Summary
Overview
Work History
Education
Skills
Websites
Certification
Professional Synopsis
It Skillset
Personal Information
Accomplishments
Timeline
Generic
Pawan Kumar BS

Pawan Kumar BS

Scrum Master
Bengaluru

Summary

With ~12 years of rich, end-to-end experience in IT Project Management and handling techno functional roles in the IT industry, expertise in full software life-cycle implementation, production support, testing, go-live assistance till post implementation support. Functional knowledge of working on multiple domains like Banking and Insurance. Successfully managed the delivery of complex projects adhering to tight deadlines. Expert understanding of SDLC processes and Agile flavored development methodologies (Waterfall, Scrum, Agile Framework and Principles) Team-oriented individual promoting exemplary presentation, project management and risk oversight skills. Demonstrative Scrum Master with background communicating effectively with and leading high-performance teams. Considered expert in prioritizing tasks and optimizing workflows. Experienced Scrum Master with proven track record of successfully leading teams in developing high-quality software solutions on time and within budget. Skilled in multiple Agile methodologies, stakeholder management and sprint planning. Highly organized in managing complex projects with multiple deadlines. Well-versed in building positive relationships with customers and other stakeholders. Strong requirements gathering, scope development and inventory coordination abilities. Skilled at overseeing complex, high-value technical projects with excellent planning competencies.

Overview

12
12
years of professional experience
4
4
Certifications
3
3
Languages

Work History

Scrum Master

Kyndryl Solutions Private Limited
06.2022 - Current
  • Visualize IAM Workflow: Create a Kanban board to visualize the flow of work in your IAM processes
  • Divide the board into columns representing various stages of the IAM lifecycle, such as Identity Provisioning, Access Requests, Approval, Access Review, and Offboarding
  • Limit Work in Progress (WIP): Set WIP limits for each column on the Kanban board to prevent overloading the team with too many tasks at once
  • This ensures that work flows smoothly through the system and helps identify bottlenecks in the process
  • Prioritize IAM Tasks: Use techniques like color-coding or priority labels to indicate the importance of IAM tasks on the Kanban board
  • This helps the team focus on high-priority items and ensures that critical IAM activities are addressed promptly
  • Continuous Improvement: Encourage the IAM team to conduct regular Kanban meetings and retrospectives to review process performance, identify areas for improvement, and implement changes iteratively
  • This fosters a culture of continuous improvement and ensures that IAM processes remain efficient and effective over time
  • Collaboration and Communication: Facilitate collaboration and communication among IAM team members by using the Kanban board as a central hub for sharing information, updates, and feedback
  • Encourage team members to use the board to communicate task status, dependencies, and blockers transparently
  • Measure and Analyze Performance: Utilize Kanban metrics such as cycle time, lead time, and throughput to measure the performance of IAM processes
  • Analyze these metrics regularly to identify trends, track progress, and make data-driven decisions to optimize workflow efficiency
  • Flexibility and Adaptability: One of the strengths of Kanban is its flexibility
  • IAM teams can easily adapt to changing priorities, requirements, and workload fluctuations by adjusting WIP limits, reprioritizing tasks, and reallocating resources as needed
  • Integrate with IAM Tools: Consider integrating your Kanban board with IAM tools and systems to automate task tracking, streamline workflows, and enhance visibility into IAM processes
  • This integration can further improve efficiency and collaboration within the IAM team.
  • Conducted daily stand-up meetings, sprint planning sessions, and sprint reviews, ensuring effective communication among team members
  • Encouraged cross-functional collaboration by organizing workshops and training sessions for different departments within the organization
  • Boosted customer satisfaction scores by providing regular updates on product enhancements resulting from feedback provided during sprint review meetings

Senior Associate II, Team Lead, Role-Based Access Control (RBAC)

Kyndryl Solutions Private Limited
09.2021 - 04.2023
  • Designed, implemented, and maintained RBAC to control access to sensitive data and resources
  • Collaborated with cross-functional teams to gather requirements and define access control requirements for various applications and systems
  • Developed custom access control solutions tailored to the organization's specific needs, ensuring scalability and efficiency
  • Conducted access control assessments and audits to identify vulnerabilities and recommend remediation actions
  • Provided training and support to end-users and IT staff on access control best practices and procedures
  • Worked closely with compliance and audit teams to ensure adherence to regulatory requirements and industry standards.

