Joseph Sathish Christie is a security architect with over 12 years of experience implementing identity and access management solutions like CA Siteminder, Forgerock OpenAM, and Sailpoint IIQ. He holds a Master's degree in Computer Applications and is currently working at Raah Technologies on projects involving upgrading and implementing CA Siteminder for clients like Travelport.
SailPoint's leading edge multi-tenant cloud offering for Identity Governance helps enterprises gain visibility and control over user access across all applications and data
Presentation from Salesforce.org Higher Ed Summit 2018 by: Daniel McGaughey, University of Pittsburgh.
Please join the University of Pittsburgh as we outline our approach to Salesforce security from an enterprise perspective. Pitt selected Salesforce as the platform to support a new Enterprise Relationship Management (ERM) system. Initial projects include implementation of Undergraduate Recruiting and Enterprise Service Desk. Using an enterprise approach to Salesforce security creates the base for future expansion. Salesforce security is configured using custom just in time provisioning so that user provisioning and de-provisioning is automated at login. Users are created and assigned a license at first login. User permissions are evaluated and updated at each login based on Active Directory group membership. Licenses will be revoked via a scheduled integration. Users who are not entitled to use the system will be denied login. We use Service Cloud cases to support the Security request and approval workflow. Once all approvals are complete users are added to appropriate Active Directory groups automatically. Pitt admins do not create users and assign permissions.
Watch a recording of this presentation: https://youtu.be/NhHvNmmHaWs
SailPoint's leading edge multi-tenant cloud offering for Identity Governance helps enterprises gain visibility and control over user access across all applications and data
Presentation from Salesforce.org Higher Ed Summit 2018 by: Daniel McGaughey, University of Pittsburgh.
Please join the University of Pittsburgh as we outline our approach to Salesforce security from an enterprise perspective. Pitt selected Salesforce as the platform to support a new Enterprise Relationship Management (ERM) system. Initial projects include implementation of Undergraduate Recruiting and Enterprise Service Desk. Using an enterprise approach to Salesforce security creates the base for future expansion. Salesforce security is configured using custom just in time provisioning so that user provisioning and de-provisioning is automated at login. Users are created and assigned a license at first login. User permissions are evaluated and updated at each login based on Active Directory group membership. Licenses will be revoked via a scheduled integration. Users who are not entitled to use the system will be denied login. We use Service Cloud cases to support the Security request and approval workflow. Once all approvals are complete users are added to appropriate Active Directory groups automatically. Pitt admins do not create users and assign permissions.
Watch a recording of this presentation: https://youtu.be/NhHvNmmHaWs
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
Ensuring hi-fidelity delivery of applications to a mobile user base is a major challenge. User expectations for performance and ease of use are set by consumer-centric services. However, we must maintain enterprise security and compliance standards. Proper integration of network services and identity management can simplify user experience while ensuring rapid application response time and preserving security. Identity management is fundamental. Not only must it be strong, to ensure usability it must be as transparent as possible. This session will describe the integration of Citrix NetScaler SDX and CA Single Sign-On together provide for highly performing, highly secure and highly available delivery of mobile applications to a global user base.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers:
- PAM definitions, core features and specific security and compliance drivers
- The PAM market landscape and major vendors
- How to integrate PAM with identity management, service ticketing and monitoring
- Avoiding availability and performance issues
Salesforce Security Best Practices for Every AdminCloud Analogy
In this presentation, we will discuss Salesforce Security Best Practices for Every Admin.
Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.
SAP Identity Management helps companies centrally manage their user accounts (identities) in a complex system landscape, including both SAP and non-SAP systems. More information: http://scn.sap.com/community/idm.
Introduction to the business challenges of securely managing access to privileged accounts and the technical processes built into Privileged Access Manager to secure access to administrator, service and application-to-application IDs.
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
In the presentation learn what you need to do in AD FS, Active Directory, and Azure Active Directory to leverage domain joined machines in conditional access policies to O365 services.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Sailpoint Online Training on IAM overviewITJobZone.biz
Sailpoint Online Training for Identity and Access Overview. Learn Sailpoint Basics from the best Trainer. Get Sailpoint Training From the Sailpoint Consultant and a professional trainer
Sailpoint Training by expert consultants with hands-on. Join for Sailpoint IdentityIQ Online Training with us. we deliver corporate training for sailpoint"
With sharing or without sharing... is that the question? Join us as we help you better understand how to leverage the best Salesforce security features in code. Learn all the best practices for hardening your application and keeping your data secure. We will cover sharing, FLS, CRUD, and all the most common mistakes and misconceptions about how these features work in Apex and Visualforce.
