

Technology and Platform Engineering leader with 15+ years of experience designing, scaling, and governing enterprise API and identity platforms in highly regulated environments. Proven track record of leading large engineering teams and delivering secure, API-first and microservices-based architectures aligned with business outcomes. Strong expertise in Apigee Hybrid (on-prem & hybrid), IAM, OAuth 2.0, OIDC, JWT token handling, and identity federation with enterprise IDPs (ForgeRock). Deep understanding of Zero Trust architecture principles, service mesh security (mTLS, east-west traffic protection), and secure-by-design API architectures. Extensive experience in BFSI, Insurance, and US-regulated enterprises, driving compliance-ready platforms that enhance security, scalability, and governance.
Designed and deployed enterprise-grade Single Sign-On (SSO) using PingFederate across 500+ internal and SaaS applications. • Applied TOGAF principles to define enterprise-wide architecture standards covering Business, Application, Data, and Technology domains. • Designed and governed on-premises and hybrid API security architecture using Apigee, enforcing OAuth 2.0 and JWT-based access controls across enterprise APIs.
Managed a team to identify and resolve challenges in daily BAU operations. • Oversaw infrastructure operations including user account and license management. • Configured and maintained Palo Alto and FortiGate Next-Generation Firewalls for secure network operations. • Implemented App-ID, User-ID, and Content-ID for application-based f irewall security. • Created and enforced Conditional Access and Multi-Factor Authentication (MFA) policies in Azure AD. • Resolved MFA-related issues including resets and configuration updates. • Managed Azure AD Connect and Connect Health for directory synchronization. • Supported migration of all directory objects from multiple domains to a unified target domain. • Monitored and resolved Azure AD licensing and group-based assignment issues. • Troubleshot Azure AD Connect sync errors, data mismatches, and attribute conflicts. • Managed security and identity operations including DirSync and PTA for seamless authentication. • Assisted users with Self-Service Password Reset (SSPR) and login customization. • Collaborated with billing and gateway teams to fulfill customer requirements.
Troubleshot complex Active Directory issues including replication, FRS, Global Catalog, FSMO, DFS, and LSASS errors. • Resolved advanced AD-related problems for Microsoft Enterprise customers. • Provided advisory support on Active Directory design, implementation, and best-practice recommendations. • Monitored and resolved Azure AD licensing issues, including group-based license assignments. • Configured and managed Self-Service Password Reset (SSPR) in Azure AD. • Created and enforced Data Loss Prevention (DLP) policies in Microsoft 365 Security & Compliance. • Managed Azure resources including storage, enterprise applications, and virtual components. • Configured enterprise applications with Single Sign-On (SSO) using the SAML protocol in Azure AD. • Developed and maintained retention and Messaging Records Management (MRM) policies for data lifecycle compliance. • Implemented Office Message Encryption (OME) to secure email communication in O365. • Introduced Microsoft Planner syncing to monitor Office 365 Message Center updates. • Configured and managed Azure AD Application Proxy for secure remote access to internal apps. • Ensured all client services were maintained in line with contractual SLAs and performance standards
Worked on Outlook troubleshooting issues. • Troubleshot Outlook configuration issues including profile setup and connectivity. • Configured and supported ADFS 2.0, ADFS 3.0, ADFS Proxy, and WAP. • Managed Exchange Environments including Exchange 2007, 2010, 2013, and 2016. • Performed migrations to SharePoint Online (SPO) and OneDrive for Business (ODB). • Configured and optimized EOP policies to safeguard email communication. • Implemented custom anti-phishing policies to block phishing attempts. • Collaborated with cybersecurity teams to fine-tune EOP policies. • Designed and implemented retention policies in Office 365 to meet compliance requirements. • Configured retention labels and classifications for automated data management. • Collaborated with legal teams to create and enforce legal hold policies