You are on page 1of 5

KAZI HAMIDULLAH

Kazi796bng@gmail.com
646-475-1487

SUMMARY:

 Information Security professional with over 12+ years of experience in identity management, access
management, role management, compliance management, solution design, system integration,
implementing and deploying large - scale identity management solutions for large enterprises using
SailPoint, Oracle and Sun products
 Experienced in IAM (Identity and Access Management) and responsible to install, integrate and deploy
the IdentityIQ OR Identity Now product in client environments.
 Extensive experience in financial and access management projects.
 Primarily focused on application integration (strong Java), production support and workflow
development.
 SailPoint Identity Now Implementation strategized and implemented Identity and Access Management
solutions for the client to strengthen the security posture and increase usability
 Worked with Active Directory, LDAP/UNIX groups, Networks, Human Resource systems for Identity and
Access Management.
 Experience in Java and SailPoint Bean shell development
 Experience with SSD accelerator pack to automate the code and XML artifact deployments.
 Strong understanding and development knowledge of RESTful Web Services and Microservices
 Experience with development of Web Services APIs (JSON / XML / RPC).
 Experience in Java, J2EE, and XML programming languages
 Working knowledge of Java, Web Services, SOAP, REST and SQL
 Working knowledge of scripting languages such as shell, Perl and JavaScript
 Experience in QA & Testing tasks like bug reporting and tracking, unit testing, GUI testing, and
integration testing.
 Developing automation testing framework using Selenium WebDriver by following java.
 Developing framework for Functional Test Automation using Selenium, Java and TestNG.
 Strong experience in PowerShell Scripting to create/Delete/Querying
 Experienced Identity Access Management professional in the implementation of Access Review and
Provisioning solution
 Experience in managing applications access in Okta and Active Directory.
 Experience in automating day-to-day activities by using Windows PowerShell.
 Expertise in DevOps tools in integration with Confidential Web Services for Continuous Delivery &
Automation, Monitoring Metrics and Logging, Security, Governance and Validation, High Availability and
Elasticity.
 Provisioned and maintained local and SaaS-based user accounts using Okta SSO and Google
Workspace Admin
 Managed projects for design, configuration and implementation of SailPoint IIQ, including coordinating
with vendor leadership, technical services leadership, and end user customers.
 Understanding of directories (AD/LDAP) and group structures, policies, SAML 2.0, Frame set up for
enterprise level Role mining, Role Based Access Control (RBAC), Multi Factor Authentication (MFA),
Single Sign on (SSO), PAM (Privileged Account Management)/ (Privileged Identity Management),
Entitlement Management and Identity Management.
 Excellent knowledge and experience in implementing user provisioning credential management,
workflows, forms, application integration, connectors, reports and roles.
 Provided use cases and business processes for support groups on role, entitlement, provisioning and
de - provisioning.
 Create AD users and groups for safe delegation and updates.
 Conduct workshops with application and infrastructure teams about on-boarding privileged accounts.
 Assist application teams with CyberArk application Identity Manager Integrations and linked accounts.
 Generating various reports in IIQ like Identity Reports, Orphan Account reports, Account Discrepancy
reports, Role composition report and Application attribute reports etc.
 Coordinating with existing Provisioning Team for the application in order to get the existing User Access
Management (UAM) model to make it fit in to IIQ.
 Extensive knowledge in Java, J2EE, Java SE, STRUTS, SPRINGS, EJB, Servlets, JDBC, Java Beans
 Working knowledge of Java Web Services with real time knowledge using SOAP, OAuth 2.0 and REST.
 Strong experience in RDBMS technologies like SQL, Sub Queries, Stored Procedures, Triggers,
 Have excellent technical leadership, analytical, problem solving, communication and interpersonal skills,
with ability to interact with individuals at all levels and can work as a part of a team as well as
independently
 Experience with Implementation and Administration of Sail Point for large population of users
 Experience in SailPoint tool customization, Report Generation, Integration with end/target systems,
SailPoint API's and Application Development
 Experience with Installation and configuration of CyberArk Vault, CPM, CyberArk PVWA, OPM
CyberArk PSM, AIM, and PSM SSH proxy Architecture and design.
 Experience on IAM products from ForgeRock (OpenIDM, OpenAM and OpenDJ) and building IAM
solutions implementing OAuth2 and ODIC specification
 Extensive experience onboarding Windows, UNIX, Database servers, RACF and Network device into
CyberArk
 Exposure in design and architecture of PIM using Cyber-Ark.
 Daily administration of CyberArk Enterprise vault Management includes
 Safe Management, Master Policy Management, Platform Management and Access Management.
 Account management i.e. adding /deleting accounts /group management
 Create AD users and groups for safe delegation and updates.
 Conduct workshops with application and infrastructure teams about on-boarding privileged accounts.
 Assist application teams with CyberArk application Identity Manager Integrations and linked accounts.
 Generating various reports in IIQ like Identity Reports, Orphan Account reports, Account Discrepancy
reports, Role composition report and Application attribute reports etc.