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
We are in the midst of upheaval in the world of IT Security. Attackers are highly organized and using increasingly sophisticated methods to gain entry to your most sensitive data. At the same time, Cloud and mobile are redefining the concept of the perimeter. Check out this insightful discussion of how today's CISO is building a more secure enterprise using analytics, risk-based protection, and activity monitoring to protect the most valuable assets of the organization.
For more visit: http://securityintelligence.com
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
On today’s smarter planet, providing secure access to sensitive data, applications and infrastructure is more complex than ever. With users accessing corporate data and applications from outside the traditional network perimeter, traditional access and authentication controls are no longer sufficient. To safeguard mobile, cloud and social interactions while preventing insider threat and identity fraud, you need a powerful access management solution thats designed for today’s multi-perimeter world.
We will explore how you can address your problems with the latest IBM Security Access Manager – an “All-in-one” access management solution that is designed to provide both web and mobile security in a modular package suitable to your needs.
View the full on-demand webcast: https://www.youtube.com/watch?v=-ycUQykZSQA
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Summary of Quest One IAM solutions that address core Federal Identity Credentialing and Access Management (FICAM) suggested framework to meet the various challenges of both the DOD and Federal Civilian Agencies.
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
Ensuring hi-fidelity delivery of applications to a mobile user base is a major challenge. User expectations for performance and ease of use are set by consumer-centric services. However, we must maintain enterprise security and compliance standards. Proper integration of network services and identity management can simplify user experience while ensuring rapid application response time and preserving security. Identity management is fundamental. Not only must it be strong, to ensure usability it must be as transparent as possible. This session will describe the integration of Citrix NetScaler SDX and CA Single Sign-On together provide for highly performing, highly secure and highly available delivery of mobile applications to a global user base.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
This webinar describes how you can manage the risk of privileged accounts being compromised, creating a breach of sensitive data or other assets in your organization, through privileged access management, or PAM. PAM can reduce risks by hardening your environment in ways no other solution can, but is challenging to deploy. This webinar provides an unbiased perspective on PAM capabilities, lessons learned and deployment challenges, distilling the good practices you need to be successful. It covers:
- PAM definitions, core features and specific security and compliance drivers
- The PAM market landscape and major vendors
- How to integrate PAM with identity management, service ticketing and monitoring
- Avoiding availability and performance issues
Salesforce Security Best Practices for Every AdminCloud Analogy
In this presentation, we will discuss Salesforce Security Best Practices for Every Admin.
Following these advanced Salesforce Security best practices will help us get most of the powerful and out-of-the-box Salesforce CRM system. Through it, Salesforce admins can easily leverage all of the platform’s features to safeguard their company and customers' data.
SAP Identity Management helps companies centrally manage their user accounts (identities) in a complex system landscape, including both SAP and non-SAP systems. More information: http://scn.sap.com/community/idm.
Introduction to the business challenges of securely managing access to privileged accounts and the technical processes built into Privileged Access Manager to secure access to administrator, service and application-to-application IDs.
Preparing your enteprise for Hybrid AD Join and Conditional AccessJason Condo
In the presentation learn what you need to do in AD FS, Active Directory, and Azure Active Directory to leverage domain joined machines in conditional access policies to O365 services.
The Salesforce platform offers system as well as application level security capabilities for building robust and secure applications. Join us as we introduce the system-level security features of Salesforce, like authentication and authorization mechanisms that include various Single Sign-On and OAuth flows. We'll also cover declarative application-level security features, like user profiles, roles and permissions, and how an Organization Wide Security and record-sharing model enforces a finer level of access control over the data.
