R
Usha Rani
*******@*****.***
Bloomington IL
PROFILE SUMMARY
IAM Engineer with 9 years of IT experience and with the main focus on Identity and Access Management (IAM) solutions, specializing in SailPoint IIQ, SailPoint IdentityNow (ISC), OKTA, Saviynt, CyberArk, and Entra ID. Adept at designing, implementing, and managing IAM strategies to enhance security, ensure compliance, and optimize user experience. Strong expertise in RBAC, Single Sign-On (SSO), authentication, authorization, and security infrastructure design. Hands-on experience with BeanShell scripting, Java, SQL, and API integrations.
TECHNICAL SKILLS
Identity and access management
SailPoint IIQ
IDNOW
Java/J2EE
Identity Security Cloud
JSF
JDBC
Servlets
XML
JavaScript
Bean Shell
MS-SQL, Oracle
Apache web server
Tomcat
Windows
Linux
EXPERIENCE
IAM Analyst/Sailpoint Engineer
PWC - April 2024 to March 2025
Created birthright roles for newly implemented applications based on the classification of the identity being granted the entitlement.
Hands-on experience with SailPoint IIQ 8.x, including application onboarding, custom connectors, rules, workflows, and API integrations.
Developed a project for improving the certification cycles, increasing the frequencies for only new users who require certification.
Enhanced roles to adjust to current business changes, both removing and expanding the entitlements associated with the business change.
Role-minded for creating new roles based upon determined entitlement dynamics to existing applications and new applications, expanding the control of privileges being provided.
Designed custom tasks and custom reports to cater to client needs in IIQ (SailPoint).
Developed various reports, such as the Uncorrelated Accounts Report, New Accounts Report, etc.
Build your own custom Java classes, custom rules.
Building and configuring SailPoint IIQ in-built tasks, like Account Aggregation, Group Aggregation, Identity Refresh, System Maintenance, Check Active Policies, Certification Refresh, Run Rule, etc.
Worked on the Identity Access Management (IAM) project to integrate applications with SailPoint IdentityNow, and configured the roles, and assigned the entitlements for automated provisioning.
Successfully integrated SailPoint IdentityNow with CyberArk Privileged Access Manager (PAM), enabling centralized governance of privileged accounts and safes.
Utilized SailPoint's out-of-the-box (OOTB) connectors to establish seamless communication between IDN and CyberArk environments.
Configured aggregation of CyberArk safes and accounts into IDN, allowing for comprehensive visibility and management within a single platform.
Responsible for documenting, development testing, and overall support of the SailPoint IdentityIQ implementation project.
Hands-on experience in working with different application connectors in SailPoint IdentityNow, including the web services, JDBC, and directory services.
Integrated with the ServiceNow ticketing system using the SailPoint IdentityNow service desk module.
Configured VA servers and set up the VA cluster as part of the SailPoint IdentityNow migration.
worked on Azure AD..Setting up Azure AD as a managed application Implementing account aggregation to pull user and group data from Azure AD into SailPoint,Configuring correlation rules to match Azure AD accounts to IdentityNow identities,Scheduling regular imports of Azure AD users, groups, and entitlements.
Heavily involved in writing BeanShell scripting as required to automate tasks.
Worked on PowerShell scripting to configure the external reports and access the SailPoint IdentityNow APIs.
Configured identity profiles and made all the automated provisionings configured for all the authoritative sources..
Experience working with other application groups, and presenting system design documents.
SailPoint Analyst/Developer
SAIC/VITA - Jun 2023 to Mar 2024
Implemented SailPoint according to the functional and non-functional requirements.
Setup IDN Identity Security Cloud Test and Production Environments.
Worked with Sailpoint support and created multiple Sources in Test and Production.
Helped setup Virtual Servers and Communicate with Virtual Servers using Putty.
Created Firewall ServiceNow tickets needed and worked with numerous Towers Unisys, eplus, Atos.
Replacing existing systems SailPoint IIQ and one Identity Quest Active Role (ARS).
Created Roles and Access Profiles.
Automated AD Creation with Entitlement Access.Updated Identity Profiles and tested lifecycle state actions.
Integrated Azure Active Directory with SailPoint IdentityNow, configuring automated provisioning/deprovisioning, managing entitlements (groups, roles, licenses), and implementing SCIM-based connectors. Designed and executed Access Review campaigns involving Azure AD resources to meet compliance standards. Managed entitlement ingestion, role mapping, and audit reporting to support RBAC, SOX, and GDPR requirements. Troubleshot connector sync issues and extended schemas to handle custom attributes in enterprise environments.