PROFESSIONAL EXPERIENCE:
Sr. SailPoint Developer/IAM
Costco Travels
San Francisco, CA
March-2017 to Till Date
Responsibilities:

 Installation and configuration of SailPoint IIQ as required by design solution.


 Created various reports like Role composition report, Identity Reports and Application attribute reports
for IIQ.
 Evaluated SailPoint-IIQ by Life Cycle Management, Access Review/Certifications, Policy Management,
Role-Based Access Control and Connector modules.
 Analyzed the application before on boarding to get extract of application with the user unique ID, access
levels and permission and do deep dive sessions.
 Involved in design and implementation of IdentityIQ solution, configuring Active Directory, and Shared
Folders. Wrote and tested JAVA code for plugins, schedule, transformation, and tasks.
 Implemented Self-service feature, Password feature, Provisioning feature and policies in SailPoint.
 Maintained user account workflows using form Joiner, Mover and Leaver.
 Involved with existing Provisioning Team for the application in order to make it fit in to IIQ and to get the
existing User Access Management (UAM) model.
 Review and verify security patch processes Okta SSO
 On-boarded applications using Provisioning application’s requests in IIQ.
 Implemented and Scheduled various type of User Entitlement Reviews for applications and databases
in a timely manner to all the business areas across the organization.
 Performed exhaustive audit of the Active Directory infrastructure via Windows PowerShell
 To implement Change Requests in IIQ, Drawing Scheduling of Events and Shape of the weekend for
Business check Outs.
 Involved in SailPoint provisioning via both out of the box SailPoint connectors, and custom written Java
code connecting to a variety of systems via mechanisms such as SOAP and REST web services, JDBC,
custom API's etc.
 Developed Role Model Templates based on the applications on boarding by getting engaged with
various business people and TS also.
 Designed SailPoint deployment activities - connector configuration, custom rule development, workflow
configuration, development and third-party system integration.
 Developed Composite Applications using SailPoint IIQ.
 Designed and implemented SailPoint build processes, code migration, and source control use.
 Deployed several custom-developed Sailpoint connectors to connect various client systems.
 Ensure requirements gathered, processes defined, and use cases documented follow out of the box
configuration vs. customization as much as possible
 Getting the Signoffs from App teams when the Okta SSO Flow is working with appropriate testing
Scenarios.
 Manage client requirements and configure Confidential connectors for 34+ applications
 Design SailPoint deployment and solution architectures
 Participate in all SailPoint deployment activities - connector configuration, custom rule development,
workflow configuration and development, third party system integration.
 Design, Implemented a solution which manage the Identity lifecycle of almost all applications with the
enterprise, without directly controlling the identity store within the application.
 Developed custom SailPoint BuildMap Rules and Workflows as per the business needs.
 Worked on the scrum team responsible for UI components in Identity Now, a cloud-based
identitymanagement and governance solution.
 Extensive use of PowerShell scripting to execute admin tasks for AD, Exchange, Office365/Azure and
Skype for Business
 Developed custom approval workflows for provisioning Role-Based Access Control (RBAC) entitlements
to applications using Java.
 Authentication API. Okta Authentication API provides operations to authenticate users, perform multi-
factor enrollment and verification, recover forgotten passwords, and unlock accounts, Primary
authentication allows you to verify the username and password credentials.
 Developed custom rules and workflows using Bean Shell and Java.
 Setup applications Active Directory, LDAP, Oracle and Flat Files.
 Providing solutions for the changing business requirements.
 Implement REST classes using SailPoint Rest Application.
 Implemented business logic using Java Beans for front end and storage/retrieval from the backend
Oracle DB using SQL queries functions, sequences, triggers, cursors etc.
 Using IIQConsole for operations such as checkout, import, connector Debug etc.,
 Used IQService as part Identity IQ for Active Directory (AD) provisioning.