Sailpoint Online Training on IAM overviewITJobZone.biz
Sailpoint Online Training for Identity and Access Overview. Learn Sailpoint Basics from the best Trainer. Get Sailpoint Training From the Sailpoint Consultant and a professional trainer
Sailpoint Training by expert consultants with hands-on. Join for Sailpoint IdentityIQ Online Training with us. we deliver corporate training for sailpoint"
With sharing or without sharing... is that the question? Join us as we help you better understand how to leverage the best Salesforce security features in code. Learn all the best practices for hardening your application and keeping your data secure. We will cover sharing, FLS, CRUD, and all the most common mistakes and misconceptions about how these features work in Apex and Visualforce.
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
We are in the midst of upheaval in the world of IT Security. Attackers are highly organized and using increasingly sophisticated methods to gain entry to your most sensitive data. At the same time, Cloud and mobile are redefining the concept of the perimeter. Check out this insightful discussion of how today's CISO is building a more secure enterprise using analytics, risk-based protection, and activity monitoring to protect the most valuable assets of the organization.
For more visit: http://securityintelligence.com
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
On today’s smarter planet, providing secure access to sensitive data, applications and infrastructure is more complex than ever. With users accessing corporate data and applications from outside the traditional network perimeter, traditional access and authentication controls are no longer sufficient. To safeguard mobile, cloud and social interactions while preventing insider threat and identity fraud, you need a powerful access management solution thats designed for today’s multi-perimeter world.
We will explore how you can address your problems with the latest IBM Security Access Manager – an “All-in-one” access management solution that is designed to provide both web and mobile security in a modular package suitable to your needs.
View the full on-demand webcast: https://www.youtube.com/watch?v=-ycUQykZSQA
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Summary of Quest One IAM solutions that address core Federal Identity Credentialing and Access Management (FICAM) suggested framework to meet the various challenges of both the DOD and Federal Civilian Agencies.
MCA with 3+ years of experience as a IT-Consultant/Implementation Engineer And Business Trips.
My name is Abdul Wahab and i reside in Bangalore,India. I am looking for change. Please refer me if there are any opening in your company or others.
Pl find the attachment below i am an Post graduate with 3.8 years of experience in dot net and java web applications as an IT-Consultant/Implementation Engineer.
Dealing with Business trip from our Company to the client place with business work flow.
My resume gives detailed structure of my work
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. Curriculum Vitae
Joseph Sathish Christie Phone # : +91-8892012502
: +91-9600035945
Jschristiein@gmail.com Passport No : L3507280
Qualification
Master of Computer applications, graduated from Bharathidasan University, Trichy, Tamil Nadu, India.
Degrees in the related field:
Master of Computer Applications, St.Joseph’s College, Bharathidasan University, Thiruchirapalli,
India, 2003
Professional Summary:
• 12 years of experience in IT Industry, Involving People management and operation
management.
• Involving expertise in CA Site Minder.
• Installing, configuring and implementing CA SITEMINDER and Troubleshooting
issues with SSO using SITEMINDER.
• Installation, implementation and configuration of Sailpoint IIQ.
• Developing, designing and implementation of QlikView.
• Installing, configuring and implementing Forgerock OpenAM and OpenDJ and
Troubleshooting issues.
• Implementations of vendor applications using CA Federation Manager and CA SPS.
• Implementation of policies, agent rules, domains, realms, response and rules.
• Administering Juniper Firewall & SOC operations.
• Experience in Installing and implementing Symantec Virtualization products.
• Hands on experience in MS Windows 2003 Active Directory and CA IDM.
• Quick learner and capable of adapting to New Technology.
• Good people and operation management skills.
• Managing SLA and reporting.
• Excellent written and verbal communication skills.
• ITIL V3 trained – Certification yet to complete
• Perl scripting to automate SiteMinder policies migration with and without API’s
• Webservices using CA SPS
Professional Experience:
1) Working as Security Architect with Raah Technologies, Bangalore. (Nov’15 to till date).
Current Assignment: Travelport Inc Corporate.
Project: SiteMinder Upgrade from R12 to R12.52 SP1.
Responsibilities:
Upgrade of SiteMinder environment from R12 to R12.52 SP1 in Dev, Pre-Prod and Prod.
2. Customization of SAML Assertion according to the application (AppDynamics) for user
authentication and authorization, using Java and SAML.
Current Assignment: Travelport Inc Commercial.
Project: SiteMinder Implementation.
Responsibilities:
Install, implement and configure SiteMinder R12.52 from Scratch.
