPoint.
•Maintained user account workflows using form Joiner, Mover, and Leaver.
•Worked alongside security teams to implement PAM solutions to restrict and monitor privileged access to critical systems, ensuring compliance and minimizing security risks in a SailPoint-powered IAM environment.
•Involved with existing Provisioning Team for the application in order to make it fit into IIQ and to get the existing User Access Management (UAM) model.
•On-boarded applications using Provisioning application’s requests in IIQ.
•Implemented and scheduled various types of User Entitlement Reviews for applications and databases in a timely manner to all the business areas across the organization.
•To implement Change Requests in IIQ, Drawing Scheduling of Events, and Shape of the weekend for Business check Outs.
•Develop Role Model Templates based on the applications onboarding by getting engaged with various business people and TS also. Specify and upload application data feed onto IIQ application.
Raymond James Financial, St. Petersburg, FL July 2017 - Sept 2019
SailPoint Developer
Responsibilities:
•Involved in Application development by using connector configurations like delimited, JDBC, and Active Directory, etc.
•Involved in the design, configuration, and administration of Identity and Access Management (IAM) solutions by developing SailPoint connectors, rules, workflows, policies.
•Developed the rules like build map, correlation, and manager correlation rules.
•Developed out-of-the-box reports to track policy violation activities.
•Involved in the design, configuration, and administration of SailPoint IIQ and IDN solutions by developing connectors, rules, workflows, and policies to streamline identity management and enhance workflow automation across the enterprise.
•Worked on risk score of a policy to control notifications and corrective actions when a violation is detected.
•Involved in the developing workflows (JML process) with two-level approvals.
•Applied Java-based scripting to develop custom SailPoint rules, workflows, and support debugging and testing of IdentityIQ applications.
•Developed Rules like Build Map, Correlation, Exclusion, Policy Violation, Policy Formatting, etc., as part of connector development.
•Developed Composite Applications using SailPoint IIQ.
•Involved in securing privileged user access by integrating Identity and Access Management (IAM) solutions with PAM tools, enhancing the governance and monitoring of privileged accounts and their access levels across applications.
•Created vision, business process models, use case diagrams, activity diagrams, and state chart diagrams.
•Developed code for rules, debugging, and testing applications.
•Worked on integrating Azure AD with SailPoint IIQ to enhance identity management and enable seamless user provisioning across cloud-based and on-premise applications.
•Determined user/business/functional requirements.
•Configuration of Roles, Policies, and Certifications for governance compliance.
•Build and Configure SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
•Configuration and development of SailPoint Life Cycle Events (LCM).
•Customizing and branding of SailPoint solution.
BCBS, Grand Prairie, Texas April 2016 - May 2017
SailPoint Developer
Responsibilities:
•Designed, developed, and implemented Identity and Access Management (IAM) solutions, including onboarding client-specific applications, customizing certifications, and managing user access across different geo-locations.
•Involved in designing, development, and implementing of IAM tools.
•Involved in onboarding client-specific Applications.
•Developed Audit Detail Report, SOX Report, and Remediation Report as per client needs.
•Utilized Java scripting to develop BuildMap rules, Pre-Iterate rules, Delegation rules, and customized certifications within SailPoint to meet client-specific requirements.
•Involved in designing and implementing Custom AD connectivity in order to pull data from AD.
•Developed BuildMap rules, Pre-Iterate rules, and Customization rules.
•Developed Delegation rules, customized certifications to send email notifications as per client needs.
•Developed custom certifications to cater client needs.
•Designed and deployed Identity & Access Management solution to improve user experience, meet compliance, and reduce costs.
•Worked on various Certifications, developed custom tasks and reports.
•Worked on Scopes to manage users in different geo-locations.
•Worked on custom and out-of-box workflows.
Western Union, Denver, Colorado March 2013 - Feb 2016
SailPoint Developer
Responsibilities:
•Design, develop, test, support, and deploy the desktop application for Supply Chain Management in J2EE, Oracle WebLogic.
•Gathered the requirements and created the technical design documents.
•Researched and evaluated software-related technologies and products related to J2EE architectural designs.
•Assisted and supported other team members on multiple projects.
•Ensured compliance with the documented software processes and procedures throughout the lifecycle.
•Designed and developed testing and maintenance procedures and activities.
•Developed and wrote the coding that meets the customer requirements.
•Created the necessary new documentation and updated the existing documentation.
•Created Password policies in AD and OID.
•Integrating OIM and OAM applying Single-Sign-On.
•Involved in the creation of tasks for lifecycle management of users.
•Configuring and customizing self-registration forms.
•Developed technical documents and test cases for SIT/UAT.