0% found this document useful (0 votes)
142 views

Resume Content

The document summarizes a professional with over 12 years of experience in IT and cloud security. They have extensive experience with Azure identity and access management, including implementing Azure AD security controls and managing licenses. They are currently an associate security consultant responsible for Azure cloud security architecture reviews and internal security projects.

Uploaded by

Ragul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views

Resume Content

The document summarizes a professional with over 12 years of experience in IT and cloud security. They have extensive experience with Azure identity and access management, including implementing Azure AD security controls and managing licenses. They are currently an associate security consultant responsible for Azure cloud security architecture reviews and internal security projects.

Uploaded by

Ragul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Professional Summary:

 12.6 Years of total IT professional experience with Infrastructure technologies,


Security Architect and operation across On-Premises and Cloud applications.
 Ownership of Project deliverables in driving new feature implementation /
requirement gathering / migration of products in scope and coordinate/work between
cross-functional teams.
 7.5 years of experience in Azure AD IAM, Identity and Application Access
Management, Cloud Security SME.
 Over 4 years of experience in mentoring and manage a team of approx.7 members.

Work Experience

Tech Mahindra | Associate Security Consultant

2022 – Present

 Responsible for the Azure Cloud Security architecture, reviewed 6 different


customer environments for risk and adherence to security policies, standards, and
industry best practices.
 Participated on multiple internal security projects, evaluated and deployed Azure
cloud security technologies.
 Implemented and maintained Azure AD security controls, including Conditional
Access Policies, Identity Protection and Privileged Identity Management (PIM).
 Conducted security assessments of Azure AD environment and provided
recommendation to improve the overall security posture of customer tenant to
achieve/maintain security score above 98%
 Managing Azure AD license and educated customer to procure the appropriate
licenses based on the project requirement.
 Ensured compliance with regulatory requirements and industry best practices.
Azure/O365 Security Centre - Compliance Manager i.e., Azure benchmark, Azure
GDPR, NIST 800-53.
 Collaborated with cross-functional teams to investigate and respond to security
incidents and breaches in Azure AD.
 Secure identity with Zero Trust strategy.
 Advisory role for the Access reviews configuration and implementation.
 Implemented Windows Hello for business in hybrid environment for around 1200
users and devices.
 Good in PowerShell for scripting and process automation.

Cognizant Technology Solutions | Infra. Tech. Specialist

 Identity and Access Management: (On-Premises & Azure).


 Managing the Application/Database access product creation, modification, and
provision for 60+ applications and manage user access for around 250K users.
 Serve as a point of contact and department representative for business contacts and
customers.
 Participate in development of roadmaps and participate in the standards process for
Identity and Access Management (IAM) solutions
 Involved in the migration of application roles from RBAM to IDAM, OKTA& Azure
AD target systems.
 Involved in operational activity tasks like Password reset, user role assignment
validations, log analysis using the SailPoint and OKTA.
 Involved in the migration of On-Prem Oracle database roles to DBaaS Product setup.
 Troubleshooting and resolving access management application/user issues.
 Automated the various user role reports using Python and Oracle as per the business
requirements.
 Recertification and Reconciliation on periodic basis.
 Basic access setup to Azure AD groups from Azure DevOps.

RiskSpan India Private Ltd | Infra Developer /Automation Scripting

 Proven ability to develop and implement creative solutions to complex problems.


 Proved successful working within tight deadlines and a fast-paced environment.
 Strengthened communication skills through regular interactions with others.
 Demonstrated strong organizational and time management skills while managing
multiple projects.
 Developed wrapper scripts in Python/Unix shell script for the batch jobs. Automated
the routine tasks using the Perl/Python scripts for day-to-day activities.
 Developed and modified many stored procedures in MySQL to apply the business
logic and to generate complex reports.
 Experience working on SNOW and JIRA tools.
 Identifies measurable key performance indicators (KPI), meets KPI targets, and seeks
continual improvement within the team.
 Attending major incident management calls with customer involving various teams
and creating problem tickets for same and provide the initial RCA to the concerned
team to act on it.

Technical Certifications

 Microsoft Certified: Exam SC-300: Microsoft Identity and Access Administrator


(Valid till June 2024).
 Microsoft Certified: Exam SC-900: Security, Compliance, and Identity Fundamentals
(No Expiration).
 Microsoft Certified Professional: Exam AZ-500: Azure Security Engineer (Valid till
May 2024).
 Microsoft Certified Professional: Exam AZ-104: Azure Administrator Associate
(Valid till May 2024).
 Microsoft Certified: Exam MS-900: Microsoft 365 Fundamentals (No Expiration).
 ITIL V3 certified.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy