Gowtham Reminisetty
IAM SailPoint Engineer
*******.***********@*****.***
Professional Summary:
7+ Years of IT professional experience in Analysis, Design, and Development of enterprise applications using Java and Identity and Access Management (IAM) technologies
Experienced in developing POCs for emerging IAM solutions, providing recommendations that align with industry best practices and client requirements. Developed custom connectors and workflows to interact with Okta APIs.
Hands-on expertise with SailPoint IdentityIQ, IdentityNow, LCM, cloud IAM (AWS, Azure), and ITSM integrations.
Experience integrating SailPoint with ServiceNow for the service desk module.
Experience Collaborating with cross-functional teams (audit, compliance, ops) to align IAM strategies with organizational security goals.
Proficient in Azure Active Directory management, including user identity and group administration.
Experience with JIRA for task and bug tracking.
Eperience managing 10K+ identities, automating Joiner–Mover–Leaver lifecycle, and supporting SOX, HIPAA, and PCI compliance through access certifications, SOD policies, and audit-ready reporting.
Good experience with Aggregation and Provisioning Process using connectors like Active Directory, Database, and LDAP.
Experience using Microsoft Entra ID, Okta, and Azure AD for hybrid environment protection.
Experience in network protocols, Firewalls, and Communication Network design.
Implemented and tailored workflows, configurations, and rules in SailPoint to enhance identity governance and administration.
Efficient use of Microsoft VISIO as technical documentation and presentation tools.
Experience Working on API Gateway Migration Utility Migrate Out, migrate in, and Manage Mappings
Education qualification: Master’s in Information Systems at Saint Louis University, Saint Louis city, MO
Technical skills:
Skill Area
Technologies / Tools
Identity and Access Management (IAM)
SailPoint IdentityIQ, SailPoint IdentityNow, SailPoint Life Cycle Manager (LCM), User Provisioning, De-Provisioning, RBAC, ABAC, Access Certifications (UAR), Privileged Access Management (PAM), IAM lifecycle management (10,000+ users)
Access Management & Security
Multi-Factor Authentication (MFA): Microsoft Azure, Okta, ForgeRock; Single Sign-On (SSO): SAML 2.0, OAuth 2.0, OpenID Connect (OIDC), WS-Federation; Azure Active Directory (AAD), Azure Conditional Access, Privileged Identity Management (PIM), ForgeRock Identity Management & Gateway, Segregation of Duties (SOD) management and violation remediation
Cloud Platforms & Integration
Azure, Google Cloud Platform (GCP), AWS Identity and Access Management (IAM), AWS Lambda, AWS Security Token Service (STS); Cloud IAM migration (Azure, AWS); Integration of IAM solutions with cloud services (SSO, Federation, Access Control)
Automation & Infrastructure Management
Configuration Management: Chef, Puppet, Ansible; Automating provisioning and IAM deployments; Streamlining access management processes and infrastructure via scripting (PowerShell, REST APIs)
Programming & Scripting
PowerShell, XML, JSON, REST API integration, SCIM, SQL, Shell scripting, Java (SailPoint custom rule development)
DevOps & CI/CD Integration
JIRA, ServiceNow, CI/CD pipeline integration for IAM policies; Automation of IAM services in Agile environments
Professional Experience
IAM SailPoint Engineer November 2023 – Present
TD Bank – Mount Laurel, NJ
Designed and implemented a solution which manage the Identity lifecycle of almost all applications with the enterprise, without directly controlling the identity store within the application.
Installed and deployed SailPoint IdentityIQ and IdentityNow to automate identity governance workflows, including a seamless migration from IdentityIQ to IdentityNow, enhancing overall system efficiency, scalability, and the end-user experience.
Designed and implemented end-to-end Identity Lifecycle Management processes (Joiner–Mover–Leaver) across multiple enterprise systems, ensuring seamless provisioning and deprovisioning of user access.
Provided L3 production support for SailPoint including aggregation failures, provisioning errors, stuck workflows, and identity sync issues.
Partnered with Internal Audit and GRC teams to remediate IAM audit findings.
Managed IAM audit logs and repository data using Microsoft SQL Server, tuning queries for performance across large-scale identity datasets; also experienced with MySQL, PostgreSQL, and Oracle DB in IAM contexts.
Configured and maintained SailPoint IdentityIQ connectors (Active Directory, Azure AD, Workday, SAP, ServiceNow, JDBC, REST, SCIM) to automate user onboarding and access synchronization.
Integrated SailPoint with ServiceNow, automating ITSM processes such as access requests, incident tracking, and compliance reporting for enhanced operational efficiency.
Developed and customized Beanshell rules, workflows, and provisioning policies to meet complex business and compliance requirements.
Implemented OIDC protocols to ensure seamless user experiences and heightened security measures.
Enforced dynamic role and group governance in Azure Active Directory and Ping Identity, using Just-in-Time (JIT) provisioning and RBAC policies to manage hybrid cloud access.
Seamlessly integrated IdentityIQ and SailPoint with AWS IAM to manage user identities, roles, and permissions within the AWS cloud ecosystem.
Leveraged AWS Lambda to create custom IAM automation scripts for tasks such as temporary access provisioning and resource tagging.
Implemented AWS Security Token Service (STS) to enable secure access to AWS resources from both IdentityIQ and SailPoint.
Built custom IAM dashboards with real-time monitoring, access pattern analytics, and compliance visualizations using Splunk and Elastic Stack.
Automated 70% of access provisioning across 50+ applications.
Designed and maintained ForgeRock IAM infrastructure to implement centralized authentication and authorization policies, enabling robust access control and policy enforcement.
Responsible to manage Administration functionality of the SailPoint such as loading data, create roles, create policies, scheduling tasks and certifications and reports.
Included the improving Identity and Access Management (IAM) capabilities by controlling access to applications and systems that contain critical and sensitive information.
Development of Lifecycle Manager Workflows, Lifecycle Events, Certification Events, Custom Email Templates and Task Definitions.
IAM SailPoint Engineer August 2021- October 2023
Abiomed – Danvers, MA
Implemented controls mapping clinical application accounts (e.g. Cerner) to AD identities; eliminated duplicate/legacy accounts and enforced identity governance for access to patient data.
Developed custom reconciliation processes and connectors for administrative and clinical systems to support HIPAA compliance and audit readiness.
Managed access certification campaigns and entitlement cleanup for both internal staff and contractors to reduce privileged / unused access.
Collaborated with clinical system owners to define least-privilege roles and built automated on boarding/off boarding workflows triggered by HR events.
Experience integrating IIQ with ITSM tools like ServiceNow.
Leveraged IBM Security Verify Directory (ISVD) and LDAP for centralized directory management and authentication.
Performed root cause analysis using SailPoint logs, database queries, and Splunk dashboards.
Supported SOX, HIPAA, PCI-DSS audits by implementing quarterly access certifications and automated evidence reporting.
Implemented role-based and attribute-based access control (RBAC/ABAC) models to streamline access management and enforce least privilege principles.
Conducted access certifications (attestations) and built SOD (Segregation of Duties) policies to support SOX and internal compliance audits.
Performed access reviews, role mining, and entitlement analysis to eliminate orphaned or over privileged accounts.
Built and optimized custom connectors and workflows for non-standard applications using Java and SailPoint SDK.
Provided use cases and business processes for support groups on role, entitlement, provisioning and de- Provisioning.
Develops SailPoint Lifecycle Manager Workflows, Lifecycle Events, Certification Events, Custom Email Templates, and Task Definitions. Configures Organizational, Business, and IT roles for various application entitlements.
Analyzed and implemented application data workflows by working with architecture and security access groups and created templates.
Perform Installation and configuration of SailPoint IdentityIQ.
Held meetings within team to understand the inflow of issues and identify recurring events and propose permanent solutions for the same.
Develop custom SailPoint Build Map Rules and Workflows as per the business needs.
Setup applications Active Directory, LDAP, Oracle and Flat Files.
IAM SailPoint Engineer March 2018- July 2021
Walmart – Bentonville, AR
Successfully configured and integrated 30+ enterprise applications using out-of-the-box SailPoint connectors, while ensuring alignment with corporate security policies, regulatory requirements (SOX, PCI), and governance frameworks.
Onboarded 20+ enterprise applications into SailPoint IdentityIQ/IdentityNow over 10 months, increasing access automation by 70% and reducing manual provisioning effort by 40%.
Possess foundational understanding of directory services (AD/LDAP), group structures, enterprise role mining, and implementation of Role-Based Access Control (RBAC).
Migrated 100% of identity governance from IIQ to IdentityNow, maintaining zero loss of entitlements and achieving on-time delivery within budget.
Developed and maintained Java-based IAM policies and REST API integrations to support identity provisioning, deprovisioning, and policy enforcement across internal platforms.
Utilized AWS Lambda to develop custom automation scripts for IAM tasks, including temporary access provisioning and automated resource tagging.
Implemented RESTful services using SailPoint's REST Application module for seamless integration with external systems.
Developed custom automation scripts using PowerShell, AWS Lambda, Chef, Puppet, and Ansible to support mailbox provisioning, resource tagging, and identity workflows, improving operational efficiency and minimizing manual overhead.
Mentored junior IAM developers in SailPoint best practices, rule writing, and connector configuration, improving overall team productivity.
Supported Zero Trust adoption by implementing just-in-time (JIT) access, password less authentication, and adaptive access policies for high-risk transactions.
Gathered requirements, defined IAM processes, and developed detailed use case documentation to support project execution.
Led end-to-end HRMS integration with Workday and SuccessFactors, ensuring joiner-mover-leaver events triggered accurate role and entitlement assignments.
Led and supported SailPoint Identity IQ and Identity Now implementations, contributing to full lifecycle design, configuration, and deployment of workflows, policies, certifications, task definitions, and access review campaigns.
Administered core SailPoint functionality including data loading, role and policy creation, scheduling of tasks and certifications, and report generation.
Exposed SailPoint functionality through RESTful APIs and integrated with enterprise API Gateway, enabling third-party systems to consume IAM services securely.
Integrated Privileged Access Governance (PAG) in SailPoint with CyberArk PAM, ensuring privileged accounts followed the same governance workflows as standard user identities.
Implemented connector-level transformations and aggregation filters to tailor data ingestion from AWS IAM and Entra ID for policy enforcement and reporting.