We provide IT Staff Augmentation Services!

Sap Bi Security Resume

5.00/5 (Submit Your Rating)

Midland, MI

SUMMARY:

  • Highly skilled senior analyst and project leader with over 20 years of accomplished IT experience; with experience in SAP Basis / BW & Security Administrator.
  • Has worked through the entire support cycle of Basis administration from installations, upgrades to maintenance and support including application of SPAM/SAINT updates, support, client management, correction and transport management system, profile maintenance, and SAPDBA.
  • He has extensively worked on SAP security, user administration and security concept in SAP with authorizations using Profile Generator (PG) for various modules in R/3 (SD, MM and FI) and Sap BW.
  • Confidential ’s background also includes over 10 years providing design and changes for inventory control, general ledger, accounts payable/receivable, sales orders, work orders, and other manufacturing systems including the Glovia ERP system. Proficient in performing studies regarding software, hardware, and system upgrades.Effective leader adept in providing training in ERP system usage, programming, and system design.
  • Has worked in SAP Basis systems on Windows and UNIX systems based on Oracle RDBMS from version 4.5 to the 4.7 Extension set 2.00 release.
  • Has worked in SAP BW systems from 3.0B to 3.1 (content 3.1 thru 3.3) and 3.5 (content 3.51/3.52)
  • Installation of new generation such as CRM, Solution Manager.
  • Has worked on SAP security, user administration and security concept in SAP with authorizations using Profile Generator (PG) for various modules in R/3 (SD, MM, FI and HR) and also in Sap BW.
  • Has good understanding of business processes from order to cash, procure to pay, plan to procure and plan to produce.
  • Has a good exposure to sales taxation third party SAP software such as Vertex.
  • Generated significant reductions in time by facilitating the automatic generation of work orders through the design of an order launch system for the Glovia manufacturing system; created an interface for web transactions into the same. Developed a custom project management system in Glovia that integrated the work order, sales, order, billing, and purchase order systems to enable tracking, management, and analysis of project costs, budgets, and profitability.
  • Served as the lead technical consultant in the design, analysis, and development of an integrated EDI system in a bilingual environment.
  • Prepared custom G/L reports in a multi company environment to enable management to track profitability.

TECHNICAL SKILLS:

Operating Platforms and Hardware: DEC PDP 1123 (RT11)/DEC 1134 (RT11)/DEC PDP 1144 (Tsx)/DEC PDP 1173 (RT11/Tsx); Solaris 2.6; Digital Unix 4.0D P2; Aix 4.1; Micro - Vax (VMS)/Micro-Vax/II (VMS)/Vax 11/750 (VMS)/Vax 3800 (VMS)/Vax 3100 (VMS)/Vax 6000 (VMS); IBM Risc/6000 (AIX 5.x); HP/3000 (Unix)/HP/9000 (Unix)/NT 4.0 SP5/Windows 2000/Windows 2003, HP-UX 11.0 / HP-UX 11i,SAP VERSION 700, OP Windows NT 5.0, Windows NT 5.1, Windows NT 5.2, Wi, SAP NetWeaver 2004s, SAP ECC 6.0

Software: SAP R/3 4.5B/4.6C, SAP R/3 Enterprise 4.7 Ext. Set 1.10/2.00, SAP BW 3.0B/3.1/3.5, Mini-Computer Business Application (MCBA); Glovia Manufacturing /MS and DOS; Dibol/Cobol/Fortran; Basic/Pro-IV/Progress/C/HTML; SAP R/3 Enterprise 7.00;BI NetWEAVER 7.0, BOBj 4.0

PROFESSIONAL EXPERIENCE:

SAP BI Security, Midland, MI

Confidential

Responsibilities:

  • Analysis/Audit current BI Security structure
  • Provide report on required changes for the BI Security
  • Security Tcodes used, PFCG, SU24, SUIM, RSECADMIN, etc
  • Used Excel to layout required BI Security changes
  • Setup BW processes for Export Control. Which is used to control what ECCNs can be viewed
  • Trained Users in ECC and BI Security

Sap security/bi/BOBJ/hana

Confidential, Thomasville, GA

Responsibilities:

  • Analysis current BI/BOBJ/Hana Systems to view their current security structure
  • Provide report on required changes for the BI/BOBJ/Hana sytems
  • Security Tcodes used, PFCG, SU24, SUIM,RSECADMIN, Hana Studio
  • Used Excel to layout required Security changes and to map role roles to new
  • Setup processes in BOBJ to load users into BOBJ and auto-load the users in the appropriate groups.
  • Worked with function teams to assigned appropriate authorizations to BOBJ Groups Folders, and Queries.
  • Worked also with functional teams to setup BI and Hana accesses.