Documentation of SiteMinder Implementation and configuration
Document SRS and SDS of Microsoft Azure integration and SiteMinder
Integration of CA AuthMinder with SiteMinder and SharePoint and Azure.
2) Worked as System Architect (Senior Security Engineer) at Avaya India Pvt Ltd, Bangalore.
(Oct’14 to Oct’15).
Current Assignment: Avaya Inc.
Responsibilities:
Same as below
3) Worked as Senior Security Engineer at NEWT GLOBAL INDIA PRIVATE LIMITED,Chennai.
(From Mar’14 to Sep’14)
Current Assignment: Avaya Inc.
Responsibilities:
Involved in migration of CA Siteminder environment from R6 to R12.5
Involved in migration and up gradation of Sun One Directory to Oracle Directory 11g.
Implementation and installation of CA Siteminder.
Configuration of objects and integrating applications.
Follow up with various teams and application owners for smooth transition of application
from old to new environment.
Perl API scripting to automate migration of objects from one environment to another.
Would be recruiting and developing a team.
Reviewing, analyzing and shortlisting profiles and managing interviews and recruiting as
per business requirements.
Supporting and maintenance of the environment
Implementation of new integrations and co-ordinating with various teams across the
globe.
Involved in Project transitioning and planning transitioning of various technologies like
CA Siteminder, LDAP, CA Identity Minder, CA Federation Manager and support.
4) Worked as Senior Security Engineer at Syntegrity Network Incorporate, USA.(From Sep’13 to
Dec’13)(Remote Office)
Implementation of OpenIdentity Stack
Consulation and architecting of Environment according to the clients business
requirement.
UAT and documentation of process and management requirements.
3. 5) Worked as IAM Engineer in Simeio Solutions, Bangalore (From April’ 12 to Oct’13)
Assignment: Team Lead, Sony Pictures Entertainment
Responsibilities:
Leading a Team of 6 members.
Performance Appraisals, goal setting and career path for staffs.
Co-ordinating and communicating with 3rd
Party vendors and teams to get the business
done.
Oncall and supporting off hours high priority issues with minimum TAT.
Managing and maintaining the SLA as per the business requirements.
Implementation and installation of CA SiteMinder.
Upgrade of environments from time to time for secure environment
PoC with architecture, installation and demo presentation for new environment with cost
benefits and efficiency.
Initiating and driving through new process and projects
Documentation and updating process.
conduct business and technical studies, design, develop, integrate and implement
information systems business solutions using CA SiteMinder.
Plan, organize, direct, control and evaluate the operations.
6) Worked as Technical Leader in Wipro Technologies, Chennai (from Apr’11 to March’ 12)
Current Assignment: KLA Tencor
Responsibilities:
Leading a Team of 6 members with L2/L3 responsibilities.
Reviewing and rating employees for the appraisal depending on various attributes.
On the spot decision making at times of emergency.
Authority to make to changes and implement changes in the environment with respect to
business requirements.
Coordinating with client to improve process.
Administrating SSO with CA SITEMINDER.
Installation, configuring and applying policies for the required application.
RCA/CAPA measures on critical issues.
Problem management and incident handling.
Secondary Responsibilities:
Implemented changes on Juniper SSG 550, 240 & SRX h240 Firewalls.
Verification and Installation of Policies in Juniper Firewalls in a 40+ firewall
environment
Debugging connectivity issues in Firewalls during major outages
Juniper & Snort IDP Administration
Discussion of vulnerability findings, degree of exploitation and recommendations with
Network administrators and with client Management.
Patch Management: Scanning for patch needs, malware threats and configuration
vulnerabilities, researching prioritizing, downloading and distributing patches and
updates.
Trend Micro Antivirus Administration.
RSA client/Server Administration
4. Tripwire Integrity checks to perform SOX Audit Reports.
Web Washer Proxy Administration.
7) Worked as Lead in Symantec Software Services India Pvt Ltd. Chennai (from Dec’09 to Mar’
11)
Responsibilities:
Project: MGM Resorts International
People and Operations Management
Controlling SLA and Quality checking
On the spot Decision Making.
Coordinating with client and resolving with minimum SLA.
Customer driven and oriented.
Support in CA Access and Identity Management (AIM).
