Led enterprise-level Identity and Access Management (IAM) and database security initiatives, ensuring secure authentication, compliance, and controlled access across UNIX servers and Oracle databases.
Key Responsibilities and Contributions:
- UNIX Server Administration: Managed user access, permission configurations, SSH key setup, and keytab deployment for secure authentication.
- Oracle Database Security: Oversaw RBAC, privileges management, tablespaces, profiles, and schema administration.
- Data Protection & Compliance: Secured sensitive data through vaulting, enforced compliance at the database level, and ensured regulatory adherence for applications behind firewalls.
- Collaboration: Partnered with application teams to manage application accounts securely, and align IAM practices with business needs.
- Technical Expertise: Utilized CyberArk, SQL Developer, WinSCP, and Web Console for secure operations; applied moderate knowledge of JIRA for workflow tracking.
- IAM & PAM Implementation: Applied IAM policies with PAM principles, maintained privileged access security, and contributed to SailPoint IGA migration efforts.
- Agile Practices: Actively participated in Agile ceremonies to improve communication, collaboration, and delivery efficiency.
Impact:
- Strengthened authentication and access control across UNIX and Oracle environments.
- Enhanced compliance posture by securing sensitive data and enforcing RBAC policies.
- Streamlined IAM processes through collaboration with SailPoint IGA migration, and CyberArk PAM integration.
- Improved team efficiency and workflow transparency through Agile participation and JIRA tracking.
Project 2:
Implemented and managed enterprise-scale Identity and Access Management (IAM) solutions across Azure Entra ID and Google Cloud Platform (GCP), ensuring secure, compliant, and efficient access control for applications, resources, and users.
Key Responsibilities and Contributions:
- Azure Entra ID Management: Oversaw access packages, application registrations, subscriptions, resource groups, roles, MFA, SSO, and third-party tenant integrations.
- Secrets & Key Vaults: Administered Azure Key Vaults, managed secrets, and enforced secure credential handling.
- User & Group Administration: Managed user lifecycle, group policies, and role assignments across multi-cloud environments. ☁ GCP IAM: Configured roles, created native accounts, and implemented Just-In-Time (JIT) access provisioning.
- GCP IAM: Configured roles, created native accounts, and implemented Just-In-Time (JIT) access provisioning.
Automation and Infrastructure as Code: Defined IAM roles and service principals using Terraform; supported DevOps service connections with audit and compliance checks.
Governance and Compliance: Enforced IAM policies, maintained Privileged Access Management (PAM) using the Saviynt PAM tool, and executed shell-based automation for Azure operations.
- ServiceNow workflows, incident management, and Jira story tracking are used to streamline IAM-related processes.
Impact:
- Strengthened the organizational security posture by enforcing least-privilege access and MFA/SSO policies.
- Improved operational efficiency through the automation of IAM tasks and integration with DevOps pipelines.
- Ensured compliance with audit standards and regulatory requirements across cloud environments.