Saravanan Purushothaman
Objective
To be an astute learner and the best performer in your organization. So that I can build an innovative career in
your esteemed organization by using my skills and other significant talents.
Profile
• IDM Support professional with notable involvement in administrations, deployment and management
of Application solutions in direct support of core business objectives.
• Experience in administrations and support of various Vendor application products for different clients
to provide automated as well as manual identity solutions.
• Participation in all stages of system development and integration efforts, including requirements
definition, deployment, architecture, testing, support.
• Outstanding problem solving abilities; able to coordinate and direct all stages of project-based
initiatives while playing major role as team member.
• Adept and enforcing corporate defined security and compliance policies.
Application products used:
HP PACS (HP_PPM_v9.14), ITSM, Pega Systems (PRPC dashboard Admin), TIM5.1, Qualys
Scanner, IIS web server maintenance, MSSQL& oracle connectivity check, Staffware, sail
point IQ, ITIL framework, IBM Build forge tool.
Platforms:
Windows Servers, UNIX, AS400, Linux.
Additional Skills:
Novell (NetIQ)IDM Compliance, IDM Governance, Access Management & Privilege ID Management, Project
Transition. Knowledge Transfer, Focal Point, Primary access controls, Secondary access controls, Folder
permissions, User account Life cycle management. Network Scanner: Wire shark, Nessus, Retina, NMap,
Proxy /content ,Filtering tools : Paros, live distribution : Backtrack, Penetration : Metasploit Pro, Pass
cracking : cain & abel
Saravanancs.2007@gmail.com 91-9513360560
Professional Experience
Hewlett Packard Enterprise: 11/01/2016 – till date
Role: Infra Security Service Delivery Consultant
Client: Confidential
• SOX evaluations validations
• SOX evaluations remediation reflected through Incident and code violation.
• SOX escalations and remediation feedbacks
• Create SOX quality practices to be shared within HP Access Control.
• Monitoring HP Access Control SOX Queue Manager.
• Follow all the security guidelines established by Credit-Suisse and notify when a security
violation has happened.
• Align with Support Level Team (L2) to request logs audit within SOX application- Access Control
• Help to maintain the SLAs by working with the methods establish by the Supervisor – Account
Lead & Team Leads.
• Hold biweekly challenges meeting with Identity Management to review week process
• Unix verification and remediation
• Follow up with Identity Management all issues or mail suggestions
• Weekly meeting update assistance
• Quality Analysis Assistance by weekly - action plan tasks
• SOX Monitoring for Emergency Removals and Transfer request
Associate all access rights and privileges on audited systems to individual users, providing the level of
accountability required by SOX auditors
Address SOX reporting requirements with scheduled, packaged and customizable attestation reports
representing 'who has access to what' and 'what did they do with that access' including detailed
privileged session auditing
Implement role-based security and access controls along with centralized reporting of who has access to
what systems
Limit privileged access on SOX system to just the subset of commands they need to perform their jobs
Capture detailed audit trails of all user actions, and system responses, for inspection by SOX auditors
Infosys Limited: 10/03/2014 – 14/12/2015
Role: Technology Analyst
Client: RBS Citizens Bank (Audit and Compliance Identity & Access management)
• Banking application Audit & Compliance review.
• Change & incident Management handling as per structured ITIL framework.
• Working with NetIQ (Novell) IDM product suite
Saravanancs.2007@gmail.com 91-9513360560
• Application support is the set of business policies, processes, and a supporting infrastructure for
managing the ID creation, code maintenance and use of digital identities. Enables organizations.
• Design, develop, and implement connectors and technical components for authentication,
authorization, identity provisioning, physical security, and audit & monitoring solutions.
• Designing and developing integration connectors and interfaces for cross IAM solutions.
• Enhancing and integrating existing access request and provisioning technologies to a variety of
IAM solutions.
• Integrate role-based access control, Single Sign On, user provisioning, and reconciliation services
with existing applications, systems, and network devices.