Created Reports and Elastic Searches. Tested API calls from Okta Environments.
Created Sheets in the Access Intelligence Center exported and subscribed users to different sheets/reports with Segregation based on Agencies.
Helped integrate New Hire Form API calls from ServiceNow to IdentityNow.
Successfully passed attribute data from snow to IdentityNow ISC Identity Security Cloud.
Experience in RBAC (Role-Based Access Control) analysis and implementation.
Worked with Active Directory, and LDAP/UNIX groups for Identity and Access Management.
Experience in SailPoint tool customization, report generation, integration with end/target systems, SailPoint APIs, and application development.
Conduct workshops with application and infrastructure teams about onboarding privileged accounts.
Worked on creating identity access for the employees, and managing the certifications and provisioning accordingly with the SailPoint Identity IIQ.
Expertise in User Life Cycle Management and the implementation of various workflow designs with different application resources.
Managed projects for the implementation of SailPoint IIQ, including coordinating with vendor leadership, technical services leadership, and end-user customers.
Understanding of directories (AD/LDAP) and group structures, policies, etc., SAML 2.0, enterprise-level role mining, role-based access control (RBAC), multi-factor authentication (MFA), single sign-on (SSO), PAM (privileged account management)/ (privileged identity management), entitlement management, and identity management.
Excellent knowledge and experience in implementing user provisioning, credential management, workflows, forms, application integration, connectors, reports, and roles.
Provided use cases and business processes for support groups on role, entitlement, provisioning, and de-provisioning.
Provisioning and access governance experience, with an understanding of security on systems such as AD, LDAP, Oracle, and manually provisioned applications.
Direct provisioning using direct connectors for the integration of target applications.
Performed integration with multiple applications, such as flat file and LDAP.
SailPoint Engineer/Developer
Toyota Financial Services/ Sep 2022 to May 2023
Onboarded various client-specific applications.
Participated in CyberArk integration with SailPoint for PAM accounts.
For application onboarding, gather information with the Application Onboarding questionnaire and the Attribute-Mapping questionnaire.
Installed and configured Identity Access Management, SailPoint IdentityIQ, and Life Cycle Manager components in client environments.
Configuring the applications using Active Directory, LDAP flat file, web services, and JDBC connectors to load the identity cubes.
Developed different custom reports using the IIQ reporting system.
Worked on SOD policies, workflows, and developed custom tasks.
Customized UI configuration from the debug page to run tasks frequently through the task schedule.
Worked on various certifications, developed custom tasks, and reports.
Ensure that the requirements gathered, processes defined, and use cases documented follow the out-of-the-box configuration.
Customization as much as possible.
Used application integration to get data from different applications.
Design correlation and data-loading tasks in IdentityIQ and IDNOW.
Implemented provisioning, de-provisioning, end-user self-service, and other related functionalities for a new application.
Communicate with technical management about the progress of the implementation process.
Developed build map rule, creation rule, and customization rule to create Employee and Contractor user accounts in SailPoint from their current application's exported feed file.
Migrated users from Active Directory to Azure Active Directory.
Worked on various certifications, developed custom tasks, and reports.
Participate in all SailPoint deployment activities: connector configuration, custom rule development, workflow configuration and development, and third-party system integration.
Ensure that the requirements gathered, processes defined, and use cases documented follow out-of-the-box configuration and customization as much as possible.
Participate in User Acceptance Testing, and bug-related reengineering efforts.
Built Joiner, Mover, and Leaver workflows to maintain user accounts.
Created and ran the aggregation task to bulk load authoritative source data from Active Directory, Exchange, LDAP, SAP, and others.
Tested different types of connectors in various environments, like development, UAT, and production.
SailPoint Engineer
Rivian / Oct 2020 to Aug 2022
Created birthright roles for newly implemented applications based upon the classification of the identity being granted the entitlement.
Developed a project for improving the certification cycles, increasing the frequencies for only new users who require certification.
Enhanced roles to adjust to current business changes, both removing and expanding the entitlements being associated with the business change.
Designed custom tasks and custom reports to cater to client needs in IIQ.
Developed various reports, such as the Uncorrelated Accounts Report, the New Accounts Report, etc.
Implementing password reset management for the client.
Implementing End-User Access Request.
Developing workflows and application connectors.
Integrated with the ServiceNow ticketing system.
Built joiner, leaver, and mover workflows on Identity IIQ and event for SD integration.
BMC Remedy to ServiceNow Migration.
Building and configuring SailPoint IIQ, IDNOW, and in-built tasks like account aggregation, group aggregation, identity refresh, system maintenance, check active policies, certification refresh, run rule, etc.