Senior Associate, Team Lead, Logical Identity & Access Management (IAM)

IBM India Pvt Ltd
11.2017 - 08.2021
  • Subject Matter Expert (SME) on IAM related tools (i.e., ITIM, URT, UAT, CyberArk, ECM, amongst others) Providing Support to UNIX (1800+ servers), AS400 & Tandem servers Managing users’ profile in Windows family, UNIX, AS400, Tandem Platform Primary and Secondary control on Operating System and Subsystems Involved in Change Management, Incident Management, Problem Management and Risk Management Review, update, and create processes, work instructions and education materials related to IAM for improvement and efficiency
  • Advise Kyndryl teams on IAM policies and standards definition and implementation
  • Provide security technical support or Kyndryl security investigations for Kyndryl teams
  • Running Security Health Check on Unix platform and Identifying the Deviations which need to be remediated for Kyndryl compliance
  • Run/Attend management systems as required, which identifies and reports on IAM non-compliances which must then be tracked through to resolution
  • Provide Audit support and coordinate team members for internal and external reviews e.g., pre-audit preparation activities, support data collection, respond to data meeting requests
  • Respond to security related audit and review findings including developing and tracking action plans
  • Supporting and leading ad hoc project work, to ensure compliance on all IAM sub processes
  • Creation and review of process documents
  • Deployment and test of centrally supported tools Supporting and coordinating audits and internal compliance initiatives
  • Providing guidance to accounts to achieve a strong UID Management compliance position
  • Coach and develop IAM knowledge / activities performed by staff inside and outside of the competency
  • Provide related education to other colleagues within Kyndryl organization
  • Demonstrate the required levels of leadership and communications (both oral and written) Help resolve compliance related queries / problems or other high priority requests on an ad-hoc basis to maintain customer satisfaction or business operations.

IT Security Specialist

Dynpro Consultancy
04.2015 - 11.2017
  • Managed and maintained CA Control Minder environment, including policy configuration, Rules management, and user management
  • Conducted regular health checks of Unix/Linux/Solaris systems to identify vulnerabilities, performance issues, and security risks
  • Implemented and managed patch management processes for Unix/Linux/Solaris servers to ensure systems are up-to-date and protected against known vulnerabilities
  • Collaborated with system administrators and security teams to remediate identified issues and ensure compliance with organizational policies and standards
  • Developed and maintained documentation for health checks, patch management procedures, and system configurations.

AS400 administrator

Dhruv Compusoft Consultancy Private Limited
04.2012 - 03.2015
  • Provided support in L1/L2 level in AS/400 Administration Data extraction from I-series, Creating Queries using Query/400, Daily & Monthly Backup and Restore objects
  • AS400 Housekeeping-Maintaining the health of AS400 by regularly monitoring the system
  • Operation knowledge on Policy creation/Endorsement/renewal/Cancellation for all contract types including Health
  • Receipt creation, Client/Agent creation & modification, Payment creation/processing, Claims processing health & non health, Pending policy deletion.

Education

B.E. - Information Science & Engineering

Skills

Scrum Masterundefined

Certification

Certified Scrum Master (CSM – Scrum Alliance)

