Redentor
reddel20@yahoo.com
619-995-5992
San Diego, CA 92129
SailPointIQ, Microsoft FIM-MIM Infrastructure Architect Design & Development Saviynt, Thycotic, Okta
24 years experience W2
0
Recommendations
Average rating
67
Profile views
Summary

  • Multi-certified Technology Leader with 12+ years of professional experience with expertise on multiple IAM, operational and security technologies, to lead the analysis, design, and deployment of IAM architecture and other security projects.
  • Provided architecture and design for IAM, PAM, SSO, MFA, DLP, SIEM APIs resource connectors specially with Ping Identity such as PingFederate, PingID, PingOne, PingAccess, Okta, VMWare Tanzu, Zero Trust Architecture, Microsoft FIM-MIM, SatelliteX, Snowflake, and Auth0, Broadcom/CA Technologies/Symantec, Layer7 APIs, IBM Open Service Broker API, WS02 API, Apigee Edge APIs
  • Build Breach & Attack from MITRE Attack focus on the overarching threat landscape
  • Identify the probable threats the organization will encounter to continue to test and validate that the security controls mandated by a specific compliance framework are working effectively along with the report out with granular data about their regulatory and compliance effectiveness
  • Determine the degree to which specific people, processes, and technologies comply with regulatory frameworks such as NIST, DoD's CMMC, PCI DSS, COBIT5, ISO/IEC, SOX, HIPAA, NERC-CIP, GDPR, FedRamp, FISMA, etc.
  • Ensure compliance validation happens routinely rather than through occasional audits or internal security reviews.
  • Improve the organization's overall security posture. Identify key hostile actors using a globally vetted framework.
  • Understanding which assets will be procured within the planning horizon across all areas not just the assets that currently exist and focused on identifying and understanding future risks, as well as the business impact of those risks.
  • Develop more granular performance on Bigdata, and drive improvements in your organization's security and technology governance processes.
  • Creating Threat-Informed Defense like construct aligns red and blue to focus everyone in the security team on a process of continuous threat-informed defense analysis.
  • Threat-informed defense applies a deep understanding of adversary tradecraft and technology to protect against, detect, and mitigate cyberattacks.
  • Responsible for implementing, integrating, and supporting Okta's cloud technologies into Client's IAM environment including integration in to SSO, federation, web access management, and directory service environments.
  • Configured and deployed SailPointIQ, Saviynt, ForgeRock, GCP, AWS, Azure, Kubernetes, Jenkins, Docker, Istio, Grafana, Kiali, Jaeger, Cert-Manager, Zipkin, Prometheus, Anthos, SUSE, D2IQ, Couchbase, RAFAY, REPLICATED, NetIQ, Ping Identity, Zero Trust, Dynatrace, SD-WAN, Cisco, FortiGate, Checkpoint, Juniper Networks, CyberArk, Saviynt, OIM 10g, 11g, 12c, Red Hat, IBM IAM/SIEM, Kubernetes, Docker, Thycotic, Terraform/HashiCorp Vault/T/Consul/Nomad, SAFETICA DLP, VMWare Tanzu, MuleSoft, Netskope, One Identity, sumo logic, Zscaler, CData, ServiceNow, Oracle, SatelliteX connector mainly for uses such as AD/LDAP, .NET, Java, RUST, Python, PowerShell, Golang, and ADSI interfaces to communicate with an Active Directory Domain Controller.
  • Has worked with ForgeRock OpenAM/IDM/DS/Edge Security access policy which gives you control over user provisioning and user entitlements, defined using the eXtensible Access Control Markup Language (XACML), and XACML defines an XML Attribute-Based Access Control (ABAC) language with Role-Based Access Control (RBAC), .NET features as well.
  • Configured and integrated the CyberArk/Conjur, Thycotic heartbeat, Lieberman, Beyond trust Bomgar Secret Server password management software with industry applications available like ConnectWise, Autotask, Microsoft CRM, and name of few specially Okta.
  • Implemented Google Infrastructure Security Design and configuration that includes Google Cloud Directory Sync, creating Public-Private Key Pairs, setup your sync with Configuration Manager, setup your own Custom SAML Application, setup SSO using 3rd party IdPs, Manage Multiple Sign, troubleshot Single Sign-On (SSO), used JSON Web Tokens including MQTT Bridge.