Worked on the Identity Access Management (IAM) project to integrate applications with SailPoint IdentityIQ.
Responsible for documenting, development testing, and overall support of the SailPoint IdentityIQ implementation project.
Hands-on experience in working with workflows and customizing workflows to meet business requirements.
Integrated with the ServiceNow ticketing system.
Build your own custom Java classes, custom rules.
Developing custom tasks, such as a task to refresh the statistics of all roles.
Developing custom Quick Links, business processes/workflow, and rules.
Involved in writing BeanShell scripting as required to automate tasks.
Experience working with other application groups and presenting system design documents
SailPoint Engineer
Bissell Inc/ Feb 2019 to Oct 2020
Company Overview: MI
Integrated SailPoint Identity IQ with multiple external databases and applications for provisioning and de-provisioning using Active Directory and LDAP
Build and configure SailPoint in-built tasks like aggregation, ID, refresh, Schedule tasks, Correlation etc
Implemented application connectors, certifications, workflows, rules, provisioning policies, e-mail templates, reports and tasks using SailPoint Identity IQ
Involved in configuration and development of SailPoint Life Cycle Events (LCM)
Assisted in updating SailPoint IIQ work groups and monitor SailPoint IIQ product functionalities
Performed installation and configuration of SailPoint identity IQ
Managed client requirements and configure SailPoint connectors for various applications
Setting up integration of ServiceNow with SailPoint IIQ to retrieve the user ad group data
Built LCM workflows to maintain user accounts
Participated in all SailPoint deployment activities like connector configuration, custom rule development, workflow configuration and development, third party system integration
Worked on Identity Access Management (IAM) project to integrate applications to SailPoint Identity IQ and IDNOW
Responsible for documenting, development testing & overall support of SailPoint Identity IQ implementation project
Used ServiceNow to utilize provisioning engine within SailPoint via REST based Workflow to generate Service Request Tickets to ServiceNow via SOAP based web services
Administrating Active Directory Domain Services and Implementing Group policy objects
Worked with different teams in implementing OAuth for different applications
SailPoint Developer
Bay4 Energy Services/ Dec 2017 to Jan 2019
Installation and configuration of SailPoint application across all environments through development, stage, and production
Created the Identity Quick links, Forms, Rules, and Custom Objects to design the workflows
Configured birthright roles and business roles per customer requirements
Designed and configured the default configuration for access reviews in Identity IQ
Developed the Joiner, Leaver and Mover workflows based on identity trigger rules
Designed and developed custom workflows with multi-level approval and time-based escalation for approval process, profile update and self-service, changing the profile of user and modifications to groups
Developed custom rules, forms and policies using XML and Bean Shell
Designed and developed a role model and role methodology to be able to configure and import roles bases on application extracts
Scheduled tasks using crone settings on task definition from the debug page
Configured and developed provisioning rules for AD and other JDBC applications
Design and implement new custom workflows for provisioning
Configured required entitlements from applications
Client: CIG softech
Chennai,India May 2013-March2015
Database Admin
Responsibilities
Cloned Oracle Apps Databases/Environments.
Upgraded Oracle applications from 11.5.10.2 to 12.2.5
Upgraded Oracle applications database from 11.2.0.4 to 12c
Added new languages to Oracle Applications and applied country specific localizations
Integrated third party applications into E-Business Suite.
Performed RUP patching and upgraded Oracle Apps databases.
Resolved Oracle Applications issues with Forms, Apache, CM, and Workflow.
Applied patches including thorough Patch analysis.
Resolved configuration issues raised by development teams.
Performed Administration tasks by using AD Utilities.
Applied Quarterly release of Oracle Critical Patch Updates to Oracle Application Databases.
Worked on user account management - creating users, disabling users and responsibility management.
Managing concurrent managers -ensure system is running smooth by monitoring throughput and
watching for long running requests.
Performed sysadmin tasks as per the requirement.
Copying new forms, reports, custom code to production environment from Development.
Worked on changing passwords of apps, sys, system, and specialized users every quarter in TEST, DEV and
PROD.
Documented tasks in coordination with onsite team.
Decommissioned Application instances.
Installed new products as per business requirement.
Applied monthly payroll patches and latest vertex payroll update for HRMS Products.
EDUCATION
Masters from Mahatma Gandhi University 2013
Bachelor of Science from Kakatiya University 2001
REFERENCE
Provided upon request
CERTIFICATIONS
AWS Certified Architect Associate
COBIT Certification
WEBSITES / PROFILES
www.linkedin.com/in/jghik