CDM Phase 2 Master User Record

Improved Essays
Learn about other CDM related technologies including CDM overlay, SailPoint, Centrify and Radiant Logic, gain knowledge and experience of implementing those technologies. Gain though understanding on the CDM Phase 2 Master User Record (MUR) Functional Description.
Execute mapping exercises, build connections to the authoritative sources, run account aggregation, run identity correlation, set policies, configure reports, administer systems in SailPoint and Radiant Logic.
Create non-windows groups for Centrify implementation, join the active directory structure, manage the related devices and enable PIV login to non-windows devices (workstations) in most efficient matter.

Wiliness to take on challenging tasks, even when little guidance is provided. Act as an independent consultant to solve any problem that’s given. Knows how to solve a complex problem from start to finish. When help is required, effectively communicate to the helper when and what the help is needed.

Understand how to take part in a team
…show more content…
Provide enhancements and solutions to strengthen clients’ authentication through building a Master User Record (MUR). Independently investigate and research the possible solution on the technology including SailPoint, Radiant Logic and Centrify within the project scope, but not limited to the three software. Understand the principle use cases applied to each technology, and how each can be utilized. When training or knowledge session is given, fully grasp the ins and outs of the implementation steps, and ready to apply what’s learned to the immediate implementation field when necessary. Consistently deliver assignments to the specifications and quality required with no significant defects

Related Documents

  • Improved Essays

    The business that I will use for my paper’s subject matter is a cabinet making company. Currently the company uses several business information systems. The corporation uses Peachtree accounting software, Microsoft Office for document publishing, an internally written MRP (material request planning), and Infinity QS systems for quality enhancement. All of these programs are currently running on the internal intranet but the systems do not communicate without cyborg intervention.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Project Management Group: Shelly Grant and Tom Kleeman v. Any other company(s) that have done courses like this vi. The end users (people who will use these courses) b. Questions… i. Have you taken IT training courses in the past? ii. What did you like about those training courses? iii.…

    • 651 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Summary: Capstone Project

    • 522 Words
    • 3 Pages

    Capstone Project Summary This project will be to develop an overall written as well as a lab tested environment concept plan for a live implementation for a government contract. There is a need to lessen the number of running hardware services, implement high level security access for both physical access as well as any needed remote connections, to lessen the overall possible attack surfaces for the environment from potential attackers, make this a unilateral implementation anywhere, as well as follow and apply any and all Security Technical Implementation Guides (STIGs). We will be convert an older antiquated hardware server environment that is coming to end of life and will be in need up replacement or upgrade.…

    • 522 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Kassie Lopez Attend high school: Blackfoot Varied qualities endurance diversities of people personalities, and seldom late, calm personality, semi hermit, and good work ethic; Rarely enraged, and seldom working sloth. Is greatly consistent in work ethic, flexible to working schedule and varied working conditions. Get what is greatly required done; Seldom never accomplish work assignments. Don’t have extended work experience other than babysitting, Seldom house cleaning, feeding and watering animals, laundry, vehicle washing, moving furniture and cooking, and arts and crafts.…

    • 81 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cyrusone: A Case Study

    • 812 Words
    • 4 Pages

    CyrusOne helps companies overcome current and future capacity constraints by responding to technological updates, meeting business growth and complying with new regulations. We obtain proven, innovative data solutions that grow with the complexities of doing business and expanding overall footprints with certified data centers audited with up-to-date industry regulations . CyrusOne strives to be a leading provider in offering Data Center space, in a quick and timely manner and a high customer service value. Always putting the customer first. Security needs to be a top priority in providing the best and the safest solutions in our Data Center worldwide (About Us - An Enterprise Data Center Provider).…

    • 812 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Medex Personal Statement

    • 300 Words
    • 2 Pages

    As an Anethesiologist, I am constantly looking for oportunities that will further my education and make me more competitive. One such oportunity is the MedEx program. I realize there is a need for more health care professionals who can assist military veterans. This came to my attention while speaking with a physician in Charleston, South Carolina.…

    • 300 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    It has been a long established conceit that two actor authentication is essential for secure remote access scenarios. Anyone who has accessed private networks from the internet is familiar with the concept in one form or another. Whether the additional factors include Smart Badges, Security Tokens, Soft Certificates (encrypted code downloaded to a device to identify it as genuine), or a combination of the above, using two factor authentication has become a familiar and even expected part of our computing security routine and rightfully so. Two Factor Authentication has been so effective at reducing information compromise that many services are quickly adapting its safeguards for internal use as well. We have all read the alarmingly increasing…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Another of my characteristics is independent, with makes me a good leader. Leadership requires bravery and courage. If I see someone drop their books or being picked on, I’m not afraid to stand up and react. I enjoy assisting my cousin with her school work. I try to use my good qualities for the better.…

    • 435 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    A description of a Renaissance person could be, a person who is outstandingly versatile and can perform brilliantly in many different fields. Some of the skills that would be necessary for a modern day Renaissance person are a greatness in physical, intellectual, artistic and social fields, which includes deep knowledge in at least one field and is exceptional in other fields. A Renaissance person would be athletic and have a healthy lifestyle in order to be able to accomplish everything they would want to. This person would be highly intelligent and a critical thinker making it possible to make good decisions.…

    • 187 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    One has to consider the goals of the training to reduce the costs incurred during the transition (De Waal & Batenburg, 2012). It is important to ensure that the training will enable the users to understand and use the new system as quickly and efficiently as they used the old system. The importance of doing this is to make sure that the new system accomplishes the goal of enabling the user to perform all activities accurately and securely than before (De Waal & Batenburg, 2012). It is also important to set timeframe objectives since they determine when the new system will be rolled out. However, the set periods will depend on the complexity of the new system and the ability of the company to offer training to the various departments.…

    • 1500 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays