Uploaded File
Redentor
reddel20@yahoo.com
619-995-5992
San Diego, CA 92129
Training Consultant
22 years experience W2
0
Recommendations
Average rating
17
Profile views
Summary

  • Multi-certified Technology Leader with 12+ years of professional experience with expertise on multiple IAM, operational and security technologies, to lead the analysis, design, and deployment of IAM architecture and other security projects.
  • Provided architecture and design for IAM, PAM, SSO, MFA, DLP, SIEM APIs resource connectors specially with Ping Identity such as PingFederate, PingID, PingOne, PingAccess, Okta, VMWare Tanzu, Zero Trust Architecture, Microsoft FIM-MIM, SatelliteX, Snowflake, and Auth0, Broadcom/CA Technologies/Symantec, Layer7 APIs, IBM Open Service Broker API, WS02 API, Apigee Edge APIs
  • Build Breach & Attack from MITRE Attack focus on the overarching threat landscape
  • Identify the probable threats the organization will encounter to continue to test and validate that the security controls mandated by a specific compliance framework are working effectively along with the report out with granular data about their regulatory and compliance effectiveness
  • Determine the degree to which specific people, processes, and technologies comply with regulatory frameworks such as NIST, DoD's CMMC, PCI DSS, COBIT5, ISO/IEC, SOX, HIPAA, NERC-CIP, GDPR, FedRamp, FISMA, etc.
  • Ensure compliance validation happens routinely rather than through occasional audits or internal security reviews.
  • Improve the organization's overall security posture. Identify key hostile actors using a globally vetted framework.
  • Understanding which assets will be procured within the planning horizon across all areas not just the assets that currently exist and focused on identifying and understanding future risks, as well as the business impact of those risks.
  • Develop more granular performance on Bigdata, and drive improvements in your organization's security and technology governance processes.
  • Creating Threat-Informed Defense like construct aligns red and blue to focus everyone in the security team on a process of continuous threat-informed defense analysis.
  • Threat-informed defense applies a deep understanding of adversary tradecraft and technology to protect against, detect, and mitigate cyberattacks.
  • Responsible for implementing, integrating, and supporting Okta's cloud technologies into Client's IAM environment including integration in to SSO, federation, web access management, and directory service environments.
  • Configured and deployed SailPointIQ, Saviynt, ForgeRock, GCP, AWS, Azure, Kubernetes, Jenkins, Docker, Istio, Grafana, Kiali, Jaeger, Cert-Manager, Zipkin, Prometheus, Anthos, SUSE, D2IQ, Couchbase, RAFAY, REPLICATED, NetIQ, Ping Identity, Zero Trust, Dynatrace, SD-WAN, Cisco, FortiGate, Checkpoint, Juniper Networks, CyberArk, Saviynt, OIM 10g, 11g, 12c, Red Hat, IBM IAM/SIEM, Kubernetes, Docker, Thycotic, Terraform/HashiCorp Vault/T/Consul/Nomad, SAFETICA DLP, VMWare Tanzu, MuleSoft, Netskope, One Identity, sumo logic, Zscaler, CData, ServiceNow, Oracle, SatelliteX connector mainly for uses such as AD/LDAP, .NET, Java, RUST, Python, PowerShell, Golang, and ADSI interfaces to communicate with an Active Directory Domain Controller.
  • Has worked with ForgeRock OpenAM/IDM/DS/Edge Security access policy which gives you control over user provisioning and user entitlements, defined using the eXtensible Access Control Markup Language (XACML), and XACML defines an XML Attribute-Based Access Control (ABAC) language with Role-Based Access Control (RBAC), .NET features as well.
  • Configured and integrated the CyberArk/Conjur, Thycotic heartbeat, Lieberman, Beyond trust Bomgar Secret Server password management software with industry applications available like ConnectWise, Autotask, Microsoft CRM, and name of few specially Okta.
  • Implemented Google Infrastructure Security Design and configuration that includes Google Cloud Directory Sync, creating Public-Private Key Pairs, setup your sync with Configuration Manager, setup your own Custom SAML Application, setup SSO using 3rd party IdPs, Manage Multiple Sign, troubleshot Single Sign-On (SSO), used JSON Web Tokens including MQTT Bridge.
  • Configure and implementation a centralized database and protocols using Ethereum is a general. A consortium blockchain is a private blockchain but authority is distributed and acts in the best interests of the network. Building Blockchain using AWS, Microsoft Blockchain, VMWare, IBM Blockchain, IBM Open Service API deployment, GoChain Multi Node Blockchain-Enterprise Edition deploy a complete environment to allow enterprise scenarios on the GoChain platform. This multi node offering creates virtual machines, associated infrastructure and the primary Docker based container deployment in a multi node setup for enterprise use.
  • Configured REST to LDAP gateway can hold the configuration objects. Configured security parameters for establishing secure connections between the gateway (as a client) and the servers it contacts, such as LDAP directory servers and SAML, SPLM, XACML, SCIM, OpenID, and OAuth 2.0 authorization servers.
  • Interfaced CyberArk's Digital Enterprise Password Vault (EPV) integration with Conjur expands the CyberArk Privileged Access Security to the DevOps space and to modern and dynamic environments Secrets that are stored and managed in the CyberArk Vault can now be shared with Conjur and used via its clients, to build APIs and SDKs to enhance security.
  • Configuration using AWS, Azure, Google, Oracle and MuleSoft Anypoint platform the necessary Secret Templates based on sensitive data needs, establishing needed roles and which permissions should be allocated, identify any possible recommendation not limited to a global auditing, web applications, risk management, compliance management, network management, and Phishing attacks, including compliance along with Single Sign On SSO, Multi factor Authentication MFA process and other APIs connectors.
  • Developed and maintained an access management integration process detailing a technical integration template and p

Experience
SailPointIQ, Microsoft FIM-MIM Infrastructure Architect Design & Development Saviynt, Thycotic, Okta
Information Technology
Nov 2009 - present

I experienced in Architect, infrastructure, Project Manager, Engineering, and Cyber Security Analyst for Business and IT Role Model, Risk Model, include Best Practice on Security particular for Governance Identity Access Management with the whole process: High performance and results driven technical professional with proven success in information security, field engineering, data processing, and application administration. A goal-oriented team leader with strong abilities to increase system reliability, maximize productivity, introduce system efficiencies leading to budget favorable results for the supported operations. Response to threat and hunting them & perform Penetration Testing for compliance, vulnerability, auditing, risk, compliance and exploitation.

Saviynt/Safetica/ForgeRock/OIM/GCP/Snowflake, CyberArk/(CSIRT)/Ping Identity/Pentesting/WSO2/Okta/Auth0/PCF/DLP/AI & ML

ForgeRock Identity Platform Infrastructure Architect PCF OIM Information Security IAM DLP CyberArk Cyber Security Compliance Snowflake Security Analyst
Remove Skill
IAM
Dec 2016 - Dec 2016
IAM
Remove Skill
IDM/MFA/IAM Enterprise Security Consultant
Jan 2011 - Jul 2011
•Management and support 1,000 or more tickets for identity access management to end user or client on any such as IBM or Apple Operating Systems (OS), applications, security, hardware/software, Network Internet connection, WiFi, Mesh Topology, AP Wireless, all network printers with plotters, routers, troubleshoot systems, installed all printers, laptops, desktop, server, IDS, and Asset Management.
  • Firewall, mainframe, updates, imaging, data backup, protect asset tag equipment, updates SSD management asset systems, repair all tickets for clients, secured parameters, installed plotters, programmed, configuration, repair for RMA, updates services desk software for change tickets acquisition for Sempra/SDGE mainframe systems.
  • Troubleshoot PC to any viruses, Trojans horse, worms, rootkits, spam, malware, IDS systems, working with all main brand PC manufacturer for repairs, testing products.
Applications Security Enterprise Security IAM IDS Multi-factor Authentication Laptops Firewall Malware
Remove Skill
Network Support Tech/Engineer
Jan 2009 - Jan 2011
Repair HP, Sony, DELL, Toshiba, Compaq, Xerox, Network Printers, Troubleshoot Systems Server, laptop, desktop, wireless connection, drivers, OS, Access point AP, Troubleshooting systems for viruses and any Malware Responsible for troubleshooting and repair of Telco equipments and switching equipments which includes Nortel, Ericson, Alcatel etc.. and to all troubleshooting network using, Ethernet crossover cable, Console cable, Hyperterminal, Solarwinds, Putty, installation, diagnostic, programming, Network Analyzer, Infrastracture Telecom equipments, Cisco router Catalyst 3750 switch, Adtran router 924E, MPLS, POTS, Site Survey Wireless Access Point(AP) Cisco Aironet, Firetide Mesh Desgin (AP) Hotview, Airtight (AP) Firewall Security, VPN Access, Wireless Antennae, Repeaters, Performing testing T1 loopback ID Config, Gateway/IP Access, DNS, DMARC circuits repair, cabling, DMZ switch, external switch, CLM switch, installed HP Server, Sun Firewall, IP Camera, SONY Camera, PBX system, VoIP Digi PortServer. Always working in Gov. like Homeland Security, EEOC
Cisco DNS Firewall MPLS Network Support Printers Site Surveys SolarWinds VoIP VPN IBM I Access HP Ethernet Xerox Wireless T1 PuTTY Problem Solving POTS PBX Nortel Dell Malware
Remove Skill
Network Tech/Engineer
Oct 2008 - Jan 2009
Golden State Communication LLC Merced, CA. Network Tech/Engineer    Created and maintained site-to-site and remote various VPNs including Nortel VPNs. Utilized and added to TCP/IP knowledge on a daily basis. Worked at customer site, remote NOC center, with Quest Communications, AT&T NOC Center Services, and Vital Network Services. Responsible for troubleshooting and repair of switching equipment which includes Nortel, Ericson, Alcatel  and to all troubleshooting network using, Ethernet crossover cable, Console cable, HyperTerminal, Solarwinds, Putty, installation, diagnostic, programming, change pin#, generate reports,  Network Analyzer, Infrastructure Telecom equipment, Cisco router Catalyst 3750 switch, Adtran router 924E, MPLS, POT, LTE, CDMA, GSM. Administering Blackberry Enterprise Server users account configuring monitoring service to send notification messages through a messaging server within the organization Troubleshot and configured JNDI (Java Naming and Directory Interface), delegate port and open the port on the firewall by programming systems command on Administration Service instance and navigate to system.   Heat mapping software (Panopticon), site survey wireless access Point(AP) Cisco Aeronet, Firetide Mesh Design (AP) Hotview, Airtight (AP) Firewall security, VPN access, wireless antennae, repeaters, performing testing T1 loopback ID configuration Gateway/IP Access, DNS, DMARC circuits repair, cabling, DMZ switch, external switch, CLM switch Installed HP Server, Sun Firewall, Microwave, IP Camera, Sony camera, Acti, Axis, PBX system, VoIP, port server TS8, Router KSAC1001, Model WSC3750-24TS-S & KSAC1001; KSAC1002; KSAC1003; KSAC1004; KSAC1005; KSAC1006 and LAN Router PSAC062. Environment: Cisco routers, ADTRAN routers, Nortel VPN, TCP/IP, Sun Firewall, Cisco Aironet
Cisco DNS Firewall JNDI LAN MPLS Routers Site Surveys SolarWinds TCP/IP VoIP VPN IBM I Access
Remove Skill
VoIP System Network Tech
Feb 2005 - Oct 2008
Installed and configured VoIP Gateway QoS (Quality of Services), PSTN, MPLS, POTS, corporate PBX or both Cisco router, ADTRAN router, switch troubleshooting, hubs, switch. Worked with the most forms of Internet connectivity such as with Dial-up Modem, ISDN Modem, ADSL Modem, Cable Modem, LAN/WAN/MAN, Wireless, and T1T3, DS1DS3, behind a router enabling Internet connectivity even in places where there is no broadband access such as Remote, Installed IP Devices VoIP Phones, Axxess PBX Systems, Inter-Tel 5000 PBX Systems Phones and program systems features. Set up VoIP, setup wireless access connectivity in any businesses or non-business and create ISP dial up connection, wireless LAN configuring DHCP, uses WI-FI 802.11b, 802.11g, Call Center, moved phones to a new location, trained customers all the necessary information they need regarding overviews company products. Installed working in analyst the data, cleansing, mapping, and migration of data in the existing site system to a new systems. Lotus Notes, Microsoft Exchange, SQL database, responsible for data activities and for developing or completing, and documenting, migration strategy & care team repair all the necessary hardware, software, malware, drivers thru customer premises troubleshoot Operating Systems (Most Microsoft Products OS). Penetrate most malware and clean system, backup data, maintain data maps for TCP/IP unique business requirements develop the technical environment for cleansing of legacy system data, as needed develop requirements for load programs. troubleshoot blackberry application such as messaging, video & web media.
Cisco DHCP LAN Microsoft Exchange MPLS TCP/IP VoIP WAN Malware
Remove Skill
I&R Cable/Switch Tech
Jul 2003 - Jan 2005
Dealt with Account Managers' and customers' warranty repair work, processed RMA return material authorization approval, set-up new contracts for a new clients. Handled customers technical complaint/support, process development and improvement, Travel to Customer's Site, ATM machine repair re-configure, updates, migration, security parameters and also Uses Retina, Kaspersky, A-Square, Monitor using Main Configuration Setting by creating or Editing first, set-up POS (Point of Sale) in Cinema, Store configuring units, troubleshooting, installed. Infrastructure Communication Equipments (CPE), MPLS, XDSL, T1&T3, POTS, Network using Sunset SDH/MTT, T-Berd, and Alcatel, NEC system DSX-40, MITEL SX2000, QX-S3126T, Troubleshoot Blackberry and Motorola Bluetooth application such as messaging, video & web media, V-SAT Satellite Hughes Network System Dish Network, Pegasus V-SAT Satellite, Airtight Network Access Point (AP), Cisco Aironet, Firetide, Network Mesh Access Point (AP) other uses for testing ADSL/ADSL2+, STM-1/4 optical, ITU mapping multiplexer section, and high and low order path overhead to monitor and test the SDH network. Application software Lotus Notes, Repair Operating System and software from virus, spyware, trojans, bugs, malware, and other parasites. Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System: Implementing/Configuration Windows Hardware/Software, diagnostic, Testing, Troubleshooting, DELL Computer, IBM, Sony, and Compaq. Automating, Optimizing Windows, Security Access Workstation Users, Performing Systems Recovery, Managing Network Connection, Cabling Network with CAT-3, 4, 5, 6, 7, Fiber Optic, Ethernet HUBS, Trunk Line, Build or Infrastructure Voice & Data, 110 Block Installation, Termination, Splicing, Routing Cables, Cross-Connect, DC Power Installation, Cutover Switch existing lines, Build a New Paneling.
