Post Job Free
Sign in

Production Support Computer Science

Location:
Dallas, TX
Salary:
60
Posted:
September 15, 2025

Contact this candidate

Resume:

Alekya Aila

SailPoint IIQ Developer

Email: ************@*****.*** Ph No: 972-***-****

PROFESSIONAL SUMMARY:

•9+ years of experience in Identity & Access Management (IAM) with strong expertise in SailPoint IdentityIQ (IIQ) implementation, development, and support.

•Skilled in Identity Lifecycle (Joiner-Mover-Leaver), Access Governance, RBAC, SoD, Certifications, and Compliance Reporting.

•Hands-on in workflows, rules, policies, connectors, certifications, custom tasks, and REST API integrations.

•Experienced in application onboarding, custom connector development, troubleshooting, upgrades, and production support.

•Proficient in access certifications, automated provisioning/de-provisioning, and entitlement management to reduce risk and ensure compliance.

•Strong understanding of IAM protocols like SAML 2.0, OAuth, OpenID Connect, WS-Security for secure SailPoint integrations.

•Experienced in migrations, upgrades, and performance tuning of SailPoint IIQ environments.

EDUCATION DETAILS:

•Bachelor of Computer Science Engineering, Kakatiya College, 2014

•Master of Computer Science Engineering, Trine University, 2017 - 2019

CERTIFICATIONS:

TECHNICAL SKILLS:

•IAM Platform: SailPoint IdentityIQ (IIQ)

•Languages & Scripting: Java, BeanShell, PowerShell, Python

•Integration & APIs: REST, SOAP, SCIM, JDBC

•Governance & Compliance: RBAC, SoD, Access Reviews, Certification Campaigns

•Directories: Active Directory, LDAP, Azure AD

•Databases: Oracle DB, SQL Server, MySQL

•Other Tools: ServiceNow, CyberArk, Splunk, Unix/Linux

PROFESSIONAL EXPERIENCE:

Client: Morgan Stanley, Boston Dec 2023 – Present

Role: SailPoint IIQ Developer Responsibilities:

•Installed, configured, and managed SailPoint IdentityIQ (IIQ) in a large-scale enterprise.

•Onboarded applications into IIQ, configuring schemas, aggregation tasks, and provisioning policies.

•Developed custom connectors using Java, BeanShell, and REST APIs for in-house applications.

•Wrote BeanShell rules (Before/After Provisioning, Validation, and Policy Rules) to implement business logic.

•Automated access workflows, provisioning, and deprovisioning using Java, Python, PowerShell, and REST APIs.

•Utilized REST Web services, SAML 2.0, OAuth, and WS-Security for secure authentication and

authorization in SailPoint IIQ implementations, ensuring compliance with industry security standards.

•Supported SailPoint IdentityIQ configuration tasks including identity lifecycle events, connector integrations, and access certifications.

•Automated identity lifecycle processes (provisioning, de-provisioning, role-based assignments) using Java, BeanShell, and REST APIs.

•Implemented Access Reviews and Certifications in SailPoint for SOX, ISO 27001, and NIST compliance.

•Designed Joiner-Mover-Leaver (JML) workflows for automated lifecycle management.

•Implemented Access Reviews and Certification Campaigns for SOX and ISO compliance.

•Integrated IIQ with ServiceNow to enable ticket-based access requests.

•Provided L3 production support: troubleshooting provisioning errors, fixing connector issues, and resolving policy violations.

•Developed custom SailPoint reports and dashboards for audit and compliance teams.

Client: Meijer, FL May 2022 –Oct 2023

role: SailPoint IIQ Developer Responsibilities:

●Installed, configured, and administered SailPoint IdentityIQ.

●Designed and implemented Identity Lifecycle processes in SailPoint IIQ for employees and contractors.

●Configured LCM workflows for onboarding external/guest users.

●Integrated IIQ with Active Directory, LDAP, and ServiceNow to automate account creation and access requests.

●Developed custom workflows in IIQ for multi-level approvals based on business roles.

●Built and configured SoD policies to enforce compliance across applications.

●Developed custom tasks and rules to handle complex provisioning requirements.

●Managed Access Certification campaigns, including setup, monitoring, and remediation.

●Performed IIQ version upgrades and validated connectors and workflows post-upgrade.

●Troubleshot reconciliation failures and tuned performance for large-scale aggregation jobs.

●Executed system audits and access reviews to validate user access rights and ensure adherence to

security compliance standards.

●Led the implementation of access reviews and role-based access control (RBAC) to ensure compliance with segregation of duties (SoD) and access certifications.

●Collaborated with stakeholders to conduct regular user feedback sessions, incorporating insights into

sprint planning to enhance product features and prioritize improvements.

Client: American Airlines, TX Jul 2019 – Feb 2022 Role: SailPoint IIQ Developer

Responsibilities:

•Installed, configured, and administered SailPoint IIQ across multiple environments.

•Developed custom workflows using BeanShell scripting for provisioning and approval processes.

•Built custom connectors to integrate IIQ with CyberArk, AD, and ServiceNow.

•Automated Joiner-Mover-Leaver (JML) processes with REST API integrations.

•Configured and executed Access Certifications to validate user access across enterprise apps.

•Developed custom rules for account provisioning, entitlement mapping, and validation.

•Provided production support by resolving policy violations, orphan account issues, and failed provisioning.

•Managed access certifications and compliance audits using IIQ campaigns.

•Deployed and supported SailPoint upgrades and patches ensuring minimal downtime.

•Created custom provisioning workflows for Service Accounts and Privileged IDs.

•Configured LCM workflows in SailPoint for onboarding guest/external partner accounts.

•Integrated SailPoint IIQ with Active Directory, ServiceNow, and REST APIs for data synchronization and provisioning.

•Supported SailPoint version upgrades including regression testing and connector validation.

•Integrated SailPoint IIQ with Splunk for centralized IAM log monitoring and alerting.

Client: Big Bazaar Mumbai, India. Sep 2016 – Jul 2017 Role: Software Engineer

Responsibilities:

•Installed and configured SailPoint IdentityIQ connectors for provisioning into AD, LDAP.

•Developed BeanShell scripts for custom provisioning logic.

•Automated user onboarding and offboarding workflows.

•Configured entitlement catalog and application schema mapping.

•Provided support for reconciliation and aggregation jobs, ensuring data consistency.

Client: Big Basket, India. Jun 2014 – Aug 2016

Role: Software Engineer Responsibilities:

•Installed and configured SailPoint IdentityIQ for enterprise IAM requirements.

•Built custom workflows in IIQ for onboarding, approvals, and RBAC.

•Automated provisioning/de-provisioning using REST APIs and PowerShell scripts.

•Developed custom connectors for integrating internal applications with SailPoint.

•Configured Access Certifications and role-based provisioning.

•Assisted with production support and issue resolution for failed jobs and access requests.



Contact this candidate