Peningo Systems, Inc.

Resume of Candidate: PEN139

Rate: email us at
info@peningo.com for rate information









Tivoli Identity Manager Consultant

Information Technology and Security professional with over 7 years experience in architecting and deploying Identity Management, LDAP Directories,
Single/Reduced Sign-On (SSO), Provisioning and Provisioning/Identity Workflows, Access Management, RBAC (Role-Based Access Control), Compliance
and Auditing Technologies, Federated Identity/Federation, Enterprise System Architecture, Security Infrastructure Design, Authentication and
Authorization technologies, as well as custom-built security and technology frameworks.

Proven technical leadership skills include the ability to manage teams, earn the respect of its members, lead by example, and thrive in an
entrepreneurial environment. Persuasive verbal and written communication skills compliment a proven ability to multi-task, maintain an organized
approach, and ensure success - even when faced with high-pressure or high-risk situations.

Engagements within many large-scale environments, both public and private, as a consultant including GM, EDS, Subaru of America, ITT, Unitrin, Guardian
Life, Tyco Electronics, Holland American Cruise Lines, Gartner, Paychex, City University of New York, University of Massachusetts and Embry Riddle
Aeronautical University. Experience in the Government, Education, Healthcare, Auto and Telecom Industries.  User populations have fluctuated from a
few hundred to an excess of 1.3 million people.

PROFESSIONAL SKILLS

IDENTITY MANAGEMENT & SECURITY: IBM Tivoli Suite (ITIM/TIM, TAM), Webseal, RSA Cleartrust, PKI, Kerberos, CA/Netegrity SiteMinder, CA/Netegrity
IdentityMinder, Sun Identity Manager, Oblix COREid/Oracle Access Manager (OAM), Passlogix Single Sign-on, Novell Identity Manager, Novell Access
Manager, Oracle Identity Manager (OIM / Xellerate), SUN/IBM/Oracle Federation Manager, Orcale Role Manager (ORM), Oracle Business Intelligence
Enterprise Edition (OBIEE).
LDAP DIRECTORIES:        Microsoft Active Directory, ADAM, IBM Secureway, Tivoli Directory Server, NDS/Novell eDirectory, and Sun One Directory Server,
Oracle Internet Directory (OID), and Oracle Virtual Directory (OVD).
BACKOFFICE SOFTWARE: Database (SQL/Oracle), Webserver (IIS, Apache, IBM), Reverse Proxy, Citrix, Terminal services, Portal (Plumtree, Websphere
Portal) Application Server (BEA Weblogic, IBM Websphere, JBoss, Tomcat, Oracle Application Server (OAS / OC4J)), Integration (DirXML, IBM TDI), RACF.
OPERATING SYSTEMS: Microsoft Windows up to Windows 2003 Enterprise Edition, UNIX (SOLARIS 2.x, SOLARIS, AIX, IRIX, HP/UX, LINUX, MS-DOS.
NETWORKING: TCP/IP, DNS, WINS, NFS, Samba, NIS, NIS+, and NetBIOS.

PROFESSIONAL EXPERIENCE

August 2009 - Current

Lead Identity Management Systems Specialist
        Maintain full Identity Management systems
        Integration of all PeopleSoft systems, Active Directory, OID, and Exchange
        Developed 5 environments on both physical and virtual hardware.
        Responsible for all development and implementation of OIM, OAM, OVD, OID, and some Oracle databases


March 2009 - August
Identity Management Architect and Implementation Engineer
        Architect for and the implementation of Oracle Identity Manager and Oracle Role Manager.
        Integrated all systems with multiple back-end database systems.
        Cut project scope and duration down by over 30% with discovery and project analysis


March 2009
Identity Management Architect and Implementation Engineer
        Architect for and the implementation of Oracle Identity Manager, Oracle Access Manager, Oracle Role Manager, Novell Identity Manager, and Novell
Access manager for proof of concept evaluation.
        Integrated all systems with Active Directory, SunONE LDAP, IIS and Apache web servers
        Implementation was done on multiple virtual servers through VMWare running Oracle Enterprise Linux, Windows 2003, and SUSE Linux.



