Je suis un architecte et développeur Java avec une expérience globale de plus de 11 ans.
Mon expertise de base est dans le développement Java et la gestion de produits dans le secteur de l'authentification à des base de données Data-Science
En tant que technophile, je suis passionné par le développement de prototypes et d'intégrations avec des technologies open source et tendances, pour évaluer les avantages et les inconvénients des piles de logiciels, produire des solutions, gérer le développement du cycle de vie des produits et donc espérer que je peux ajouter de la valeur à votre organisation.
Évaluation de la sécurité des produits - RSA Authentication Manager v8.2 (SecurID)
Intégration d'algorithmes Datascience
Ingénierie continue de produits (CE) et gestion des correctifs - RSA AxM Server v6.2.2.x / Application Server Agents v5.0.x / RSA FIM v4.2.2.x
Management d 'une équipe de 6 membres (AxM) / 4 membres (FIM), participer à la collecte des exigences et aux discussions architecturales sur les demandes d'améliorations (RFE), effectuer des revues de code et la gestion des correctifs, l'évaluation des vulnérabilités et des risques et l'ingénierie des versions des produits.
Developpement Java methode Scrum, Sprints périodiques, tests fonctionnels de l'intégration des clients Office 365 on-domaine et off-domaine, des documents de conception documentés dans le wiki Jira.
Livraison de correctifs de défauts et de sécurité sous forme de correctifs (Patch Installers) sur une base régulière, gestion des escalades de clients et représentation de l'équipe dans les discussions entre les équipes fonctionnelles (CFT).
Project #1: RSA Access Manager Server (AxM) is a web access management solution, which assists in managing risk by securing applications, websites and other web based resources via intranets, extranets, B2B and B2C infrastructures. It has 3 main components, Server, Application Server Agents and WebServer Agents which enable it to centrally manage policies and the lifecycle of an online identity. RSA Federation Identity Manager (FIM) is single sign-on(SSO) solution enabling cross domain federation using open standards like SAML, SOAP and WS-FED.
Context #1: Product Continuous Engineering (CE) and Patch Management - RSA AxM Server v6.2.x / Application Server Agents v5.0.x / RSA FIM v4.2.x
Actions #1: Lead team of 6 (AxM) / 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering.
Results #1: Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
Project #2: RSA SecurID Access, is next generation Identity as a Service (IdaaS) solution. A cloud based identity and access management,lifecycle and governance platform enabling non-SAML legacy on-premise applications to extend their SSO capabilities to the cloud.
Context #2: Product Development and Release Engineering - RSA SecurID Access v1.x
Actions #2: Scrum Developer in a team of 5 members, Worked on Office 365 integration story and encryption settings epic for registering new clients to identity router, debugged and fixed issues on identity router module.
Results #2: Delivered stories and epics for periodic sprints, handled functional testing of integration of Office 365 on-domain and off-domain clients, documented design documents in Jira wiki.
Project #3: RSA Authentication Manager is the platform behind RSA SecurID® that allows for centralized management of the RSA SecurID environment, which includes authentication methods, users, applications and agents across multiple physical sites.
RSA, un leader mondial de la cybersécurité qui fournit des solutions d'entreprise Security™, aide les organisations à prospérer dans un monde incertain et à haut risque.
Ingénierie continue des produits (CE) et gestion des correctifs
Intégration de l'authentification forte RSA
Impliqué dans les discussions architecturales pour l'intégration de RSA SecurID Multi-Factor Authentication,
Management de l'équipe de 8 membres, des développeurs et des testeurs,
Livraison RSA AxM v6.2.4, analyse et fourniture des correctifs pour diverses vulnérabilités dont FREAK, POODLE, LogJam et Triple-Handshake SSLJ Vulnerability,
Livraison des correctifs de défauts et de sécurité sous forme de correctifs (Patch Installers) sur une base régulière, gestion des escalades de clients et représentation de l'équipe dans les discussions avec les équipes fonctionnelles (CFT).
Documentation sur l'étude de faisabilité de l'intégration,
Project #1: RSA AxM Server v6.2 Service Pack Release 4
Context #1: Product Development and Release Engineering - RSA AxM 6.2.4
Actions #1: Lead team of 8 members including developers and testers, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create required Product Requirement Dociment (PRD), Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, delegate tasks to team members, develop features, perform code review, coordinate product release.
