Preview

Identity and Access Management

Satisfactory Essays
Open Document
Open Document
1972 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Identity and Access Management
Amit Kumar
Cell: (864) 205-4309 | E-Mail: ak151170@gmail.com | 351 77th St , Richfield, MN 55432

CAREER FOCUS

Amit Kumar is an IDAM Subject Matter Expert (SME) , Architect and Information Security Specialist with over 13+ years of technology industry experience. His background consists of several Architectural , Technical Lead and Leadership roles wherein he led teams of varying size through the Planning, Design, Implementation, and Deployment phases of critical IDAM based infrastructure. He also has extensive hands-on experience in the Implementation, Configuration, and Maintenance of several highly complex systems in an Enterprise Level environment.

Mr. Amit is a Business Executive, and Thought Leader with a diverse background in Identity Access Management (IDAM), Technical Project Manager , Program Management, Systems Integration, Enterprise Architecture, Risk Management, Systems Architecture and Design, Regulatory Compliance and Policy. He is an out of the box thinker that understands the “Big Picture”, and knows how to engage the right Tools/ Resources to ensure his clients meet their goals. He has a proven record of accomplishment for delivering successful large-scale engagements.

EDUCATION

Bachelor of Engineering , Computer Science & Engineering
Mysore /Kuvempu University , Karnataka India -.1997
Diploma in Business Administration (DBA)
IGNOU, India – 2012 PROFESSIONAL OVERVIEW
|TOOLS EXPERIENCE: |APPLICATIONS EXPERIENCE: |AREAS OF SPECIALIZATION: |AREAS OF EXPERTISE: |
|Oracle 11g IDM /SOA |Web Logic |Identity & Access Management System |IDAM Architecture and Implementation |
|Oracle Web set Identity Manager(Sun |Web Sphere |(IAM) |Strategic Planning/ Roadmap Development |
|IdM) |Apache Web Server |Federal Identity Credential

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As a member of the Information Security team for a small community college I have been tasked with providing an access control system which will monitor the access of students in and out of the college dormitory. This access control system is needed to provide increased security to the students and decrease the access of unauthorized students to their respective dormitories.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Canadian Shield Case

    • 1115 Words
    • 5 Pages

    As the leader of Information Systems at Canadian Shield, one of many subsidiaries of Assurance Centrale, Seamus Reynolds was tasked with piloting a new information system that could potentially replace the IS’s at all of Assurance Centrale’s regional offices. Five years after starting this project he was feeling the weight of the responsibility for a project that could eventually transform the entire enterprise.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In both private and public sectors, organisations are building Information Technology infrastructure to improve their business capacity. There is a notable growth in the integration of organisations and forming of federations. This integration however is accompanied by some overhead for managing identities of employees, business partners, and customers, as the cost for dealing with the life cycle of user identities is very great. This is true because the relationship between an organisation and users can change often, and each change that occurs requires administration to act. This is also cumbersome for the individual if they are required to register a separate account for all the organisations that they access.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Best Essays

    What kind of a company enters an industry with competitors already entrenched? Which ones actually succeed? The answer to both the questions is Reliance Infocomm now known as Reliance Communication. Reliance Infocomm is a confident and smart company that was able to enter a saturated and highly competitive industry, and emerge at the top. The cut-throat competition in the telecommunication sector of India posed a great threat to the development of Reliance Infocomm. Many other cellular service providers who tried to enter the market have failed miserably. So, what helped Reliance Infocomm in emerging at the top? How did it manage to compete in the industry though it entered late in the race?…

    • 2477 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    SAP HANA SPS 07: Security

    • 4051 Words
    • 24 Pages

    1. In Microsoft Active Directory, for each host and alias register new service principal names and map them to the…

    • 4051 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Management Accaunting

    • 908 Words
    • 4 Pages

    CHAPTER 4: MANAGEMENT OF CURRENT ASSETS MANAGING MANAGING INVENTORY EOQ MODEL Reorder Point ABC System Just-in-Time System EOQ = √2 X S X O / H S = no of usage per period Ordering Cost Admin cost to place O = cost per order and receive order…

    • 908 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    BBA college list |SMT. S.B. PATEL INSTITUTE OF BUSINESS MANAGEMENT,VISNAGAR, VISNAGAR | |PRINCIPAL : PRAJAPATIRASIKKUMARISHWARBHAI E - Mail : ssbpibm@yahoo.co.in | |M : 8401212073 Phone No : 02765223485 Fax : 02765231186 | |Website : bbavisnagar.org College Code : 098 | |Degree : B.B.A Faculty : BUSINESS MANAGEMENT | |2 |NARSINHBHAI PATEL COLLEGE OF COMPUTER STUDIES & MANAGEMENT COLLEGE, KADI | | |PRINCIPAL : DrVijaykumarMChavda E - Mail : dr.vijaychavda@gmail.com | | |M : 9824215396 Phone No : 02764244385 Fax : 02764244381 | | |Website : www.npccsm.co.in College Code : 114 | | |Degree : B.B.A, B.C.A Faculty : BUSINESS MANAGEMENT, COMPUTER SCIENCE | |3 |COLLEGE OF COMPUTER & MANAGEMENT STUDIES,VADU, KADI | | |PRINCIPAL : DRBIJENDRASAGRAWAL E - Mail :…

    • 1598 Words
    • 7 Pages
    Satisfactory Essays