Description

Experience – 10+ Yrs

Education – Minimum of a bachelor’s degree in computer science or equivalent

Salary – Open for Discussion

Job Descriptions: –

  • Integrated different kind of applications like connected mode and disconnected mode applications.
  • Application Onboarding (Provisioning/De-provisioning), Birthright Provisioning, Application and Workflows.
  • Integrated different kind of applications like connected mode and disconnected mode applications.
  • Configuring of workflows in Saviynt IAM tool.
  • Strong experience with Identity Lifecycle Management (Provisioning, De-provisioning and JML flows).
  • System, Rule Management, User Provisioning, Access Certification.
  • Configured technical rules and user update rules.
  • Configured SMPT server, email templates and UI branding.
  • Build and Configure SailPoint tasks like aggregation, ID refresh, schedule tasks.
  • Implemented Certification Exclusion Rule to excuse certification items from certification List.
  • Implemented Customization Rule to identify the uncorrelated accounts or dormant accounts.
  • Developed custom Build Map Rules, Correlation Rules and having knowledge Workflows as per the business needs.
  • Configured Multiple Certifications like Application owner, Manager Certification to meet the business Requirements.
  • Configured Role SOD and Entitlement policy to meet client requirements.
  • Implemented LCM activities for Joiner, Leaver and Mover.
  • Exporting and importing the rules from non-Prod to Prod to reduce the manual efforts.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Take end-to-end ownership of questions and issues, including initial troubleshooting, identification of root cause and issue resolution.
  • Integrated different kind of applications like connected mode and disconnected mode applications.
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Generating the service accounts through system for both connected and disconnected mode applications.
  • Developed approval, reminder, and task completion workflows.
  • On boarding applications to provide authentication and authorization services to the cloud and on-premises applications
  • Monitor current reports of computer viruses to determine when to update virus protection systems.
  • Configured technical rules and user update rules.
  • Developed approval, reminder and task completion workflows.
  • Configured SMPT and email templates.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Configured Delegation process and UI branding as per client requirement.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.

Key Skills
Education

Any Graduate