Professional Synopsis

  • Kyndryl Solutions Private Limited, Scrum Master, 06/2022, Present, Bengaluru, 1.8 Years, Westpac Banking, Australia, Visualize IAM Workflow: Create a Kanban board to visualize the flow of work in your IAM processes. Divide the board into columns representing various stages of the IAM lifecycle, such as Identity Provisioning, Access Requests, Approval, Access Review, and Offboarding., Limit Work in Progress (WIP): Set WIP limits for each column on the Kanban board to prevent overloading the team with too many tasks at once. This ensures that work flows smoothly through the system and helps identify bottlenecks in the process., Prioritize IAM Tasks: Use techniques like color-coding or priority labels to indicate the importance of IAM tasks on the Kanban board. This helps the team focus on high-priority items and ensures that critical IAM activities are addressed promptly., Continuous Improvement: Encourage the IAM team to conduct regular Kanban meetings and retrospectives to review process performance, identify areas for improvement, and implement changes iteratively. This fosters a culture of continuous improvement and ensures that IAM processes remain efficient and effective over time., Collaboration and Communication: Facilitate collaboration and communication among IAM team members by using the Kanban board as a central hub for sharing information, updates, and feedback. Encourage team members to use the board to communicate task status, dependencies, and blockers transparently., Measure and Analyze Performance: Utilize Kanban metrics such as cycle time, lead time, and throughput to measure the performance of IAM processes. Analyze these metrics regularly to identify trends, track progress, and make data-driven decisions to optimize workflow efficiency., Flexibility and Adaptability: One of the strengths of Kanban is its flexibility. IAM teams can easily adapt to changing priorities, requirements, and workload fluctuations by adjusting WIP limits, reprioritizing tasks, and reallocating resources as needed., Integrate with IAM Tools: Consider integrating your Kanban board with IAM tools and systems to automate task tracking, streamline workflows, and enhance visibility into IAM processes. This integration can further improve efficiency and collaboration within the IAM team., Successfully implemented Kanban methodologies in the IAM department, resulting in a 30% reduction in cycle time for user provisioning and access request fulfillment., Achieved significant time savings, approximately ~650 hours per FTE annually, across 8 FTEs., By visualizing the IAM workflow on a Kanban board and setting WIP limits, we improved transparency and prioritization, leading to quicker response times to access requests., Additionally, conducting regular Kanban meetings and retrospectives enabled the team to identify and address bottlenecks, resulting in smoother IAM processes and increased overall efficiency., This initiative not only enhanced team collaboration and communication but also contributed to improved customer satisfaction and compliance with security policies.
  • Kyndryl Solutions Private Limited, Senior Associate II, Team Lead, Role-Based Access Control (RBAC), 09/2021, 04/2023, Bengaluru, 1.7 Years, Westpac Banking, Australia, Designed, implemented, and maintained RBAC to control access to sensitive data and resources., Collaborated with cross-functional teams to gather requirements and define access control requirements for various applications and systems., Developed custom access control solutions tailored to the organization's specific needs, ensuring scalability and efficiency., Conducted access control assessments and audits to identify vulnerabilities and recommend remediation actions., Provided training and support to end-users and IT staff on access control best practices and procedures., Worked closely with compliance and audit teams to ensure adherence to regulatory requirements and industry standards., Strategic Planning: Developed and executed a comprehensive strategy for implementing Role-Based Access Control (RBAC) within the organization's access management framework, aligning with business objectives, regulatory requirements, and industry best practices., Customization and Configuration: Customized and configured RBAC policies, roles, and permissions tailored to the organization's unique requirements for twenty plus teams, ensuring granular access control while maintaining simplicity and scalability., Collaborative Design: Collaborated with cross-functional teams including business stakeholders, IT administrators, and application owners to design RBAC roles and entitlements that accurately reflect job responsibilities and organizational hierarchy., Policy Documentation: Created thorough documentation of RBAC policies, role definitions, and access control matrices, providing clear guidelines for access provisioning, review, and auditing processes., User Training and Adoption: Conducted user training sessions and provided ongoing support to educate employees on RBAC principles, role assignments, and access request procedures, fostering user adoption and compliance., Access Governance Enhancement: Implemented RBAC as part of a broader access governance framework, enhancing visibility and accountability over user access rights, streamlining access review processes, and reducing the risk of unauthorized access., Integration and Automation: Integrated RBAC with identity management systems, provisioning tools, and workflow automation platforms to automate user onboarding, role assignments, and access approvals, improving operational efficiency and reducing manual errors., Regulatory Compliance: Ensured RBAC implementations adhered to regulatory compliance requirements such as GDPR, HIPAA, and SOX, by mapping roles and permissions to compliance mandates and conducting regular access audits., Risk Reduction: Identified and mitigated access-related risks by conducting access assessments, analyzing user entitlements, and implementing least privilege principles through RBAC role design and enforcement., Continuous Improvement: Continuously monitored RBAC effectiveness and performance metrics, soliciting feedback from stakeholders, and implementing enhancements to optimize access control processes and adapt to evolving business needs and security threats.