Sr. SailPoint Developer


Highmark
Peoria, IL
Jan-2013 to Feb-2017
Responsibilities:

 Design & Implementation of Confidential


 Confidential Installation and Configuration as required by the design solution
 Implementation of Self Service feature, Password features (PTA, Forgot password, Change Password),
provisioning feature, configuring various roles and policies in SailPoint
 Set up Confidential policy server on 4 environments (Dev, QA, UAT & Production)
 Developed build map rule, creation rule and customization rule to create Employee and Contractor user
accounts into SailPoint from their current application’s exported feed file.
 Developed a custom form in the SailPoint UI so that various admins can create Employee/Contractor
user accounts manually through UI and provision users
 Created and ran the aggregation task to bulk load authoritative source data from Active Directory,
Exchange and LDAP
 Used the Okta API to make any application the profile master
 Worked on leading IAM concepts such as Least Privilege, Privileged Access, Roles and Data Mining,
Segregation of Duty and Role Based Access Control (RBAC).
 Participated in all SailPoint deployment activities - connector configuration, custom rule development,
workflow configuration and development, third party system integration, including designing custom
connector.
 Provided support to security and develop appropriate audit controls and procedures to ensure the
integrity of applications.
 Developed and arranged the Roles with access policies to procurement of clients in to the LDAP
Groups.
 Provide the capability of categorizing user access by job description for ease of user access
provisioning.
 Integrated SailPoint Identity IQ with multiple external databases and applications for provisioning and
de-provisioning using Active Directory and LDAP.
 Integrated application utilizing SailPoint IIQ Out of the Box connectors and custom connectors.
 Worked on troubleshooting system software and hardware, particularly to investigate problems related
to device drivers provisioned by the SailPoint IIQ Solution.
 Configured and Deployed SailPoint Identity IQ for use in a multi-tenant network and security
environment.
 Involved in IAM tools like SailPoint IIQ, Sun IDM, LDAP, AD, SDS, UNIX and Java/J2EE Technologies.
 Involved in the development of design and security documentation for SailPoint IIQ components.
 Provided use cases and business processes for support groups on role, entitlement, provisioning and
de-provisioning
 Used Okta APIs provide programmatic access to the Okta Identity Cloud, enabling the developers to
build great user experiences or extend Okta in any way you can imagine. This is how Okta solves the
most complex enterprise architecture challenges and solves customer identity for the digital business
lved in the developing workflows (JML process) with two level approvals. Implemented Sailpoint
IdentityIQ to periodically review employee access to high risk Sox Applications.
 On boarded different applications into Sailpoint IDM. Integrated Sailpoint with IBM Tivoli IDM for
importing roles into Sailpoint System
 Worked on Provisioning use case development, role definition, building to meet compliance controls,
and IAM governance.
 Implemented Okta's provisioning features enable to manage user accounts automatically with in
applications. As it saves time and ensures that users' access privileges are up to date. ... Centralization
into Okta provides users with a single access point so they don't have to remember multiple usernames
and passwords
 Worked with Information Security team to integrate with applications and Role Lifecycle Management
 Coordinated with the security architect and engineering teams to review proposed design for enterprise
implementation.
 Worked with Systems to monitor deployment, integration and initial configuration of all new security
solutions and enhancements to existing security solutions.
 Deployed several custom-developed Sailpoint connectors to connect various client systems.
 Designed and implemented custom solution for end users to request IdentityIQ capabilities following
proper approval and auditing process.
 Designed and developed the application using Java Server Faces (JSF) framework and Struts
framework.
 Designed, developed, and unit test web services and other security integration components using J2EE.
 Designed and developed different rules for SailPoint Identity IQ product.
 Configured workflows and Integration for life cycle events.Installed and configured IAM solution
components