November 2008 – February 2009
Identity Management Architect
        Architect for the implementation of Oracle Identity Manager, Oracle Access Manager, Oracle Internet Directory, and Oracle Virtual Directory
        Implemented OIM and OAM through Development, Staging, and Production
        Developing custom workflows and Generic Technology Connectors (GTC) for manual user dumps.


November – Present
IDM Consultant/Strategist
        Interview key subject matter experts to determine current IDM/security hardware and software profile.
        Analyze current network layout, services and resources to determine required access.
        Determine user roles and responsibilities, classifying like users into groups to ease maintenance and rule implementations controlling access to
resources appropriate to user and group classifications.
        Analyze and document (both existing and potential) solutions for the following: User account provisioning/de-provisioning, Enterprise Directory
Services, Single Sign-On (web and desktop), Password Management, Role-Based access control, Strong Authentication
        Provide documentation and recommendations detailing best practices for user and access control as determined by independent research and
current like institution implementations.



July 2008 – October 2008
Senior Oracle IDM Architect and Engineer
        Worked along side with Oracle on architecting and implementing the Oracle Identity Management Suite into a 22-campus environment with
capabilities of managing up to 1.3 million end-users.
        Design was built around managing Students, Faculty, and Staff with multiple roles.
        OIM was configured to talk to three separate Authoritative PeopleSoft sources for all identites.
        Provisioning from OIM was configured for Oracle Internet Directory (OID), Oracle Virtual Direcory (OVD), PeopleSoft using Apache reverse proxies
and PeopleSoft’s Pure Internet Architecture, and Active Directory.
        Managed a small team of 5 IdM engineers and worked directly with Oracle’s consultants to meet all deadlines.


October 2007 – May 2008
Senior Oracle IDM Architect and Engineer
        Architected and designed a six campus Identity Management solution that encompasses the Oracle Fusion Middleware Stack (Oracle Identity
Manager, Oracle Access Manager, Oracle Internet Directory, Oracle Virtual Directory, Oracle Identity Federation, Oracle Access Server, and Oracle
Enterprise Linux).
        Design was built around managing all 150,000+ Students, Faculty, and Staff.
        Managed a team of integration specialists to implement and promote through three environments and on a separate Disaster Recovery (DR)
datacenter.
        Wrote all documentation to cover the use cases, implementation design, and promotion strategies.
        Managed a separate project with UMass and an external application service provider to setup federation between the two entities. First successful
OIF SAMLv2 to Shibboleth federation to reach production.


September 2007 – October 2007
IDM Consultant/Strategist
        Was brought in to finish out an Oracle Identity Manager implementation what was falling behind a tight deadline.
        In additional to being proficient with the development technologies I have expert knowledge in all of the target systems and their components that
the product manages, including LDAP directories, security and databases. This helped bring the project to completing within deadline.
        Modified out of the box Oracle Database Connectors to fit Gartner’s given needs.
        Responsible for reviewing and recommending enterprise identity management solutions and deployment alternatives to external customers and
internal end-users.


September 2007 – October 2007
Independent IDM Solution Architect
        Reviewed current architecture and business requirements for an Identity Management Solution
        Provided a detailed solution document with multiple vendors listing the benefits and disadvantages between each of the suggested product suites
and combinations.
        Product Suite vendors reviewed: Oracle, IBM, CA, and Curion


August 2007 – September 2007
IDM Architect and Implementation Specialist
        Performed Requirements Gathering for a Proof of Concept to be implemented into their environment in development.
        Architected and implemented Oracle Identity Manager into development with basic out of the box functionality in under 2 weeks with a single LDAP
as their authoritative source, and provisioning users into Active Directory, Microsoft Exchange, and Oracle Internet Directory.
        Wrote all documentation and completed entire project in less than three weeks.


August 2006 – February 2007
Access Management Solution Specialist
        Reviewed current architecture and business requirements for an Access Management Solution
        Architected and implanted Oracle Access Manager (Oblix COREid) into three environments.
        Developed a custom new user registration process using ASP and hooking into IDXML through COREid.
        Performed all project management and provided status reports to managing director on Tyco’s side.