Lotus Notes Hubs Fiber Optics Ethernet Dell Compaq Cisco Blackberry
Remove Skill
Splicing/Data Network Support
May 2000 - Jul 2003
Troubleshooting and repair of Network Infrastructure Communication and switching Equipments like Nortel Networks, AT&T switch, Alcatel, Cisco, Lucent, XDSL, T1&T3, Bi-directional, or full duplex, voice path with limited frequency range of 300-3400 Hz: in other words a signal to carry the sound of the human voice both ways at once. Call
  • progress tones, such as dial tone and ringing signal; subscriber dialing; operator services such as directory assistance, long distance and conference calling assistance; a standards compliant analog telephone interface Including BORSCHT function. Usually the pair of wires from the central switch office to a subscriber's home Other services such as; MPLS, POTS, PSTN, ISDN, and Cabling to CO and Co
  • Branches, Security Parameters, All the customers premises repair troubleshooting ATM, switch, configured, updates, Infrastructure Cisco system, Installed DC Power for all the Telecommunication Equipments CPE, built Multilayer Switched Networks; created and deployed a Global Intranet, and implemented, developed, designed, maintained, configured, tested, troubleshooting techniques in environments that use Cisco Multilayer Switches, Multiplexers, IP Provisioning, ADSL, DSL Deployment, VoIP Gateway.
Cisco MPLS Network Infrastructure Network Support Switches VoIP
Remove Skill
Edit Skills
Non-cloudteam Skill
Education
Cisco
LANWAN Pro., 2009 - 2009
A+, MCP, & MCSE
Techskills, 2002 - 2004
Electocardiogram EKG
Institute for Business & Technology, 1990 - 1992
Certifications
CompTIA A+
CompTIA, 2003
Angular2
Auth0
Skills
Cisco
2011
10
Compliance
2021
10
Cyber Security
2021
10
CyberArk
2021
10
DLP
2021
10
ForgeRock Identity Platform
2021
10
IAM
2021
10
Information Security
2021
10
Infrastructure Architect
2021
10
OIM
2021
10
PCF
2021
10
Security Analyst
2021
10
Snowflake
2021
10
MPLS
2011
9
VoIP
2011
9
Malware
2011
5
Network Support
2011
5
Dell
2011
3
DHCP
2008
3
Ethernet
2011
3
LAN
2009
3
Microsoft Exchange
2008
3
Network Infrastructure
2003
3
Switches
2003
3
TCP/IP
2009
3
WAN
2008
3
DNS
2011
2
Firewall
2011
2
HP
2011
2
IBM I Access
2011
2
Nortel
2011
2
PBX
2011
2
POTS
2011
2
Printers
2011
2
Problem Solving
2011
2
PuTTY
2011
2
Site Surveys
2011
2
SolarWinds
2011
2
T1
2011
2
VPN
2011
2
Wireless
2011
2
Xerox
2011
2
Blackberry
2005
1
Compaq
2005
1
Fiber Optics
2005
1
Hubs
2005
1
Lotus Notes
2005
1
Applications Security
2011
1
ATM
0
1
AWS
0
1
Checkpoint Firewall-1
0
1
Cisco ASA
0
1
Docker Containers
0
1
Documentation
0
1
Elasticsearch
0
1
Enterprise Security
2011
1
HIPAA
0
1
Identity Access Management
0
1
IDS
2011
1
JNDI
2009
1
Juniper
0
1
Laptops
2011
1
LDAP
0
1
Linux
0
1
LTE
0
1
MS Azure
0
1
MS SharePoint
0
1
Multi-factor Authentication
2011
1
Network Administration
0
1
Network Security
0
1
OAuth
0
1
QoS
0
1
Routers
2009
1
SAML
0
1
SSO
0
1
Technical Support
0
1
UNIX
0
1
VMWare
0
1
XML Firewalls
0
1