Experience
2025 — Now
Newark, New Jersey, United States
• Owned day to day IAM operations for Sailpoint ISC and Okta in production.
• Managed and troubleshot identity flows across Banner, NERM, Identity Hub, and downstream systems like AD, LDAP, Google Workspace, and Okta.
• Improved IAM system stability during post go-live by resolving integration and provisioning issues across multiple systems.
• Validated attribute mappings, transforms, identity profiles, and provisioning policies to make sure accounts and access were created correctly.
• Resolved production provisioning and access issues by analyzing identity data, account linkage, and system logs, reducing repeated access failures.
• Debugged identity issues across upstream systems, ISC, and Okta to identify root causes.
• Used system logs, SailPoint APIs, and Okta logs to troubleshoot identity lifecycle and authentication problems.
• Supported joiner/mover/leaver processes by validating triggers, access assignments, and deprovisioning behavior.
• Identified gaps in entitlement lifecycle behavior and provisioning logic and worked with vendors and internal teams on fixes.
• Identified and resolved account correlation issues where accounts existed in target systems but were not linked in ISC, preventing provisioning failures.
• Worked extensively with REST APIs (SailPoint, Okta) to troubleshoot provisioning failures, validate identity data, and debug account/entitlement issues using Postman and CLI tools.
• Validated entitlement and role mappings between Identity Hub and ISC to ensure correct access downstream.
• Supported post go-live stabilization by testing configurations and resolving integration issues.
• Worked with IAM engineers, architects, and system owners on application onboarding and access governance.
• Managed user lifecycle and access in Okta, including activation, group assignments, and authentication troubleshooting.
• Participated in discussions with upstream system teams to understand data flows and lifecycle triggers.
2023 — 2025
New York, New York, United States
• Installed and configured SailPoint IdentityIQ (versions 7.3, 8.0, 8.1, 8.2 and 8.3) to support seamless deployment and operations.
• Onboarded applications (e.g., delimited files, Active Directory) into the Identity platform, enhancing security controls and reducing manual provisioning by 30%.
• Configured roles, policies, and certifications, including complex role-based access control (RBAC), ensuring compliance with governance standards.
• Developed and customized lifecycle events (joiner, mover, leaver) for automated identity management, streamlining user access processes.
• Created custom workflows and BuildMap rules tailored to specific business requirements, improving efficiency in access management.
• Integrated IdentityIQ with platforms like SAP, Salesforce, ServiceNow, and Workday using connectors such as WebService, SCIM 2.0, and LDAP.
• Worked with Okta for user provisioning, single sign-on (SSO), multi-factor authentication (MFA), and application integrations, enhancing security posture across the organization.
• Automated user onboarding and offboarding in Okta, reducing provisioning times and minimizing errors. Configured policies for access requests and password management.
• Developed reports, including Uncorrelated Accounts and New Accounts, to facilitate compliance audits and data analysis.
• Created audit reports to monitor and manage segregation of duties (SOD) conflicts, enhancing compliance.
• Conducted comprehensive testing, identified and resolved bugs, and maintained system stability through active participation in production support.
• Analyzed IAM-related tickets, provided solutions, and actively participated in bug fixes to ensure smooth operations.
2022 — 2023
2022 — 2023
Dallas, Texas, United States
• Implemented and customized the Manage Access and Manage Identity modules in SailPoint IIQ to meet specific customer requirements.
• Handled installation and configuration of SailPoint IdentityIQ based on detailed design solutions.
• Monitored system performance daily and provided production support for IdentityIQ operations.
• Integrated web service-based applications to ensure secure authentication and authorization, utilizing SailPoint IIQ data.
• Conducted role mining and structured roles to align with banking policies, regulatory requirements, and security standards.
• Configured direct connectors for platforms like Active Directory, LDAP, Exchange Online, Box, and UNIX.
• Enhanced user security by implementing Okta and RSA Cloud solutions for Single Sign-On (SSO) and Multi-Factor Authentication (MFA).
• Customized workflows to address unique client requirements effectively.
• Worked on certifications, developed custom tasks, and created detailed reports as needed.
• Onboarded various applications, including delimited files and Active Directory, ensuring smooth integration.
• Integrated applications like Active Directory, SAP Modules, Salesforce, ServiceNow, and Workday into the IAM environment.
• Executed role mining for SAP and other third-party systems, leveraging IT roles and birthright roles based on business requirements.
• Designed and implemented rules such as Build Map Rules, Pre-Iterate Rules, Post-Iterate Rules, and Identity Creation Rules.
• Ensured financial compliance and safeguarded customer data security by implementing role-based access controls (RBAC) and integrating IAM solutions with core banking systems.
• Configured Business Roles and IT Roles to meet client specifications.
• Collaborated with vendors like Oracle and CA to troubleshoot and resolve installation and configuration issues related to LDAP.
• Worked extensively with Java server-side technologies and enterprise applications, including JSF, Servlets, WebLogic, JBoss, and XML.
2021 — 2022
2021 — 2022
• Developed API services for different mobile devices using spring boot microservices.
• Fixed and troubleshoot Java code issues and technical issues during the project lifecycle.
• Monitored Grafana dashboard on regular basis to make sure the services are producing and consuming the feeds.
• Created topics and promoted them to production using Kafka.
• Designed API-integration and deployed with CI/CD pipeline using Jenkins, Git, Maven, Java, Postman.
• Worked with Kubernetes team to create new cluster and migrated microservices to the new cluster from legacy cluster.
• Developed Microservices using Test Driven Development and Pair Programming Successfully migrated Application systems to AWS cloud.
• Used PostgreSQL to store data in database and wrote SQL queries.
• Used Junit and Mockito for unit testing.
• Used Selenium to expand test scenarios to catch more bugs and improve quality.
• Monitored Application performance on regular basis using Splunk.
• Leveraged Hibernate to store the persistence data into the PostgreSQL database and written HQL to access the data from the database.
• Developed test procedures and test environments, documented test results to ensure software system requirements are met.
• Provided on call support to fix production outages for Java related issues.
• Worked closely with Scrum Master and Product Owner to take part in all the sprint related works.
• Followed Agile Scrum Methodology and collaborated with the scrum team in bi-weekly sprint to deliver the software requirements.