Technology lead with a track record in overseeing successful IT projects. Strong background in software development, project management, and team leadership leading to significant improvements in system efficiency and productivity. Possess strong problem-solving skills and adept at network troubleshooting. Proven history of fostering collaborative environments that encourage innovation.
AWS Cloud Practitioner
I hereby declare that the information furnished above is true and authentic to best of my knowledge.
Company: Synechorn Technologies Pvt. Ltd.
Project: Participant-Experience
Domain: Investment and Insurance
Company: Confluxsys Pvt td
Domain: IAM, Banking, Insurance.
Projects:
1. Identity Analytics Platform (IAP):Application Identity Analytics Platform framework allows business application's ATC to publish their application's access data.
Core objectives: Application Enroller provides the capability to feed metadata of Account and Entitlement to IAP framework.
2. User Access Revalidation (UAR): Certification Portal, Objective is to enhance user experience of certification by minimizing real time processing and hence reducing possible technical issues that user might face while fulfilling their certification tasks.
3. Role Lifecycle Management (Role LCM): IDM systems does not have an intuitive resource owner view whereby resource owners can manage resources they own or transfer ownerships.
Role Definition Lifecycle includes: Role Creation/Modification/Deletion, Role Ownership Change,Role Entitlement Association/Disassociation.
4. Entitlement Studio: Legacy Permission set solution is built as an OIM resource and leverages OIM UI for permission set administration tasks which is very slow and not intuitive at all. This change in permission set solution is not only about a better interface but opportunity to do more analysis using IAP framework and possibility to get the approval using any workflow engine (OIM/ SOA/ SNOW).
5. Continuous Access Governance (CAG):Governance platform ensures provisioning of access conforms to the Identity Governance processes / policies. Out-of-band access data changes are typically addressed by certification process scheduled annually/quarterly. This delay in response gives inside attacker enough time to exploit the system and cause maximum damage.
There is a need to reconcile and apply governance processes on out-of-band changes in-real-time (or near to real-time).