• Critique developed business processes and use cases, translating them to technical requirements,
and designing provisioning/de-provisioning workflows, data mappings.
• Implementing RBAC framework based on top down / bottom up models.
• Leading meetings with highly demanding clients
• In this project TAM (Tivoli Access Manager ) has been implemented for SSO single sign on to
login applications
• Incident detection and recording.
• Classification and Initial support.
• Investigation and diagnosis.
• Resolution and recovery.
• Incident closure Incident ownership, monitoring, tracking and communication.
• Efficiently control the Access part & TIM periodically to Recertification & Reconciliation.
• Respond faster to changing relationships
WDC (IBM India Pvt ltd worked as a Contractor position): 15/05/ 2012 -10/09/2013
Role: System Administrator
Competency: Security & Risk Management with Application Access Management
Client: NBFG-National Bank Financial Group (Canada)
• Windows 2008 User administration (setup and maintaining account)
• ITSM Based Infrastructure and service delivery.
• Unlock multiple users
• Ticketing tools: IBM MAXIMO for Service Request and Incidents.
• Developing and maintaining Incident Management System.
• Create Bulk users using CSV file New Feature. Schedule tasks for- modifying account options, add
users to group, remove users from group, move users, delete users, enable users, disable users and
reset user password New Feature
Saravanancs.2007@gmail.com 91-9513360560
• Email scheduled task report to specified recipient New Feature. Simultaneously reset passwords of
multiple users. Move multiple users from one OU to another. Delete multiple AD users
• Change Home Directory of multiple users, Administer multiple users' group membership attributes
including Add to Group, Remove from Group or Set primary group.
• Manage common attributes (contact, naming, profile, etc for multiple users.),Enable / Disable
multiple AD users simultaneously and change work station permissions for multiple users
• View Group Membership of multiple users. Copy multiple users from one server to another
Simultaneously query AD for multiple users. Completed TIM administration skill-port training in IBM.
• Banking Application Security ID request Management & Application ID Incident Management
• TIM 5.1 & TAM Single Sign On (SSO) Implementation & support, Remedy ticketing tool.
• IT Governance & Periodic Compliance Review, Knowledge in IBM Governance and Compliance tools,
LINUX/AIX, AS400, HMC,Control-M,Windows.
• Novell ID Manager , TAM administration, Bloomberg Trading system (BTS), eBBS, IBanking, eOPS,
Crepitate, TAM Single Sign on etc..
• Banking application implementation & deployment.RPT (Resource Provisioning Tool) Activity & Bulk
request.MAR (Manager Access Review ) , RPT Recon(Reconciliation) i.e., fetch the records from RPT
(Movers, Leavers & Generic ID’s ) and fix the gap among Native( application) & RPT
• Delete the IDS from Native based on Audit & Governance requirement. Prepare the VA report for
Risk and compliance activity, monitoring the ports.
• Supporting More than 300 banking application Security Access Support & Implementation, Privilege
Id management and reconciliation. Identify, analyze and evaluate risk in the entire network including
servers and remote devices.
Lorven Tech Solutions India Pvt ltd: 23/06/2011 – 11/05/2012
Role: IT Administrator
Client: Lorven tech
• Identify, analyze and evaluate risk in the entire network including servers, routers, switches and
remote devices
• performing vulnerability assessment and penetration testing of their web server, mail server, firewall
and internal server
• Identify, analyze and evaluate risk of end-points, thin clients and desktops
• Prepare a detailed vulnerability assessment report
• Recommend solutions for existing security weakness and strengthen the security
• Undertake risk treatment plan in coordination with the client
• R&D is going on IAAS (Infrastructure as a Service) Cloud vmware vsphere 5.1, Eucalyptus (Ubuntu).
• Launching Instances & S3 Storage & Load Balancing in (AWS) & 1 & 1 Cloud Server’s.
• Installing & Administrating CentOS 5.7 with web server & Windows 2008.
• Installing & monitoring the IP Phone’s and using the Vonage phone’s with the help of Ring Central
Portal.
• Monitoring & daily backup from cloud server Like CPANEL & PLESK.
