Sreedhar Roddam is seeking a role that utilizes his 6 years of experience in IT security, identity and access management, and incident, change, and problem management. He has worked on projects involving PKI and digital certificate management, secure email certificate management, identity governance, and token authentication. Sreedhar is proficient with security products, Windows servers, Active Directory, and ITIL processes. He aims to contribute to organizational goals through effective teamwork and continuous learning.
1. 1.
RESUME – PKI - Certificate Management
Sreedhar Roddam
Mail id: Sreedhar.vs7@gmail.com Phone: +91 9379509959
OBJECTIVE
To work in a challenging environment that provides opportunity to learn key technologies, be an effective team player and
to be an asset for the organization by delivering to the best of my capabilities.
SUMMARY
Career Profile:
To develop a career as an Information Security Analyst in a growing company where my skills and experience will
be utilized in achieving the goals and objectives of the organization.
Process followed: Adhering to ITIL Processes for Incident, Change and Problem Management to handle all technical events
of the infrastructure.
Summary of Skills:
Company : IBM India Pvt Ltd
Professional Experience Details
Objective:
To move into higher technology area which provides an environment of self-expression, learning and to improve my
analytical and technical abilities.
Details of Employment / Projects
IAM: Identity and Access Management: (Security and Risk Management) -IBM India Pvt Ltd
Client: BHP Billiton (World’s Third Largest Organization)
Project#1 Project Name:
PKI - Certificate Management Digital certificate & SSL Server certificate Management
Create ADAM account for the new users (New User, Modification, Delete) on ADAM server.
Issue third part authentication digital certificate to install on vendor's machine.
Encryption and/or sender authentication of e-mail messages (e.g., using OpenPGP or S/MIME)
• Encryption and/or authentication of documents (e.g., the XML Signature [2] or XML Encryption [3]
standards if documents are encoded as XML)
• Authentication of users to applications (e.g., smart card logon, client authentication with SSL). There's
experimental usage for digitally signed HTTP authentication in the Enigform and mod_openpgp projects
• Bootstrapping secure communication protocols, such as Internet key exchange (IKE) and SSL. In both of
these, initial set-up of a secure channel (a "security association") uses asymmetric key—i.e., public key—
methods, whereas actual communication uses faster symmetric key—i.e., secret key—methods.
Provide telephonic support at the time of installation.
Import and Export user's digital certificate keys.
Issue SSL certificate for servers.
2. Provide telephonic support to install SSL certificate on server and reverse proxy server.
Send reminder mail for renewal.
Project#3
Name: Secure Email Certificate Management
Roles & Responsibilities – Security Administration
Add the new user on secure email group in Active Directory.
Troubleshooting - VeriSign secure email encryption certificate on user's Machine remotely.
Key synchronization on user's Blackberry.
Encryption keys backup and key recovery of the user.
Outlook setup
Telephonic support.
Project#4
Governance Platform Management :
• IdentityIQ Governance Platform capabilities include:
• Providing enforces access policy across access certification, access request management, password management
and provisioning processes.
• A Role Modeler that provides flexible options to model business and IT roles and manages role lifecycles.
• A calculating and assigning dynamic identity risk scores to users and systems.
• Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration
vs. customization as much as possible
Working on below task :
• Access control
• Cloud computing
• Digital identity management
• Password manager
• Workflow automation
• Provisioning
• Single sign-on
• Security Token Service
• Role based access control
• Risk management
• Create a new role of the new role type.
Project#5
Project Name: Token Authentication management
Roles & Responsibilities – Security Administration
Token User id Creation on Token server. (New user, Modification, Delete)
Token license procurement.
Upload the tokens on server.
Issue requested privilege.
3. Manage the tech bridge for Token issue.
Project#6
BHPB Reporting:
Preparing Reports (Daily, Weekly and Monthly), Daily Stats.
Daily Production Report, Issue Tracker.
Documentation.
Preparing Reports.
I worked in Word, PowerPoint, Excel, formatting tables/charts and Pivot tables.
