Sandeep Malipeddi - IAM
Sandeep Malipeddi - IAM
Professional Summary:
Professional 10+ years of experience in Information Technology, which includes demonstrated work
experience in the design, development, testing, and implementation of enterprise-wide security
applications using CA SiteMinder, PingFederate, Ping Access, Ping Directory, CA Directory, Active
Directory on Windows, Unix, and Linux.
Expertise in Cyber Security & Information Assurance with deep Knowledge of Identity and Access
Management security, Application Security, Vulnerability Management, and Access Control Issues
related to Cyber Systems and Networks, AWS Cloud Security, Penetration Testing methodology,
Malware detection techniques, recommended Information Assurance Policies and Standards.
Experience in OAM (Oracle Access Management), SSO, ForgeRock Open AM, and Open DJ. Involved in
various SiteMinder upgrades including Okta
Experience as a security professional in installing, managing, and monitoring CyberArk Privileged
account security tool modules.
Assist application teams with CyberArk Application Identity Manager Integrations and linked
accounts.
Experience with designing and developing IAM products like SailPoint IIQ.
Experience with coding in distributed computing domains using technologies Java, XML, etc.
Installed, integrated, and deployed enterprise software in client environments.
Developed product customizations in Java and Bean shell to meet customer requirements.
Handling Joiners, movers, and leavers processes for high-risk business areas by provisioning, de-
provisioning, and amending accesses.
Excellent understanding of the Agile Software Development Life Cycle (SDLC), STLC, and Agile
Methodologies. Developed projects for the design, and implementation of SailPoint, including
coordinating with vendor leadership, technical services leadership, and end users.
Hands-on experience in Windows Active Directory administration, DNS, GPU, DHCP, LDAP.
Implement Microsoft Active Directory (Access Controls, Group Policy, Kerberos Authentication,
naming standards, trust relationships, best practices, security policies, and standards).
Experience in handling more than 3000+ mix of Windows servers, 400+ ESXi servers, Remote data
centers, Multiple vCenter
Hands-on experience with customization of ForgeOps Connector development, writing scripts, and
building of ForgeRock workflows.
Development of review access application (IdentityIQ), bug fixes, the addition of new certification
tools, and user interface changes on business demands.
Strong knowledge of Web Access Management and SSO technologies (Okta, SAML, and OAuth)
Experience in using SiteMinder Federation services and web agent option packs to build and maintain
Federation infrastructure to provide SSO functionality to external applications.
Experience in setting up SAML applications in OKTA Installing AD / IWA agents on member domains,
validating single sign-on, user provisioning, and troubleshooting password synchronization across
multiple Okta platforms.
Strong understanding of internal technicalities of SailPoint IIQ.
Continuously improving and automating IAM technologies that consist of PingFederate, Ping Access,
Ping ID, Forge Rock, Okta, SiteMinder, and LDAP directories.
Hands-on experience in IAM requirement analysis, implementation of Access Gateways and SAML,
OAuth, WS-Fed, and OpenID-based integrations using PingFederate
Perform installation, configuration, and maintenance of Access Manager and policy agents.
Expert in generating, and implementing SSL certificates in both IIS 5/6/7,8, Apache 2. x.
Worked on Ping ID for Multi-Factor authentication in Dev and Production environments.
Worked on Implementing OAuth Configuration with the Clients to get the Access Token to access the
web API’s
Education Details:
Bachelor in computer science- JNTU-2013
Technical Skills:
Programming Languages: Java, Python, C#, JavaScript.
Operating Systems: Windows, Linux, macOS.
Frameworks: Spring Boot, Django, .NET Core, React, Visual Studio, IntelliJ IDEA, Eclipse, Android
studio, NetBeans, Visual Studio Code, Atom
Scripting Languages: Bash, PowerShell. IBM WebSphere, SunOne/iPlanet Webserver, BEA WebLogic,
JBoss, SunOne Application Server, IIS (Internet Information Services), Apache, Oracle, MySQL, PostgreSQL,
SQL Server, NoSQL, MongoDB and Redis
Single Sign-On (SSO) and Identity & Access Management: Ping Access 3.0/4.0 PingFederate 7.0/8.0/9.0/10,
Ping ID, Ping One, Shibboleth, ADFS (Active Directory Federation Services) 1.1/2.0/2.1/3.0, Azure AD (Azure
Active Directory), Okta, Azure MFA (Multi-Factor Authentication), CA SiteMinder r12.5x/12.52sp1, CA
SPS12.52sp1
Cloud IAM Solutions: Okta, InAuth, Azure AD, Azure MFA, Ping One
Professional Experience-1
Environment: Windows Server 2003, Windows Server 2008, Windows Server 2012, MS SQL 2005, MS SQL
2008, Oracle 11g, Active Directory, JBoss 5.2, Apache 1.x/2.x, IIS (Internet Information Services) 6, IIS 7, IIS
7.5, JDK (Java Development Kit) 1.6, J2EE (Java 2 Platform, Enterprise Edition), EJB (Enterprise JavaBeans),
JSP (JavaServer Pages)
Novartis, Boston, MA
Jul 2017 to Jan 2020
Role: IAM Engineer- ForgeRock
Responsibilities:
Experience in installing, configuring, and customizing ForgeRock products (Open AM, Open DJ,
OpenIDM)
Responsible for installation, configuration, troubleshooting, and ongoing maintenance of ForgeRock
Identity and Access Management on the UNIX/Linux environment
Involved in building, testing, supporting, and determining SailPoint Identity IQ Solution design.