• Database Backup from hosted Server.
Appin knowledge solutions: 01/02/2010 – 01/06/2011
Role: IT Security Trainee
Client: Appin
Information Security Projects Handled
Project phase I
Saravanancs.2007@gmail.com 91-9513360560
Position : Trainee
Task : Foot Printing Information Gathering about computer system
Tools Used : Ping Sweep, Whois Database, Sam Spade, and Google Hacking.
Project Phase II
Position : Trainee
Task : to find a Vulnerability Assessment of entire Network
Tools Used : Nessus, NMap, Nikto, HPing, Sam spade, Web Inspect, Netcat
MAASS COMPUTTERS: 15/07/2008 – 30/01/2010
Role: System Admin
Client: MAASS COMPUTTERS
• Create new users in Linux, Resetting user passwords ,Lock/unlock user accounts in Linux account
• Monitor user security config files ( /etc/passwd, /etc/group, /etc/shadow)
• Create Exchange mailbox for any user. Modify mailbox properties
• Delete selected user's mailbox from Exchange Server
• Move mailbox from one Information Store to another
• Disable any mailbox (Available for Exchange 2007 and later versions)
• Monitor special services IAM with Level 3 Server level Issues.
• Set permissions for any mailbox to restrict or allow users for usage and access. Implement the
policies for the use of the computer system and network
• Modifying User Properties .Define user's display name. Define user's account password
• Define password limitations such as user cannot change the password, password never expires,
user must change the password at next logon etc
• Define computers where user can logon, Define logon hours for user account
• Installation, Users Creation, Group Creation, Permissions, Creations of Folders, Mail (Send Mail,
Postfix, Spam Filter Assassin), Web (Apache, Tomcat), FTP, DHCP, DNS, Proxy (Squid), Samba,
Firewall (NAT, IP Tables, Packet Filter, IP Filter) , NFS, NIS, Clear case, Rebuilding the Kernel,
Integrating Windows to Linux Domain, Domain in both Windows (ADS) and Linux using LDAP.
• Unpack and setup new systems and maintenance of existing systems.
• Implement new systems for various customers.
• Managed services support for various customers on phone/email/on-site/remote-session.
• Hands-on experience with installation and troubleshooting various Linux flavors like RedHat,
Fedora Core, CentOS.
Saravanancs.2007@gmail.com 91-9513360560
Personal Information
Education :
Bachelors in Computer Science Engineering 2004 - 2008
University: Anna University Chennai
Type: Fulltime
Grade: First Class (73.0%)
MBA in Systems 2009 – 2011
University: Alagappa University Karikudi.
Type: Distance Mode
Grade: Second Class
Higher Secondary Education 2003 - 2004
School: John Paul higher Sec school
Grade: First Class (77.0%)
SSLC 2001 - 2002
School: John Paul higher Sec school
Grade: First Class (82.03%)
Training & Certifications
• Certified Sarbanes Oxley Expert – Certification number: E408975
• Microsoft Certified Professional - Certification number: E841-7089
• Microsoft Certified Specialist - Certification number: E841-7088
• ITIL Foundation Certificate in IT Service Management V3 - Registration Number: 4680938
• Red Hat Certified Engineer (RHCE-5.1) - RHCE ID: 805008917834116
• Cisco Certified Network Associate.(CCNA)- Cisco ID : CSCO11553407
• IT Security and Ethical Hacking at APPIN KNOWLEDGE SOLUTIONS - Certification ID:FRP-IS-10-1445
Information Personal:
Father’s Name : A.Purushothaman
Current Address :No 36,SFS Enclave, 8A main, 11th cross sree ananthanagar layout, huskur gate,
Electronic city post, Bangalore-560100.
Passport Number : G7308859
IT PIN Number : 651083899520
Saravanancs.2007@gmail.com 91-9513360560
PAN Card Number : EELPS5045Q
Skype Id : saravanan.purushothaman7@skype.com
Nationality : Indian
Marital Status : Married
Languages Known : English, Tamil (Read, Speak, Write).
