Identity and Access Management Architect Resume

When writing a Identity and Access Management Architect Resume remember to include your relevant work history and skills according to the job you are applying for. Whether you're seeking an entry-level position or have been in your career for a few years, exposing your relevant achievements in your resume can allow you to stand out and get that job interview.

This resume example is a great representation of what a hiring manager is looking for in a Identity and Access Management Architect Resume. Feel free to use this example for reference as you create your own resume or use this easy resume builder that will guide you through every step of your building your resume in just a few minutes.

Here is the Identity and Access Management Architect Resume example:

Eric Peel

3228 Mudlick Road

Spokane, WA 99202

(333) 296-7512

Email : [email]


Career Goal
Seeking the position of Identity and Access Management Architect to share my expertise in Shell, JavaScript, CGI and ASP technologies
Technical Skills
Profound knowledge of regulatory frameworks:

  • CobiT
  • PCI DSS
  • HIPAA

Strong technical command of emergency systems:

  • NICE Storage Center
  • NICE LMR

Quick and excellent in SAN systems:

  • Dell SAN
  • Sun SAN
  • NetApp

Dexterity in email applications:

  • Lotus Notes
  • Send mail
  • IMAP4

Expertise in PKI technologies:

  • Baltimore
  • Rainbow
  • Entrust

Specialist in virtualization technologies:

  • VMware
  • Virtual Box
  • MS Hyper – V

Solid understanding of middleware services:

  • Oracle Internet Directory
  • Novell eDirectory
  • MS Active Directory

Immense abilities to:

  • Conduct technical analysis utilizing OOP design patterns
  • Develop training labs and work in cloud environment
Relevant Experience
Identity and Access Management Architect

Sears Holdings Corp.

January 2012 – Present

Spokane, WA

  • Designed Identity management solutions and supported Access governance.
  • Participated in partner competency certifications and relevant programs.
  • Created technical architecture models with latest technical trends.
  • Evaluated and reported technical architecture as per business requirements.
  • Resolved middleware issues and implemented internal applications.
  • Installed and configured JDK application servers, forms and reports.
  • Developed and maintained LDAP directory architecture and business continuity plans.
  • Suggested and implemented enhancements for Windows and Linux systems.
Identity and Access Management Architect

QSS, Inc.

November 2010 – January 2012

Colorado

  • Participated in application security with Java Enterprise Systems.
  • Designed and implemented J2EE security programs for all applications.
  • Maintained and upgraded all existing applications for Sun Identity Manager.
  • Generated management reports with MS project and other tools.
  • Conducted research to develop practices and security policies for identity management.
  • Installed and configured SiteMinder binaries for web agents.
  • Implemented and tested configurations for LDAP servers and schemas.
  • Supported WebLogic installations and administered Access management product suite.
Educational Background
Master’s Degree in Information Technology

Texas Tech University

August 2008 – May 2010

Lubbock, TX

Professional Certification
Certified Identity Protection Advisor (CIPA) July 2010

  • 1.0.0Version
  • 440Download
  • 1File Count
  • March 1, 2021Create Date
  • March 1, 2021Last Updated