Skilled IT professional with 2.5 years of hands-on experience in Tanium administration and 1 year in Azure system administration. Expertise in managing Tanium modules such as Patch, Comply, Connect, Deploy, and Asset for vulnerability management, patch compliance, and endpoint visibility. Proficient in troubleshooting scan issues, client health, and integration with external tools. and collaboration with security and infrastructure teams.
Tanium Administrator / Endpoint Security Engineer
Infosys – Client: Molina Healthcare
Feb 2024 – July 2025
Worked hands-on with key Tanium modules including Comply, Patch, Deploy, Discover, Asset, Inventory, Connect, and Interact to manage over 30,000 endpoints across a hybrid infrastructure.
Proactively monitored the Tanium console for client health, system performance, and compliance gaps; identified and resolved misconfigurations impacting scan coverage and patch deployments.
Remediated critical CIS benchmark failures reported in Tanium Comply; collaborated with Linux and Windows teams to validate false positives and drive successful reassessments.
Integrated CrowdStrike exclusion list management with Tanium Deploy to avoid security tool conflicts during software distribution tasks.
Stayed aligned with Tanium release updates and module enhancements, often testing new capabilities in lower environments before production use.
Used Tanium Connect to schedule and deliver critical data exports — including patch status, client health, and vulnerability summaries — to external systems like ServiceNow, Splunk, and internal email groups.
Investigated and resolved vulnerability scan issues, patch scan failures, and Comply scan errors, including broken policies, timeout errors, and assessment mismatches.
Collaborated with vendor support teams when critical vulnerabilities were detected by Tanium clients but not remediating correctly in scans, and followed through with log analysis and case tracking.