Results #1: Delivered RSA AxM v6.2.4 release, analysed and provided fixes for various vulnerabilities including FREAK, POODLE, LogJam and Triple-Handshake SSLJ Vulnerability, coordinated qualification of new platforms & datastores, defect & hotfix roll-ups and 3rd party library upgrades, coordinated the product security assessment program for release readiness involving product network scans, threat model diagrams, static code analysis review and triage, demonstration of features to CFTs.
Project #2: RSA AxM Server v6.1.x/v6.2.x , AxM Application Server Agents v4.7.x/v5.0.x, RSA FIM v4.2.x
Context #2: Product Continuous Engineering (CE) and Patch Management
Actions #2: Lead team of 8 (AxM) / 2 (AxM Application Server Agents) / 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering, coordinate weekly stand-ups.
Results #2: Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
Context #3: Integration of RSA strong authentication
Actions #3: Involved in the architectural discussions for integration of RSA SecurID Multi-Factor Authentication, interact with 3rd party service providers on webservices security, federation and deployment best practices.
Results #3: Documented the feasibility study of integration, provided guidance on integrating OWASP token based security for 3rd party vendor web service calls and use of SAML SP initiated flows for invoking cross domain federation flows.
Développement de produits et ingénierie des versions
Développeur Java dans une équipe de 12 membres,
Développement de prototype - L'objectif était de soutenir SAML 2.0 en tant que fournisseur de services (SP).
Participation aux discussions architecturales sur les exigences de SAML SP et le déploiement de proxy inversé.
Conception du modèle de classe de haut niveau pour le SAML SP et création d'un projet de squelette avec les interfaces nécessaires et le système de construction Gradle.
Project #1: RSA AxM Server v6.2 / Application Server Agent v5.0 & RSA FIM v4.2 Major Releases. RSA AxM Server v6.2.1, v6.2.2, v6.2.3 / Application Server Agent v4.7.1, v5.0.1 & RSA FIM v4.2.1 Service Pack Releases.
Context #1: Product Development and Release Engineering
Actions #1: Developer in a team of 12 members, Lead team of 5 (AxM Application Server Agents) / 4 (FIM) members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create required Product Requirement Dociment (PRD), Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, delegate tasks to team members, develop features, perform code review, coordinate product release, provide documentation updates for various product guides
Results #1: Delivered RSA AxM v6.2/v6.2.1/v6.2.2/v6.2.3, AxM Application Server Agents v4.7.1/v5.0, FIM v4.2/v4.2.1 releases, design and development of Crypto and Lockbox utilities for AxM Server component using RSA Bsafe and EMC CST toolkit, design and development of Application Server Agents for JBoss, development of installer workflows, developed i18n support for RSA AxM Self-Service feature, review of User Acceptance Test-cases, implementation of Threat Model diagrams, review and triage of Fortify scan reports, implement enhancements on SAML1.1/2.0 and WS-FED flows, upgraded FIM ANT build scripts with Apache IVY to provide dependency management, create maven build management scripts for Application Server Agents, participate in Penetration Testing architectural discussions with 3rd part vendor, collaborated on the integration with Office-365
Project #2: RSA AxM Server v6.1.x/v6.2.x, Application Server Agent v4.7.x/v5.0.x and RSA FIM v4.1.x/v4.2.x
Context #2: Product Continuous Engineering (CE) and Patch Management
Actions #2: Developer for AxM Server in a team of 12 member / Lead team of 5 (AxM Application Server Agents) & 4 (FIM) members, Involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, perform code reviews and patch release management, vulnerability & risk assessment and product release engineering, coordinate weekly stand-ups.
Results #2: Released defect and security fixes as hotfixes (Patch Installers) on a regular basis, handled customer escalations and represented team in cross functional team(CFT) discussions.
Project #3: Graphene, a reverse proxy solution implemented as a rails app deployed in Phusion Passenger integrated with Nginx Reverse Proxy Server.
Context #3: Prototype Development - The focus was to support SAML 2.0 as a Service Provider (SP).