  • Configure and implementation a centralized database and protocols using Ethereum is a general. A consortium blockchain is a private blockchain but authority is distributed and acts in the best interests of the network. Building Blockchain using AWS, Microsoft Blockchain, VMWare, IBM Blockchain, IBM Open Service API deployment, GoChain Multi Node Blockchain-Enterprise Edition deploy a complete environment to allow enterprise scenarios on the GoChain platform. This multi node offering creates virtual machines, associated infrastructure and the primary Docker based container deployment in a multi node setup for enterprise use.
  • Configured REST to LDAP gateway can hold the configuration objects. Configured security parameters for establishing secure connections between the gateway (as a client) and the servers it contacts, such as LDAP directory servers and SAML, SPLM, XACML, SCIM, OpenID, and OAuth 2.0 authorization servers.
  • Interfaced CyberArk's Digital Enterprise Password Vault (EPV) integration with Conjur expands the CyberArk Privileged Access Security to the DevOps space and to modern and dynamic environments Secrets that are stored and managed in the CyberArk Vault can now be shared with Conjur and used via its clients, to build APIs and SDKs to enhance security.
  • Configuration using AWS, Azure, Google, Oracle and MuleSoft Anypoint platform the necessary Secret Templates based on sensitive data needs, establishing needed roles and which permissions should be allocated, identify any possible recommendation not limited to a global auditing, web applications, risk management, compliance management, network management, and Phishing attacks, including compliance along with Single Sign On SSO, Multi factor Authentication MFA process and other APIs connectors.
  • Developed and maintained an access management integration process detailing a technical integration template and p

Experience
Education
Cisco
LANWAN Pro., 2009 - 2009
A+, MCP, & MCSE
Techskills, 2002 - 2004
Electocardiogram EKG
Institute for Business & Technology, 1990 - 1992
Certifications
CompTIA A+
CompTIA, 2003
Angular2
Auth0
Skills
Cisco
2011
10
Compliance
2021
10
Cyber Security
2021
10
CyberArk
2021
10
DLP
2021
10
ForgeRock Identity Platform
2021
10
IAM
2021
10
Information Security
2021
10
Infrastructure Architect
2021
10
OIM
2021
10
PCF
2021
10
Security Analyst
2021
10
Snowflake
2021
10
MPLS
2011
9
VoIP
2011
9
PBX
2011
6
Malware
2011
5
Network Support
2011
5
Routers
2011
5
Broadband
2008
3
Dell
2011
3
DHCP
2008
3
Ethernet
2011
3
LAN
2009
3
Microsoft Exchange
2008
3
Network Infrastructure
2003
3
Switches
2003
3
Talyst
2011
3
TCP/IP
2009
3
Telecommunications
2011
3
WAN
2008
3
DNS
2011
2
Fiber Optic
2005
2
Firewall
2011
2
HP
2011
2
IBM I Access
2011
2
Nortel
2011
2
POTS
2011
2
Printers
2011
2
Problem Solving
2011
2
PuTTY
2011
2
Site Surveys
2011
2
SolarWinds
2011
2
T1
2011
2
VPN
2011
2
Wireless
2011
2
Xerox
2011
2
Blackberry
2005
1
Compaq
2005
1
Fiber Optics
2005
1
Hubs
2005
1
Lotus Notes
2005
1
Applications Security
2011
1
ATM
0
1
AWS
0
1
Checkpoint Firewall-1
0
1
Cisco ASA
0
1
Docker Containers
0
1
Documentation
0
1
Elasticsearch
0
1
Enterprise Security
2011
1
HIPAA
0
1
Identity Access Management
0
1
IDS
2011
1
JNDI
2009
1
Juniper
0
1
Laptops
2011
1
LDAP
0
1
Linux
0
1
LTE
0
1
MS Azure
0
1
MS SharePoint
0
1
Multi-factor Authentication
2011
1
Network Administration
0
1
Network Security
0
1
OAuth
0
1
Oracle
0
1
QoS
0
1
SAML
0
1
SSO
0
1
Technical Support
0
1
UNIX
0
1
VMWare
0
1
XML Firewalls
0
1