Summary
Overview
Work History
Education
Skills
Disclaimer
Timeline
Generic

Arunasri Venkatesan

Chennai

Summary

Over 8+ years of experience in Enterprise Security Solutions, with a strong focus on the Identity and Access Management (IAM) domain. Hands-on experience with IAM technologies including PingFederate, PingAccess, PingID, PingOne, and Keycloak. Currently working as a Technical Specialist at Cognizant Chennai, having started my career on January 27, 2015. Strong expertise in SSO, MFA, SAML 2.0, OAuth 2.0, OpenID Connect, FIDO2, and certificate-based authentication. Skilled in PingFederate upgrades, PingID setup, application onboarding, IDP connection creation, adapter and policy configuration, data store setup, and troubleshooting. Proficient in log analysis, incident and problem management, and tools such as JIRA, ServiceNow, and Remedy. Adept at identifying bugs and resolving application issues efficiently. Quick learner with a strong willingness to adopt new technologies, concepts, and business processes to meet evolving business needs.

Overview

10
10
years of professional experience

Work History

Technical Specialist

Cognizant
06.2024 - Current
  • Implemented SAML-based application integrations in Entra ID (Azure AD) for secure Single Sign-On (SSO).
  • Managed certificate renewals for applications integrated with Azure AD.
  • Handled secret expiration and renewal processes for Azure AD applications using OAuth.
  • Worked on configuring and managing Access Packages in Azure AD for streamlined access provisioning.
  • Managed Privileged Identity Management (PIM) in Azure AD to enforce just-in-time access and role-based access control.
  • Integrated Keycloak with applications using OpenID Connect for secure authentication.
  • Connected Keycloak with LDAP and Active Directory for user federation and centralized identity management.
  • Configured SSO for both web and mobile applications using OIDC.
  • Implemented email-based One-Time Password (OTP) authentication for enhanced user verification.
  • Configured Keycloak’s SMTP settings to send OTP emails via an external SMTP provider.

Technical Lead

Trianz
01.2022 - 05.2024
  • Company Overview: Implementation: Azure AD
  • Worked with Azure Active Directory (Azure AD) for identity and access management.
  • Onboarded SAML-based applications in Azure Active Directory.
  • Integrated applications with PingFederate for identity federation and SSO.
  • Managed certificate renewals for both Azure and PingFederate applications.
  • Handled secret renewals for Azure applications using OAuth.
  • Granted and managed API permissions for Azure applications.
  • Experienced in configuring and supporting PingID for multi-factor authentication.
  • Worked with Microsoft Authenticator App for secure user authentication.
  • Ensured adherence to defined SLAs while resolving incidents and service requests.
  • Implementation: Azure AD

Senior Engineer

Ericsson India Pvt Ltd
07.2021 - 12.2021
  • Company Overview: Implementation: PINGFEDERATE
  • Part of the DevOps team, responsible for handling application-related issues and ensuring system stability.
  • Configured multi-factor authentication (MFA) to enhance application security.
  • Utilized monitoring tools such as Splunk, Dynatrace, and F5 portal to track service health and performance.
  • Troubleshot issues related to authentication protocols including SAML, OpenID Connect, and OAuth.
  • Actively worked on JIRA tickets for incident resolution, change requests, and task tracking.
  • Involved in deployment-related activities, ensuring smooth application releases and updates.
  • Implementation: PINGFEDERATE

