Dynamic Lead Engineer in Cybersecurity with extensive 15 years of experience, specializing in PingFederate and SailPoint IDN. Proven track record in implementing secure SSO solutions and identity governance, enhancing compliance and user access. Strong analytical skills complemented by effective collaboration with cross-functional teams to drive successful project outcomes.
Designed, configured, and maintained PingFederate infrastructure to support enterprise-wide Single Sign-On (SSO) using SAML 2.0, OAuth 2.0, and OIDC protocols.
Implemented identity federation with third-party service providers and external partners, ensuring secure, seamless access to internal and external applications.
Developed and managed custom authentication policies, adapters, and token handling logic in PingFederate to meet specific business requirements.
Integrated PingFederate with LDAP/Active Directory, enabling centralized user authentication and profile attribute mapping.
Configured OAuth clients, scopes, and resource servers for secure token issuance and access management using JWTs and bearer tokens.
Collaborated with cross-functional teams to implement MFA solutions and adaptive authentication flows.
Supported PingFederate upgrades, patching, and HA configurations to ensure availability and performance.
Integrated PingFederate with PingDirectory, PingAccess, and API gateways.
Conducted security audits, logging, and token trace analysis for troubleshooting and compliance purposes.
Played a key role in the organization’s Zero Trust and IAM modernization initiatives.
Sailpoint IDN:
Designed, implemented, and managed SailPoint IdentityNow (IDN) for enterprise-wide identity governance and access management in a hybrid cloud environment.
Developed and configured lifecycle events, identity profiles, and correlation rules to automate user onboarding, role changes, and offboarding processes.
Integrated multiple authoritative sources including Active Directory, Workday, and HRIS systems with IdentityNow for consistent and accurate identity data.
Configured account aggregation, entitlement harvesting, and provisioning policies for both cloud and on-premise applications using IDN connectors.
Defined and enforced access certification campaigns and policy violation rules (SOD, role policy) to meet compliance and audit requirements.
Built custom transforms and rules using Beanshell and SailPoint APIs to extend out-of-the-box functionality.
Implemented Access Request Center and designed role-based access controls (RBAC), minimizing overprovisioning and ensuring least-privilege access.
Collaborated with InfoSec and business stakeholders to align identity governance with enterprise security policies.
Provided post-deployment support and training to internal teams, improving adoption of IDN’s self-service and compliance capabilities.
Managed project timelines to ensure timely delivery of engineering projects.
Collaborated with clients to identify and address technical requirements.
Developed technical documentation for engineering designs and processes.
Resolved complex technical issues through troubleshooting techniques and root cause analysis.
Analyzed customer requirements and designed software solutions to meet their needs.
English, Telugu, Hindi
Project Transition, IBM India - USA, Raleigh, North Carolina February 2009 — April 2009
Project Transition, IBM India - USA, Raleigh, North Carolina March 2010 — May 2010
Project Transition, Capgemini - France, Paris March 2016 — April 2016