• INCEIDENT MANAGEMNET DAILY ACTIVITIES - PROFILE
• Having 6 years of professional experience in IT Security ( IAM & Incident, change, problem management ) as
Senior Security Analyst.
• Ability to solve complex problems in a simple and accurate manner.
• Good command over spoken and written communication in English.
• Flexibility, strategic problem solver with good time management skills
• Highly skilled in IT Security products.
• Experience in handling of all kind priority Incidents tickets and analyzing the issue and taking appropriate action
within SLA.
• Incident detection and recording, Classification and initial support, Investigation and analysis, Resolution and
recovery, Incident closure, Incident ownership, monitoring, tracking and communication. Establish incident
framework management, Evaluation of incident framework management and resolving Incidents.
• Experience in checking that, the incident has not already been logged: it is commonplace for more than one user to
report an incident, so it is necessary to check to avoid unnecessary duplication, the incident will be assigned a
reference number to uniquely identify it in both internal processes and when communicating with the customer.
The basic information needed to process the incident (time, description of the incident, systems affected, etc.) has
to be entered on the associated database.If any relevant information for the resolution of the incident that may be
asked for from the customer using a specific form, or which may be obtained from the CMDB (interrelated
hardware), etc. Incident notification: in those cases where the incident may affect other users, these should be
notified so that they are aware of how the incident may impact their usual workflow.
• Experience in register and classify received Incidents and to undertake an immediate effort in order to restore a
failed IT service as quickly as possible. If no ad-hoc solution can be achieved, 1st Level Support will transfer the
Incident to expert technical support groups (2nd Level Support). 1st Level Support also keeps users informed about
their Incidents' status at agreed intervals.
• Experience in preparing the document based on Incident and complete resolution history, and identifies
opportunities for improving the handling of future Major Incidents.
• Escalation regarding the processing of an Incident or Service Request, initiated by a user experiencing delays or a
failure to restore their services.
• Experience in solving an Incident (service interruption) within the agreed time schedule. The aim is the fast
recovery of the service, where necessary by means of a Workaround. If required, specialist support groups or third-
party suppliers (3rd Level Support) are involved. If the correction of the root cause is not possible, a Problem
Record is created and the error-correction transferred to Problem Management.
• Experience in analyzing incidents that have occurred in order to discover their causes and propose solutions to
them. Monitoring the quality of the IT infrastructure and analyzing its configuration in order to prevent incidents
even before they happen.
• Experience in Using Ticketing tools like Maximo, manage now and Quest.
• Asset management or Asset Tracking of all IT related devices and machines in the organization.
4. • Experience in Making and deliver the reports which are supposed to be sent to the customer and Understanding
the process and delivery best service to the customers.
• Experience in supporting 24/7 work environment.
Problem Management
• Experience in diagnose the root cause of incidents identified through the Incident Management process,
and to determine the resolution to those problems. It is also responsible for ensuring that the resolution is
implemented through the appropriate control procedures, especially Change Management and Release
Management.
• Used to maintain information about problems and the appropriate workarounds and resolutions, so that
the organization is able to reduce the number and impact of incidents over time. In this respect, Problem
Management has a strong interface with Knowledge Management, and tools such as the Known Error
Database will be used for both. Although Incident Management and Problem Management are separate
processes, they are closely related and will typically use the same tools, and may use similar
categorization, impact and priority coding systems. This will ensure effective communication when dealing
with related incidents and problems. Identify, verify, and elevate "New" issues based on new request.
Operations management is an area of management concerned with overseeing, designing, and controlling the
process of production and redesigning business operations in the production of goods or services. Involves the
responsibility of ensuring that business operations are efficient in terms of using as few resources as needed, and
effective in terms of meeting customer requirements and handles Request for Change activity
Change Management
• Accepting the Changes
, Prioritize and classify changes
, Coordinate change impact assessment
, Coordinate approval of changes
, Coordinate scheduling of changes
,Coordinate implementation of changes
,provide management information about Change Management quality and operations
. Managing reports.