  • IBM India Pvt Ltd, Senior Associate, Team Lead, Logical Identity & Access Management (IAM), 11/2017, 08/2021, Bengaluru, 3.9 Years, Westpac Banking, Australia, Subject Matter Expert (SME) on IAM related tools (i.e., ITIM, URT, UAT, CyberArk, ECM, amongst others), Providing Support to UNIX (1800+ servers), AS400 & Tandem servers, Managing users’ profile in Windows family, UNIX, AS400, Tandem Platform, Primary and Secondary control on Operating System and Subsystems, Involved in Change Management, Incident Management, Problem Management and Risk Management, Review, update, and create processes, work instructions and education materials related to IAM for improvement and efficiency., Advise Kyndryl teams on IAM policies and standards definition and implementation., Provide security technical support or Kyndryl security investigations for Kyndryl teams., Running Security Health Check on Unix platform and Identifying the Deviations which need to be remediated for Kyndryl compliance., Run/Attend management systems as required, which identifies and reports on IAM non-compliances which must then be tracked through to resolution., Provide Audit support and coordinate team members for internal and external reviews e.g., pre-audit preparation activities, support data collection, respond to data meeting requests., Respond to security related audit and review findings including developing and tracking action plans., Supporting and leading ad hoc project work, to ensure compliance on all IAM sub processes., Creation and review of process documents., Deployment and test of centrally supported tools, Supporting and coordinating audits and internal compliance initiatives., Providing guidance to accounts to achieve a strong UID Management compliance position., Coach and develop IAM knowledge / activities performed by staff inside and outside of the competency., Provide related education to other colleagues within Kyndryl organization., Demonstrate the required levels of leadership and communications (both oral and written), Help resolve compliance related queries / problems or other high priority requests on an ad-hoc basis to maintain customer satisfaction or business operations., IAM Program Leadership: Provided leadership and strategic direction for the organization's Identity and Access Management (IAM) program, overseeing the planning, implementation, and enhancement of IAM initiatives., Enhanced Security Posture: Implemented robust IAM policies, processes, and controls to strengthen the organization's security posture, mitigating risks associated with unauthorized access, data breaches, and insider threats., Streamlined Access Provisioning: Streamlined user provisioning and deprovisioning processes through the implementation of automated IAM workflows and self-service access request portals, reducing administrative overhead and improving operational efficiency., Role-Based Access Control (RBAC) Implementation: Designed and implemented Role-Based Access Control (RBAC) models, defining granular roles and permissions tailored to job functions and organizational hierarchies, ensuring least privilege access., Single Sign-On (SSO) Deployment: Led the deployment of Single Sign-On (SSO) solutions to provide users with seamless access to multiple applications and systems using a single set of credentials, improving user experience and productivity., Privileged Access Management (PAM) Implementation: Implemented CyberArk Privileged Access Management (PAM) solutions to secure and monitor privileged accounts and credentials, reducing the risk of unauthorized access and insider threats., Vendor and Partner Integration: Collaborated with vendors and external partners to integrate IAM solutions into third-party applications and services, facilitating secure access management across interconnected ecosystems., Compliance Readiness: Ensured compliance with regulatory mandates such as GDPR, HIPAA, and SOX through the implementation of IAM controls and the documentation of audit trails, access logs, and security policies., User Training and Awareness: Conducted training sessions and awareness programs to educate employees on IAM best practices, security policies, and the importance of safeguarding credentials, fostering a culture of security awareness and accountability., Continuous Improvement Initiatives: Implemented continuous improvement initiatives to optimize IAM processes, technologies, and governance frameworks based on industry trends, emerging threats, and organizational feedback., Recognition and Awards: Received award for Global Excellence for Service Delivery from IBM
  • Dynpro Consultancy, IT Security Specialist, 04/2015, 11/2017, Bengaluru, 2.6 Years, Managed and maintained CA Control Minder environment, including policy configuration, Rules management, and user management., Conducted regular health checks of Unix/Linux/Solaris systems to identify vulnerabilities, performance issues, and security risks., Implemented and managed patch management processes for Unix/Linux/Solaris servers to ensure systems are up-to-date and protected against known vulnerabilities., Collaborated with system administrators and security teams to remediate identified issues and ensure compliance with organizational policies and standards., Developed and maintained documentation for health checks, patch management procedures, and system configurations.
  • Dhruv Compusoft Consultancy Private Limited, AS400 administrator, 04/2012, 03/2015, Bengaluru, 3 Years, Provided support in L1/L2 level in AS/400 Administration, Data extraction from I-series, Creating Queries using Query/400, Daily & Monthly Backup and Restore objects., AS400 Housekeeping-Maintaining the health of AS400 by regularly monitoring the system., Operation knowledge on Policy creation/Endorsement/renewal/Cancellation for all contract types including Health., Receipt creation, Client/Agent creation & modification, Payment creation/processing, Claims processing health & non health, Pending policy deletion.

It Skillset

Agile, Waterfall, Scrum, Kanban, Windows, Unix, Linux, AS400, Tandem, JIRA, Bugzilla, Kanban board, MS-Office tools, Microsoft teams, Cornerstone, BMC Remedy, CyberArk

Personal Information

  • Passport Number: Z4309117
  • Date of Birth: 01/28/85
  • Nationality: Indian

Accomplishments

  • Supervised team of 8 staff members.

Timeline

Scrum Master

Kyndryl Solutions Private Limited
06.2022 - Current

Senior Associate II, Team Lead, Role-Based Access Control (RBAC)

Kyndryl Solutions Private Limited
09.2021 - 04.2023

Senior Associate, Team Lead, Logical Identity & Access Management (IAM)

IBM India Pvt Ltd
11.2017 - 08.2021

IT Security Specialist

Dynpro Consultancy
04.2015 - 11.2017

AS400 administrator

Dhruv Compusoft Consultancy Private Limited
04.2012 - 03.2015

B.E. - Information Science & Engineering

Pawan Kumar BSScrum Master