Involved in the complete implementation of SailPoint IQ 7.0 version.
Development of Lifecycle Manager Workflows, Lifecycle Events, Certification Events, Custom Email
Templates and Task Definitions.
Hands-on experience with IAM products (Aveksa, SailPoint, Oracle IDM, IBM identity manager,
ForgeRock, Ping Identity, Courion, CA Identity)- Design and engineering experience, handling updates
& patches
Designed and deployed Forge Rock Open AM and Open IDM to migrate from CA Cloud minder. Multi-
Factor Authentication (RSA, DUO, Secure AUTH, ForgeRock, SailPoint, CA Arcto, Okta).
Configured Organizational, Business, and IT roles for various application entitlements.
Aggregation, Refresh of data from Authoritative, and non-authoritative applications to Identity IQ
using Direct Connectors like File Delimiter, JDBC, Active Directory, and LDAP.
Integrate SailPoint IQ 7.0 technologies with in-house and third-party applications for birthright
provisioning, access request approval and fulfillment, and provisional, custom workflows.
Custom SailPoint Rule library to provide role selection extensibility in custom SailPoint Forms
eliminating future code revision in workflows.
Conducted interoperability testing and validation for FIDO authenticators and devices.
Developed user interfaces and flows for FIDO device registration and management.
Implemented FIDO attestation mechanisms to ensure the authenticity of user devices.
Highly dynamic environment with sprint teams using agile methodology.
Responsible for code implementation, SailPoint custom workflows such as LCM Joiner workflow,
Request Access, Self-Registration, and Remove Access workflow having multiple levels of custom
approvals with email notifications.
Experience with OAM (Oracle Access Management) SSO (Single Sign-on), ForgeRock Open AM &
Open DJ.
Improved Ansible with the use of EC2 for accessibility, running deck as a job scheduler, Jump Cloud as
directory service, Docker for containerization, and Nginx to provide container security
Utilized IGA analytics to monitor and report on access patterns, identifying potential security risks and
ensuring compliance with access policies.
Experience in working with Microsoft, Azure, and Okta to build custom integration for clients.
Performed the task of onboarding UAR data into SailPoint. Responsible for implementing scoping,
and preparing reports, task definitions, and rules to facilitate this onboarding process.
Provision user access, manage applications, and assign roles using LCM.
Performed Access management and reporting using Compliance Manager, Key responsibilities
included assisting the client in their Role Based Access Control and Separation of Duties (SOD) policies
initiatives.
Developed reports, and analytics using the Identity IQ provided role/user/audit search.
Performs IAM technical support and development, including monitoring and responding to server
events, ensuring data replication, gathering IAM statistics and performing general maintenance by
working with Level 2 and/or Level 3 operations personnel.
Used Rational Clear Case for check-in checkout and merging the various code versions.
Implemented Access Certification, Automated Provisioning, and Governance aspects of IIQ.
Develop complex workflows and service adapters in the SailPoint Identity IQ configuration interface.
Experience in installing, configuring, and customizing ForgeRock products (Open AM, Open DJ,
OpenIDM)
Managed client requirements and configured SailPoint connectors.
Rewriting the workflows to encompass the new way of provisioning. Restructured the entire product
to reflect direct provisioning across a large number of applications.
Responsible for managing the Administration functionality of the SailPoint such as loading data,
creating roles, creating policies, scheduling tasks and certifications, and reports.
Included the improving Identity and Access Management (IAM) capabilities by controlling access to
applications and systems that contain critical and sensitive information.
Environment: IPlanet Web Server 6.0, Apache 1.x/2.x, IIS 6, 7, 7.5, Solaris (not explicitly mentioned but
typically associated with LDAP environments)
Ping Federate 6.0, Ping Federate 7, SiteMinder R6 SP6, SiteMinder R12 SP3, Ping Access, CyberArk, Planet
Directory Server 5.2, Active Directory, MS SQL 2005/2008, Oracle 11gSAP, Boss 5.2, Java Development (DK
1.6, J2EE, EJB, JSP), IPlanet Web Server 6.0, Apache 1.x/2.x, IIS 6, 7, 7.5
Environment: CA Site Minder r12.5/r12.52 Sp1, CA Secure Proxy Server r12.5, Oracle Directory IIS 6.0/7.x,
Apache 2. x JBOSS app servers, IBM WebSphere Application Server (WAS) 7, Windows Server 2003/2008,
Red Hat Enterprise Linux (RHEL) 4/5, Splunk.
Environment: SAML, OKTA, Rapid 7, Veracode, Qualys, PingID, OWASP TOP 10.