Place: Bangalore (P.Saravanan)
Saravanancs.2007@gmail.com 91-9513360560

IT_Security_Service Delivery_Consultant

  • 1.
    Saravanan Purushothaman Objective To bean astute learner and the best performer in your organization. So that I can build an innovative career in your esteemed organization by using my skills and other significant talents. Profile • IDM Support professional with notable involvement in administrations, deployment and management of Application solutions in direct support of core business objectives. • Experience in administrations and support of various Vendor application products for different clients to provide automated as well as manual identity solutions. • Participation in all stages of system development and integration efforts, including requirements definition, deployment, architecture, testing, support. • Outstanding problem solving abilities; able to coordinate and direct all stages of project-based initiatives while playing major role as team member. • Adept and enforcing corporate defined security and compliance policies. Application products used: HP PACS (HP_PPM_v9.14), ITSM, Pega Systems (PRPC dashboard Admin), TIM5.1, Qualys Scanner, IIS web server maintenance, MSSQL& oracle connectivity check, Staffware, sail point IQ, ITIL framework, IBM Build forge tool. Platforms: Windows Servers, UNIX, AS400, Linux. Additional Skills: Novell (NetIQ)IDM Compliance, IDM Governance, Access Management & Privilege ID Management, Project Transition. Knowledge Transfer, Focal Point, Primary access controls, Secondary access controls, Folder permissions, User account Life cycle management. Network Scanner: Wire shark, Nessus, Retina, NMap, Proxy /content ,Filtering tools : Paros, live distribution : Backtrack, Penetration : Metasploit Pro, Pass cracking : cain & abel Saravanancs.2007@gmail.com 91-9513360560
  • 2.
    Professional Experience Hewlett PackardEnterprise: 11/01/2016 – till date Role: Infra Security Service Delivery Consultant Client: Confidential • SOX evaluations validations • SOX evaluations remediation reflected through Incident and code violation. • SOX escalations and remediation feedbacks • Create SOX quality practices to be shared within HP Access Control. • Monitoring HP Access Control SOX Queue Manager. • Follow all the security guidelines established by Credit-Suisse and notify when a security violation has happened. • Align with Support Level Team (L2) to request logs audit within SOX application- Access Control • Help to maintain the SLAs by working with the methods establish by the Supervisor – Account Lead & Team Leads. • Hold biweekly challenges meeting with Identity Management to review week process • Unix verification and remediation • Follow up with Identity Management all issues or mail suggestions • Weekly meeting update assistance • Quality Analysis Assistance by weekly - action plan tasks • SOX Monitoring for Emergency Removals and Transfer request Associate all access rights and privileges on audited systems to individual users, providing the level of accountability required by SOX auditors Address SOX reporting requirements with scheduled, packaged and customizable attestation reports representing 'who has access to what' and 'what did they do with that access' including detailed privileged session auditing Implement role-based security and access controls along with centralized reporting of who has access to what systems Limit privileged access on SOX system to just the subset of commands they need to perform their jobs Capture detailed audit trails of all user actions, and system responses, for inspection by SOX auditors Infosys Limited: 10/03/2014 – 14/12/2015 Role: Technology Analyst Client: RBS Citizens Bank (Audit and Compliance Identity & Access management) • Banking application Audit & Compliance review. • Change & incident Management handling as per structured ITIL framework. • Working with NetIQ (Novell) IDM product suite Saravanancs.2007@gmail.com 91-9513360560
  • 3.