July 2006 – July 2006
Identity and Access Management Solution Specialist
        Was brought in to get an existing Tivoli Identity and Access Management (TIM / TAM) project back under deadline.
        Wrote rules for Tivoli Data Integrator data marshalling
        Worked as liaison between existing engineers and project directors on the Time Warner side
        Redesigned project timeline, managed scope of initial deployment, and resolved issues between client and Time Warner.


May 2005 – September 2007
Access Management Specialist
        Provided remote and on-site assistance to the deployment of Oblix COREid (now Oracle Access Manager)
        Built out, and promoted solution through six environments and two off-site datacenters.
        Worked with off-shore staff, IBM consultants at their IBM campus in Raleigh NC, and with GMAC staff in Detroit MI.
        Wrote out and submitted highly detailed, step-by-step, run books for all implementation details for Oblix.
        Developed custom solutions to GMAC business needs that Oblix was not able to accomplish.
        Implemented multiple languages (six) to both out of the box Oblix installation and custom Style sheets (XSL, XSLT, CSS, XML) for custom new user
registration, login, and forgotten password forms.


January 2007 – April 2007
Identity and Access Management Specialist
        Initially was brought in to provide a demo and Proof of Concept (POC) on Oracle’s Identity Manager integrated into their environment.
        Architected and implemented Oracle Identity Manager as a migration from their current cross-custom identity management solution of M-tech IDM
and custom Perl scripts to a full production OIM solution.
        Integrated OIM into Active Directory, Multiple Exchange servers, Oracle Internet Directory, and bulk loaded all users from a flat-file dump from their
Auth Source.
        Rewrote a couple of Oracle’s out-of-the-box connectors to better fit their environment and needs.


November 2006 – February 2007
Identity and Access Management Specialist
        Designed and architected a multi-organization Identity and Access management system using CA’s Identity management suite (Identity Minder,
Siteminder, eTrust Directory, and eTrust Admin).
        Siteminder was setup to protect multiple web and application servers of different flavors
        Identity Minder was configured to work with multiple authoritative sources and provision users to various end-systems across six different sub-
organizations. This included a multi-domain Active Directory infrastructure.
        Worked with CA to evaluate and fine-tune their product, as this was their first release of the suite is a package form. Had to constantly rewrite a lot
of their code and refine their documentation to successfully implement.
        Wrote custom BLTH modules for bulk importing and custom application provisioning.
        Worked with TEWS (CA’s web services core) for implementing a custom web interface for new user registration and self-maintenance packages.


May 2005 – September 2007
Identity and Access Management Specialist
        Provided technical expertise to EDS in all areas Identity and Access Management.
        Worked on both US and foreign country deployments with the main focus on deploying an globally highly available Identity Management solution for
one of their clients.
        Products supported were Oblix COREid (Oracle Access Manager), Oblix ShareID (Oracle Identity Federation), Citrix, and other custom / home-grown
applications.


February 2005 – May 2005
Identity and Access Management Specialist
        Designed and implemented an Access control system around Oblix COREid (Oracle Access Manager).
        Implemented it directly into production (customer demanded it) using ADAM as the user repository containing all 25,000 world-wide employees.
        Setup multiple reverse proxy Microsoft ISA servers to proxy Internet requests and relay them to the geographic closest Identity and Access
servers for authentication and authorization.


August 2002 – February 2005
Data Security Specialist
        Tivoli Access and Identity Manager deployment and administration
        IBM Secure-Way LDAP administration and schema management
        Computer Associates SEOS and SSO administration and migration into IBM’s LDAP framework
        Wrote custom VB and Perl applets for production web-based LDAP management and development while TIM is being integrated.
        Evaluation and implementation of cross-platform SSO and user administration tools including IBM’s IDI/TIM and CA’s Admin
        User administration and SSO control across seven platforms and over 100,000 users for home office, regional offices, and agencies
Back to Peningo Sample Resumes
Back to the Peningo Tivoli Consultants page
Back to the Peningo Systems Tivoli Identity Manager Consultants home page.
If your organizations has an IT Staffing or
Consulting need for a Tivoli Resource, please
email us at
sales@peningo.com . If you wish to
speak with someone from Peningo Systems,

please click here to contact Peningo.