 Performance tuning and problem determination for IAM solution


 Troubleshoot any system failures, identify root cause and fixed issues.
 Worked with business and Analysts to document system requirements for IdentityIQ.
 Demonstrated role based user provisioning that leads to implementation of IIQ. Centralized identity data,
roles, business policy and risk modeling to support compliance initiatives and user lifecycle management.
 Configured different tasks in Sailpoint IIQ Created and implemented business and IT roles.
 Managing project scope, schedule, status and documentation
 Implementation of Sail Point, Identity IQ integration with variety of applications
 Worked with multi-disciplinary teams serving defining and delivering complex solutions to major clients
 Configuring SailPoint to their existing applications.Identity cleansing by analyzing orphan, dormant users.
 Implement REST classes using SailPoint Rest Application and Password management of SailPoint IIQ.
 Managing concerns and queries raised by business through helpdesk

SailPoint Developer/IAM
Bank of China
Chicago, IL
May-2010 to Nov-2013
Responsibilities:
 Performed Installation and configuration of SailPoint 7.0. Configured Flat files and JDBC connectors in
SailPoint. Assist in updating (SailPoint IIQ) workgroups. Monitor SailPoint IIQ product functionalities.
 Managed client requirements and configure SailPoint connectors. Responsible to manage
Administration functionality of the SailPoint such as loading data, create roles, create policies,
scheduling tasks and certifications and reports.
 Successfully lead a team of 11 and completed annual and monthly reporting to the IRS and state.
 Creation of manual identities in Sailpoint IIQ for temporary/contract staffs. Create identity Life Cycle
workflows, defining life cycle events.
 Configured Business and It roles in SailPoint IIQ according to the Entitlement hierarchy in the target
application.
 Enabled the Just in Time Provisioning (JIT) for user account will automatically create in Okta the first
time as user authenticates with Okta using AD Delegated Authentication
 Involved in configuring Manager Certification for user access reviews. Developed Custom rules like
escalation, exclusion for the certification.
 Developed custom leaver workflow according to the business need.
 Involved in End to End testing the application behavior like provisioning, Entitlement view in certification,
Account Correlation validation.
 Administered user accounts and profiles and performed test planning and test activities for SailPoint
Application post patch application.
 Developed custom reports like application data validation to validate the account, entitlements and
account status after aggregation.
 Built and configured Joiner, Mover and Leaver workflows to maintain user accounts as per the birth right
accesses.
 Implemented and Customized Manage Access and Manage Identity modules as per customer
requirements in SailPoint IIQ.
 Provide SailPoint application consulting and development support to consumer applications as required.
 Developed custom rules and workflows using Bean Shell and Java.
 Deployed several out-of-box SailPoint connectors to connect various client Systems (LDAP, AD,
databases, etc.).
 Execute (SailPoint IIQ) test cases through multiple launches and to include development and test
environments.
 Migrated IT roles and business roles from existing role provisioning system for use in IIQ Lifecycle
Manager.
 Created Custom tasks, Custom Reports to update and view the entities in the system which are
scheduled every week.
 Worked with customization and development of OOTB workflows,
 Implemented REST classes using SailPoint Rest Application.
 Using IIQConsole for operations such as checkout, import, connector Debug etc.,
 Used IQService as part Identity IQ for Active Directory (AD) provisioning.
 Setup direct connectors for AD, LDAP, MySQL, Oracle, EPIC
 Configuration of Roles, Policies and Certifications for governance compliance Build and Configure
SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
 Configuration and development of SailPoint Life Cycle Events (LCM)
 Used IIQConsole for operations such as checkout, import, connector Debug etc.,
 Used IQService as part Identity IQ for Active Directory (AD) provisioning.
 Setup direct connectors for AD, LDAP,MySQL,Oracle,EPIC
 Configuration of Roles, Policies and Certifications for governance compliance
 Build and Configure SailPoint in-built tasks like aggregation, ID refresh, schedule tasks, correlation, etc.
 Configuring SAML authentication schemas to support SAML Communication between Partners.
 Installing and configuring the web agents for IIS and Apache web servers and troubleshooting the
issues encounter during the registration.

You might also like