    • Application supportis the set of business policies, processes, and a supporting infrastructure for managing the ID creation, code maintenance and use of digital identities. Enables organizations. • Design, develop, and implement connectors and technical components for authentication, authorization, identity provisioning, physical security, and audit & monitoring solutions. • Designing and developing integration connectors and interfaces for cross IAM solutions. • Enhancing and integrating existing access request and provisioning technologies to a variety of IAM solutions. • Integrate role-based access control, Single Sign On, user provisioning, and reconciliation services with existing applications, systems, and network devices. • Critique developed business processes and use cases, translating them to technical requirements, and designing provisioning/de-provisioning workflows, data mappings. • Implementing RBAC framework based on top down / bottom up models. • Leading meetings with highly demanding clients • In this project TAM (Tivoli Access Manager ) has been implemented for SSO single sign on to login applications • Incident detection and recording. • Classification and Initial support. • Investigation and diagnosis. • Resolution and recovery. • Incident closure Incident ownership, monitoring, tracking and communication. • Efficiently control the Access part & TIM periodically to Recertification & Reconciliation. • Respond faster to changing relationships WDC (IBM India Pvt ltd worked as a Contractor position): 15/05/ 2012 -10/09/2013 Role: System Administrator Competency: Security & Risk Management with Application Access Management Client: NBFG-National Bank Financial Group (Canada) • Windows 2008 User administration (setup and maintaining account) • ITSM Based Infrastructure and service delivery. • Unlock multiple users • Ticketing tools: IBM MAXIMO for Service Request and Incidents. • Developing and maintaining Incident Management System. • Create Bulk users using CSV file New Feature. Schedule tasks for- modifying account options, add users to group, remove users from group, move users, delete users, enable users, disable users and reset user password New Feature Saravanancs.2007@gmail.com 91-9513360560
  • 4.
    • Email scheduledtask report to specified recipient New Feature. Simultaneously reset passwords of multiple users. Move multiple users from one OU to another. Delete multiple AD users • Change Home Directory of multiple users, Administer multiple users' group membership attributes including Add to Group, Remove from Group or Set primary group. • Manage common attributes (contact, naming, profile, etc for multiple users.),Enable / Disable multiple AD users simultaneously and change work station permissions for multiple users • View Group Membership of multiple users. Copy multiple users from one server to another Simultaneously query AD for multiple users. Completed TIM administration skill-port training in IBM. • Banking Application Security ID request Management & Application ID Incident Management • TIM 5.1 & TAM Single Sign On (SSO) Implementation & support, Remedy ticketing tool. • IT Governance & Periodic Compliance Review, Knowledge in IBM Governance and Compliance tools, LINUX/AIX, AS400, HMC,Control-M,Windows. • Novell ID Manager , TAM administration, Bloomberg Trading system (BTS), eBBS, IBanking, eOPS, Crepitate, TAM Single Sign on etc.. • Banking application implementation & deployment.RPT (Resource Provisioning Tool) Activity & Bulk request.MAR (Manager Access Review ) , RPT Recon(Reconciliation) i.e., fetch the records from RPT (Movers, Leavers & Generic ID’s ) and fix the gap among Native( application) & RPT • Delete the IDS from Native based on Audit & Governance requirement. Prepare the VA report for Risk and compliance activity, monitoring the ports. • Supporting More than 300 banking application Security Access Support & Implementation, Privilege Id management and reconciliation. Identify, analyze and evaluate risk in the entire network including servers and remote devices. Lorven Tech Solutions India Pvt ltd: 23/06/2011 – 11/05/2012 Role: IT Administrator Client: Lorven tech • Identify, analyze and evaluate risk in the entire network including servers, routers, switches and remote devices • performing vulnerability assessment and penetration testing of their web server, mail server, firewall and internal server • Identify, analyze and evaluate risk of end-points, thin clients and desktops • Prepare a detailed vulnerability assessment report • Recommend solutions for existing security weakness and strengthen the security • Undertake risk treatment plan in coordination with the client • R&D is going on IAAS (Infrastructure as a Service) Cloud vmware vsphere 5.1, Eucalyptus (Ubuntu). • Launching Instances & S3 Storage & Load Balancing in (AWS) & 1 & 1 Cloud Server’s. • Installing & Administrating CentOS 5.7 with web server & Windows 2008. • Installing & monitoring the IP Phone’s and using the Vonage phone’s with the help of Ring Central Portal. • Monitoring & daily backup from cloud server Like CPANEL & PLESK. • Database Backup from hosted Server. Appin knowledge solutions: 01/02/2010 – 01/06/2011 Role: IT Security Trainee Client: Appin Information Security Projects Handled Project phase I Saravanancs.2007@gmail.com 91-9513360560
  • 5.
