System Administrator Resume Profile
CA
Suumary:
SAP Security and GRC Lead versed project upgrade implementation, requirements gathering, role redesign, testing processes, project hand-off process with production support for in ECC, BI, and GRC Access control Ver. 10.0 5.3 . Excel at cultivating, managing and leveraging client relationships.
Highlights
- SAP GRC 10.x 5.3 Access Control
- SAP upgrade 4.6C to ECC 6.0
- Segregation of Duties SOD Analysis
- SAP ECC BI Role Redesign
- User, Role Profile maintenance
- Business requirements gathering
- ITIL Foundation V3
Professional Experience
- Hewlett-Packard, CA, SAP Security GRC Consultant since Jun 2006
- Accenture, Bangalore, Security Engineer Feb 2004 Jun 2006
- Computer Network Technologies, Mumbai, SAP Security L1 Support Sep 2003 Jan 2004
- International Dev. Process Engg. IDPE , Chennai, System Administrator Jan 2000 Aug 2003
Projects Summary
Confidential
- HP SAP practice support the various SAP GRC development and production support projects for both internal and external customers.
Role: System Administrator
- Responsible for gathering the business requirements from the Business/Functional teams and translate them into technical design for SAP roles.
- Responsible for the compliance audit for SAP system
- Engage Business Process Owners in the security process and design process specific role design master lists
- SOX readiness and controls optimization services
- Segregation of Duties SOD for user and roles using GRC ARA
Role: Project Lead V10.0 Project Delivery
- Implementation of GRC Version 10.0 Access Control components:
- Access Risk Analysis ARA
- Access Request Management ARM
- Emergency Access Management EAM
- Work with the Business Process Owner, SAP Functional/Technical SMEs for requirements gathering, blueprint, role redesign, testing and go-live activities
Role: SAP GRC Lead V5.3 Project Delivery
- Implementation and production support of GRC Version 5.3 Access Control components
- Access Request management using Sun Identity Management System Tool
- Used RAR tool extensively for handling SOD conflicts for each user. Each user was assigned additional role s through RAR only.
Role: SAP Security Consultant Production Support
- User Role Administration for production landscape
- Role Remediation: worked on individual roles and document the changes in upgrade.
- Authorization objects maintenance: manually and custom SU24 .
- Compared the roles in both version 4.6C and ECC 6.0
Role: SAP Security Consultant Upgrade 4.6C to ECC 6.0
- Provide SAP security support for SAP upgrade project
- Upgrade all the security Roles, Test and Move to Production
- Validate the Security Profile Parameters that effect the new system
- Verify Security rules are in place as per profile parameters after Go-Live
Role: SAP Security Consultant Production Support
- User Role Administration for production landscape
- Created mass users maintenance in the system
- Used SUIM to perform security analysis for various purposes.
- Mentoring new team members on user and role management per company policy
- Generated weekly report to see the users who have not used the system for 90 days
- SAP Role Administration Implementation Single, Composite roles
- Inserted objects manually when required
- Familiar with the Yellow, Green and red statuses in the roles
- AGR 1252
- AGR 1251
- AGR DEFINE
- Extensively used
- Understand the role of organizational values for restricting roles
- Generated useful reports for like Roles to transaction, Role to User and Roles to Composite roles etc.
- Used ST01 to advice the client and Functional team on object required to restrict the transaction
- Adherence of the ITIL process such as Incident / Problem / Change / Release Management
- Work with the business process control team for SOX internal and external audits
Confidential
Responsible for providing SAP production support for SAP ECC BI Landscape
Confidential
- Designed, implemented, created and modified the Security roles using Profile Generator PFCG .
- Role Remediation: worked on individual roles and document the changes in upgrade.
- Authorization objects maintenance: manually and custom SU24 .
- Compared the roles in both version 4.6C and ECC 6.0
- Maintained worksheets for user roles, position roles, transaction-roles and roles with modules.
- Production support of security was handled by call tickets and change request forms.
- Maintained user master records for 6000 users in 15 different locations.
- Configured Fire Fighter roles for critical authorization for project and end users.
- Troubleshooting of authorization using transactions.
- Creating/deleting/locking/unlocking users were performed as per the policies and procedures.
- Used RAR tool extensively for handling SOD conflicts for each user. Each user was assigned additional role s through RAR only.
- Used Automatic Profile Generator PFCG to create roles/profiles for various modules.
Confidential
- User and Role maintenance for R/3
- Adhered to Emergency Access Requests Fire Fighter IDs procedures to ensure client's audit requirements are fulfilled and also provide the requested access to the customer as per the Service Level Agreement SLA
- Dormant user report.
- Roles do not have a wildcard in the authorization object S TCODE
- User IDs for RFC calls or interfaces were setup as non-dialog users
- Users were not assigned to SAP delivery roles and profiles
- All user IDs were assigned to a user group
- To ensure that all dialog users had first and last names
- Generate of reports:
- Populated and transported the USR40 Table with impermissible passwords.
- Audit, Remediate and document all the SAP systems in a very highly demanding environment as part of the client's Information Security Improvement Program Project.
- Liaised with other members in team experts in their field to full fill the customer's needs.
System Administrator
- Design, installation and configuration of network infrastructure
- Responsible for design, Installation and configuration of Check Point Firewall on a Clustered environment and established a VPN Site-to-Site IPSEC tunnel.
- Installation and configuration of Windows 2000/NT MS Exchange 2000 Servers Clients
- Implementation of Trend Micro Interscan Viruswall across all Windows 2000 Servers
- Responsible for data backup on Domain Servers, File Server, SQL, Oracle and MS Exchange Server using Legato