Analyst

Schneider-Electric Pvt Ltd
05.2019 - 06.2021
  • Company Overview: Implementation: PINGFEDERATE
  • Implemented Single Sign-On (SSO) across multiple domains and configured multi-factor authentication (MFA) for enhanced security.
  • Integrated over 400 applications with PingFederate using various sign-in protocols such as SAML 2.0 and OAuth 2.0.
  • Monitored application service health and managed infrastructure for all integrated applications.
  • Handled ticketing and issue tracking using JIRA and Remedy.
  • Automated SAML connection updates using the Processor tool to streamline onboarding.
  • Participated in PingFederate certificate renewal processes to maintain secure communication.
  • Contributed to the FIDO project, enabling passwordless authentication solutions.
  • Worked on OAuth industrialization, including implementation of opaque access tokens, PKCE (Proof Key for Code Exchange) with code challenge and code verifier.
  • Communicated with customers regarding application onboarding, PingFederate configurations, and issue resolution.
  • Decommissioned applications integrated via SAML and OAuth protocols.
  • Troubleshot authentication and integration issues related to SAML, OAuth, and PingID.
  • Implementation: PINGFEDERATE

System Engineer

TATA CONSULTANCY Pvt Ltd
07.2018 - 01.2019
  • Company Overview: Implementation: SITEMINDER&PINGACCESS
  • Implemented Single Sign-on(SSO) for Applications using SAML, OpenID, and OAuth protocol.
  • Implemented Multifactor Authentication Using PingID and PingOne.
  • Experience with attending support calls and providing quick assistance to customer’s issues within a minimal amount of time.
  • Good knowledge of different Federation profiles like SAML, OAuth, openid.
  • Knowledge about certificate renewals for applications.
  • Implementation: SITEMINDER&PINGACCESS

Project Engineer

WIPRO Pvt Ltd
05.2015 - 07.2018
  • Company Overview: Implementation: Oracle Access Management & PingFederate
  • Configured policies, resolved production issues, and implemented infrastructure change requests as part of Incident and Problem Management for Cisco and its customers on 10g environments.
  • Worked on web security, performed root cause analysis (RCA), and resolved performance issues by analyzing server and Splunk logs.
  • Used Remedy to manage incidents, identify root causes, and ensure resolution within defined SLAs.
  • Handled high-priority (P1–P2) incidents, ensuring minimal downtime and customer impact.
  • Logged defects in Rally and coordinated with development teams to track and resolve them efficiently.
  • Prepared and presented Weekly Status Reports (WSRs) to management, summarizing raised issues and provided solutions.
  • Onboarded clients to Cisco by configuring applications, roles, and resources aligned with policy models.
  • Provided continuous support to clients by managing identity access and assigning appropriate roles for application access.
  • Implementation: Oracle Access Management & PingFederate

Education

Master of Computer Applications -

Bharathiar University
04.2015

Bachelor of Science - Computer Science

Vivekananda College for Women
04.2011

Higher Secondary Certificate -

St. Mary’s Girls Higher Secondary School
03.2008

Secondary School Leaving Certificate -

St. Mary’s Girls Higher Secondary School
03.2006

Skills

  • Oracle Access Manager (10g)
  • PingFederate
  • PingAccess
  • PingID
  • PingOne
  • Azure AD / Entra ID
  • Keycloak
  • SAML 20
  • OAuth 20
  • OpenID Connect
  • FIDO2
  • JIRA
  • ServiceNow
  • Remedy
  • Splunk
  • Dynatrace
  • F5
  • Windows
  • Linux
  • F5 Portal

Disclaimer

I hereby declare that the information provided above is true and correct to the best of my knowledge and belief.

Timeline

Technical Specialist

Cognizant
06.2024 - Current

Technical Lead

Trianz
01.2022 - 05.2024

Senior Engineer

Ericsson India Pvt Ltd
07.2021 - 12.2021

Analyst

Schneider-Electric Pvt Ltd
05.2019 - 06.2021

System Engineer

TATA CONSULTANCY Pvt Ltd
07.2018 - 01.2019

Project Engineer

WIPRO Pvt Ltd
05.2015 - 07.2018

Master of Computer Applications -

Bharathiar University

Bachelor of Science - Computer Science

Vivekananda College for Women

Higher Secondary Certificate -

St. Mary’s Girls Higher Secondary School

Secondary School Leaving Certificate -

St. Mary’s Girls Higher Secondary School
Arunasri Venkatesan