    Position : Trainee Task: Foot Printing Information Gathering about computer system Tools Used : Ping Sweep, Whois Database, Sam Spade, and Google Hacking. Project Phase II Position : Trainee Task : to find a Vulnerability Assessment of entire Network Tools Used : Nessus, NMap, Nikto, HPing, Sam spade, Web Inspect, Netcat MAASS COMPUTTERS: 15/07/2008 – 30/01/2010 Role: System Admin Client: MAASS COMPUTTERS • Create new users in Linux, Resetting user passwords ,Lock/unlock user accounts in Linux account • Monitor user security config files ( /etc/passwd, /etc/group, /etc/shadow) • Create Exchange mailbox for any user. Modify mailbox properties • Delete selected user's mailbox from Exchange Server • Move mailbox from one Information Store to another • Disable any mailbox (Available for Exchange 2007 and later versions) • Monitor special services IAM with Level 3 Server level Issues. • Set permissions for any mailbox to restrict or allow users for usage and access. Implement the policies for the use of the computer system and network • Modifying User Properties .Define user's display name. Define user's account password • Define password limitations such as user cannot change the password, password never expires, user must change the password at next logon etc • Define computers where user can logon, Define logon hours for user account • Installation, Users Creation, Group Creation, Permissions, Creations of Folders, Mail (Send Mail, Postfix, Spam Filter Assassin), Web (Apache, Tomcat), FTP, DHCP, DNS, Proxy (Squid), Samba, Firewall (NAT, IP Tables, Packet Filter, IP Filter) , NFS, NIS, Clear case, Rebuilding the Kernel, Integrating Windows to Linux Domain, Domain in both Windows (ADS) and Linux using LDAP. • Unpack and setup new systems and maintenance of existing systems. • Implement new systems for various customers. • Managed services support for various customers on phone/email/on-site/remote-session. • Hands-on experience with installation and troubleshooting various Linux flavors like RedHat, Fedora Core, CentOS. Saravanancs.2007@gmail.com 91-9513360560
  • 6.
    Personal Information Education : Bachelorsin Computer Science Engineering 2004 - 2008 University: Anna University Chennai Type: Fulltime Grade: First Class (73.0%) MBA in Systems 2009 – 2011 University: Alagappa University Karikudi. Type: Distance Mode Grade: Second Class Higher Secondary Education 2003 - 2004 School: John Paul higher Sec school Grade: First Class (77.0%) SSLC 2001 - 2002 School: John Paul higher Sec school Grade: First Class (82.03%) Training & Certifications • Certified Sarbanes Oxley Expert – Certification number: E408975 • Microsoft Certified Professional - Certification number: E841-7089 • Microsoft Certified Specialist - Certification number: E841-7088 • ITIL Foundation Certificate in IT Service Management V3 - Registration Number: 4680938 • Red Hat Certified Engineer (RHCE-5.1) - RHCE ID: 805008917834116 • Cisco Certified Network Associate.(CCNA)- Cisco ID : CSCO11553407 • IT Security and Ethical Hacking at APPIN KNOWLEDGE SOLUTIONS - Certification ID:FRP-IS-10-1445 Information Personal: Father’s Name : A.Purushothaman Current Address :No 36,SFS Enclave, 8A main, 11th cross sree ananthanagar layout, huskur gate, Electronic city post, Bangalore-560100. Passport Number : G7308859 IT PIN Number : 651083899520 Saravanancs.2007@gmail.com 91-9513360560
  • 7.
    PAN Card Number: EELPS5045Q Skype Id : saravanan.purushothaman7@skype.com Nationality : Indian Marital Status : Married Languages Known : English, Tamil (Read, Speak, Write). Place: Bangalore (P.Saravanan) Saravanancs.2007@gmail.com 91-9513360560