Details of Employment / Projects
Company : Infosys
Location : Bangalore
Period : June 2007 to May 2011
Designation : Process Specialist
Project#1
Project Name : Application Security Administrator/ Trainer/ System Administrator
Key Responsibilities:
• Installation, Configuration, Maintenance of McAfee Server EPO 4.x and Mcafee Virus Scan Enterprise 8.x.
5. • Configure the policies for Server and Client from McAfee ePolicy Orchestrator server.
• Maintaining the DAT updates in the Server & initializing the updates to all managed Client.
• Manually updating the DAT to the unmanaged clients.
• Installing the Symantec Endpoint Protection suite 11.0 & Small Business Suite 12 and configuring the Policies as
customer requirement.
• Troubleshooting the Problems and Submitting non-detected malwares to the Respective Team and resolving the
Issues.
• Installing, configuring and troubleshooting the Kaspersky, CA Total Defense antivirus including the server and
clients & activating the licenses.
• Implementing Software and hardware fault tolerance techniques and troubleshooting the issue with documenting
the records.
• Designing the Installation, configuration the policies in Technical Documents.
• Follow-ups with Mails for client related problems and exalted the virus issue in the client places.
• Daily/weekly visiting to the client places and solves the client’s related problems and installation for the latest
update for the antivirus and the servers.
Summary of Skills: Active Directory.
• Creation/Deletion/Maintenance of Windows Accounts through Active Directory
• Upgraded the Active Directory system to the Windows 2008 to incorporate design.
• Studied various documents and applied new technologies to the existing system.
• Add the new user on secure email group in Active Directory.
• Designed the measurements for auditing and quality assurance.
• Supported the enterprise level application by windows plumbing.
• Maintained a record of all the security changes and modifications made to the system.
• To improve quality of service and business support.
• Followed steps of Incident Management(IM), which involves logging of defects
• Identify, Resolution, Closure and maintain incident management and daily report update to management.
• Prioritizes the incident & Change depending upon the customer requirements .
• Provide excellent customer service and delivery of technology services.
• Updating documents which will be helpful in eliminating process disconnects.
Achievements
Awarded “Individual Extra Miler
Sport awards for Highest Production
One STAR OF Year award for top performance.
Have exceeded expectations in 4 Consecutive appraisals.
TECHNICAL SKILLS
• Extensive knowledge of Platforms in Microsoft Windows desktop & Servers
• Proficient in the use of Security products like McAfee, Symantec, Trend Micro.
• Familiar in Technical documentation and knowledge sharing.
• Windows server 2008, Windows 2003 Server Platforms, Windows7, Windows XP,
Windows 2000.
Professional Activities and trainings
Epolicy Orchestrator 4.5 (MSA-103.02 EN)
6. Endpoint Encryption PC 6.0 (Technical)
McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)
ITIL v3 internal certification- IBM
Trained in CEH
Completed identity manager courses @ IBM.
Completed ITIM Foundation course @ IBM(Internal Training)
Education
• B.sc in S.D.G.S College at S.K University.
• Enrolled in MBA- Personal Area at Dravidian University.
PERSONAL DETAILS
Name : Sreedhar Roddam
Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra
Bangalore-560067
Nationality : Indian
Gender : Male
Languages Known : English, Kannada, Telugu and Hindi
DECLARATION
I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief.
Sreedhar Roddam
7. Endpoint Encryption PC 6.0 (Technical)
McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)
ITIL v3 internal certification- IBM
Trained in CEH
Completed identity manager courses @ IBM.
Completed ITIM Foundation course @ IBM(Internal Training)
Education
• B.sc in S.D.G.S College at S.K University.
• Enrolled in MBA- Personal Area at Dravidian University.
PERSONAL DETAILS
Name : Sreedhar Roddam
Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra
Bangalore-560067
Nationality : Indian
Gender : Male
Languages Known : English, Kannada, Telugu and Hindi
DECLARATION
I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief.
Sreedhar Roddam