Extensive usage of CA products to manage user’s account (Creation, modification and
deleting User’s ID).
Setting Rules, Responses and Policies as per the request of Application Users through
CA Site Minder
Configuration of Single Sign – On for different application.
Trouble shooting the ID related problems and Site Minder L1/L2 issues
Issues related to application login.
RSA Administration and token configuration.
Antivirus Administrations and report generation.
Managing Juniper Firewall and administration.
Implementing policies and verifying the changes in the environment.
Products/Tools Used:
• CA Provisioning Manager, CA Site Minder, Provisioning tools and CA Service
Desk(ticketing System)
• AS 400, Cognos Administration Systems.
• Windows 2003 Active Directory, Citrix Clients.
• RSA
• Juniper SRX and Netscreen products.
• Testing compatibility with every given system and application.
8) Worked as Associate product support Analyst in Symantec Software Services India Pvt Ltd.
Chennai (from Sep’08 to Dec’09)
Responsibilities:
Project: Symantec Endpoint virtualization.
Involving extensive testing and analysis for providing resolution.
Manually testing various environment usages of the products.
Test cases for the testing done.
Creating and reviewing KB article
Documenting test results similar to Test Case and publishing articles.
Using VMware Workstation to configure and test client environment
5. Post testing of SEV products with various DB’s and Software to check for compatibility.
Working with streaming and virtualization of software.
Analyzing various products which is acquired or under process of acquiring by Symantec
and researching on the product.
Troubleshooting various products of Symantec Endpoint Virtualization (SEV).
Researching SEV products under various environments
Usage of Windows 2003, managing AD and configuring.
Product Used:
Symantec Workspace Streaming, Virtualization, Corporate, Remote:
• Testing Beta Release and Application Support
• R&D , providing optimized solution to the issue found
• Tracking incidents and bugs
• Documenting issues and findings.
Software Workspace Streaming:
- Web based product for deployment of software efficiently.
- Virtualizes software and creates packages for deployment
9) Worked as Software Support Expert in Dell International Services, Bangalore
(Feb’07 to May ‘08)
Responsibilities:
Troubleshooting Software for Dell Computers.
Detecting issues with SW and fixing the issue.
Formatting and partitioning of HDD and installing OS.
Reinstallation of SW and handling various SW troubleshooting.
Manually Testing SW related issues with Dell Computers and providing optimized
solutions to issues or bugs reported.
Testing of compatibility issues with software’s installed on Dell Pc’s and Laptops.
Communicating with product research team with the bug and defects identified.
Experience prior to 2006 will be provided on Demand
Technical Skills:
SOX Watch Tools:
Work experience in Tripwire
SSO Administrating Tools:
CA SITEMINDER R6, R12 SP1, SP3 & SP5, R12.5
OpenAM
CA Federation Manager
SailPoint IIQ
Directory:
Sun One Directory Server 5.0
OpenDJ
ODSEE 11
BI Tool:
QlikView Server Publisher
6. Web Servers:
Apache 2.2.23, webspere, IIS
Application Servers:
JBOSS AS 7.1.1
Apache TOMCAT
Achievements:
• Awarded Star of The Week consecutively for a month(JUN 2006) in 24/7 customer,
Chennai
• Awarded Star Of the Quarter successively twice Q2 FY08 and Q3 FY08 (2007)
Personal Details:
Name : Joseph Sathish Christie
Current Employer : Raah Technologies.
Address : #40, ‘C’ Cross, Anjanadhari Enclave,
Horamavu Agara,
Babusapalya,
Location : Bangalore – India
Phone : +91 8892012502, +91960035945
7. Web Servers:
Apache 2.2.23, webspere, IIS
Application Servers:
JBOSS AS 7.1.1
Apache TOMCAT
Achievements:
• Awarded Star of The Week consecutively for a month(JUN 2006) in 24/7 customer,
Chennai
• Awarded Star Of the Quarter successively twice Q2 FY08 and Q3 FY08 (2007)
Personal Details:
Name : Joseph Sathish Christie
Current Employer : Raah Technologies.
Address : #40, ‘C’ Cross, Anjanadhari Enclave,
Horamavu Agara,
Babusapalya,
Location : Bangalore – India
Phone : +91 8892012502, +91960035945