Actions #3: Involved in the architectural discussions for SAML SP requirements and reverse proxy deployment considerations.
Results #3: Designed the high-level class model for the SAML SP and created a skeleton project with necessary interfaces and backing Gradle build system.
Project #1: RSA AxM Server v6.1 / Application Server Agent v4.7 Major Release RSA AxM Server v6.1.1, v6.1.2, v6.1.3 & v6.1.4 Service Pack Releases.
Context #1: Product Development and Release Engineering - RSA AxM
Actions #1: Developer in a team of 18 members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, create Software Requirement Specification (SRS) and Software Analysis Design (SAD) documents for features, develop and unit test features, provide documentation updates for various product guides
Results #1: Delivered RSA AxM v6.1/v6.1.1/v6.1.2/v6.1.3/v6.1.4, AxM Application Server Agents v4.7 releases, designed and developed LDAP referral binding and Secure Delegated Impersonation features, handled Request for Enhancement - email notification support for protected URL cache leaks, Socket Connection Pool to handle the number of traps sent by the server and FIPS-140 requirements, worked on building installer workflows using InstallShield and Unix Shell Scripting, migrated Ant build scripts to Maven, API and Functional testing of features on multiple platforms, handled release engineering build issues for AxM v6.1.4 on Windows64, RHEL64 and Solaris64 platforms, handled AxM URI vulnerability fix by normalising the URL to construct a java.net.URI, handled enhancements to the JACC interfaces to handle seamless SSO between AxM Web Server Agents and Application Server Agents.
Project #2: RSA AxM Server v6.0.x / v6.1.x and Application Server Agent v4.5/v4.7
Context #2: Product Continuous Engineering (CE) and Patch Management
Actions #2: Developer for AxM Server in a team of 18 members, involve in requirements gathering and request-for-enhancements (RFE) architectural discussions, patch release management, product release engineering, participate in weekly stand-ups.
Results #2: Released defect and security fixes as hotfixes (Patch Installers) on a regular basis.
Conception et développement d'interfaces pour les sous-systèmes utilisant l'architecture des composants de service (SCA) et le modèle d'objet de données de service (SDO).
Analyse de faisabilité et des exigences, spécification UML - Cas d'utilisation et diagrammes de classes, conception et développement d'interfaces, modélisation et optimisation des flux de travail, intégration des services.
Workflow Modelling and Optimisation using Websphere Business Modeler
Développement de module dans le contexte SOA.
Environnement technique :Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Websphere Application Server, Apache Tomcat / Websphere Process Server, Websphere Business Modeler / Oracle / Junit/ Ant/ CVS / IBM Rational Application Developer.
Détails de l'expérience
Project #1: Next Generation Banking Systems, CITCO – is a Custodial Services application that can cater to the growing demands of the online banking and custodial services industry.
Context #1: Develop BPEL workflows using SOA principles and optimise workflows through modelling.
Actions #1: Feasibility and Requirement analysis, UML specification - Use-case and Class Diagrams, Interface design and development, model and optimise workflows, integrate services.
Results #1: Used Websphere Process Server to design and develop workflows using SCA and SDO programming models.
Technical Environment #1: Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Websphere Application Server, Apache Tomcat / Websphere Process Server, Websphere Business Modeler / Oracle / Junit/ Ant/ CVS / IBM Rational Application Developer
Project #2: UniFy, Emirates Bank Group- is a centralised group level integrated solution EBG UniFy to automate and manage its Enterprise Financial Management (EFM) processes
Context #2: Develop Modules in SOA context.
Actions #2: Feasibility and Requirement analysis, UML specification - Use-case and Class Diagrams, develop modular services
Results #2: Developed modular reusable logging and exception handling utility/ GUI and Database Design
Technical Environment #2: Java/ EJB, XML, JAXWS, CSS, HTML /Struts, JSF, Log4J / Apache Tomcat / Tibco Business Works / Oracle / Junit/ Ant/ CVS / Eclipse
Description de l'entreprise
Satyam Computer Services Limited is a global consulting and IT services company, offering a wide array of solutions, from strategy consulting right through to implementing IT solutions for customers.