SAP Security/ Systems Audit

Confidential, Arizona

Responsibilities:

  • Reviewed the process used to design, create and test the Roles.
  • Setup and chaired interviews of persons who are essential to the workflow of the various departments of the enterprise.
  • Using Maestro and determine and resolve any SOXs and SODs with all roles.
  • Reviewed the testing process of the new roles and the process by which changes are done.
  • Review how locked/terminated are handled.
  • Review are Users and there assigned roles with the various functional teams to ensure each users has only the required roles.
  • Instruct Confidential on security policies and procedures

SAP BI Security Lead

Confidential, GA

Responsibilities:

  • Analysis the current system design to determine how to improve on it current design. Users were known to have access to queries outside of their scope.
  • Worked on SAP BI Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Conducted workshops to gather information needed to create security roles
  • Worked with BI Developers to prepare for the roll-out of new BI Security roles.
  • Set Security Worksheet that documents the structure of the BI Security process and roles.
  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG (using Word, Excel, PowerPoint)
  • Hana Security. Setup Hana Roles for Basis, Security, and Users based on packages you want to grant access to,FI,IV,etc.
  • Set up mapping of new roles to old roles. This is used for loading the new roles into the effect uses.

SAP ECC/BI Security, Deer Park IL

Confidential

Responsibilities:

  • Interfaced with technical and functional teams to solve security problems
  • Worked on SAP security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • In ECCC systems worked with Functional Teams and users to resolve authorization needs and Errors. Using transaction like SU01, SU53, ST03N, PFCG, and ST01
  • Performing study to determine how to solve conflicts between the necessary rights of the user and the rights that the user actually has been given by the assigned roles
  • Using PFCG to add/ remove transaction and authorization objects and SU10 to perform mass changes to users roles assignments
  • Work with client to help set up testing processes used to test out roles.
  • Performing study to review how roles must be changed so that transactions will performed has needed for users

SAP BI/ECC Security

Confidential

Responsibilities:

  • Worked on SAP BI Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Conducted workshops to gather information needed to create security roles
  • Conducted workshops to gather information needed to create security roles
  • Worked with BI Developers to prepare for the roll-out of new BI Security roles.
  • Set Security Worksheet that documents the structure of the BI Security process and roles.
  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG
  • BOBJ Administrator; setting up Users, Groups, Folders, Import Roles.

SAP BI/ECC Security, Dallas, TX

Confidential

Responsibilities:

  • Worked on SAP BI Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Conducted workshops to gather information needed to create security roles
  • Conducted workshops to gather information needed to create security roles
  • Worked with BI Developers to prepare for the roll-out of new BI Security roles.
  • Set Security Worksheet that documents the structure of the BI Security process and roles.
  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG
  • Assign Portal roles and groups to users
  • GRC 10 … Access Management, SOD/SOX compliance/remediation, Imported/Updated Roles. Setup FF IDs and Reviewed FF logs, Risk Analysis
  • Interfaced with technical and functional teams to solve security problems
  • Produce a technical document that outline in detail the BI Security Structure.
  • Knowledge/Training to the Coke Security team concerning the BI Security Structure.

SAP BI Security, Atlanta, GA

Confidential

Responsibilities:

  • Worked on SAP BI Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Conducted workshops to gather information needed to create security roles
  • Using SOLMAN to control Transports (SM CRM)
  • Conducted workshops to gather information needed to create security roles
  • Worked with BI Developers to prepare for the roll-out of new BI Security roles.
  • Set Security Worksheet that documents the structure of the BI Security process and roles.
  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG (using Word, Excel, PowerPoint)
  • Assign Portal roles and groups to users
  • GRC 10 … Access Management…solve SOX/SOD problems/remediation, Imported/Updated Roles. Setup FF IDs and Reviewed FF logs, Risk Analysis
  • Interfaced with technical and functional teams to solve security problems
  • Produce a technical document that outline in detail the BI Security Structure.
  • Knowledge/Training to the Coke Security team concerning the BI Security Structure.

SAP BI Security Lead, Cleveland, OH

Confidential

Responsibilities:

  • BI Architected/Security lead (Version 4)
  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG (using Word, Excel, PowerPoint)
  • Conducted workshops to gather information needed to create security roles
  • Interfaced with technical and functional teams to solve security problems
  • Worked on SAP BI/BPC Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Migrate the current BI 3.5 security structure (Role Base) to BI 7.0 (Analysis

SAP Security, Houston, TX

Confidential

Responsibilities:

  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG
  • Perform study to determine the required rights that are required for Users who will be assigned to new Company codes and Plant codes
  • Assist in the design, development, maintenance, and testing of SAP roles and provide consulting support to security team, project members and business users
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • Setup classes in which I taught users how to user RSA1 and RESECADMIN

SAP BI-BOBJ Security, Fairfax County, VA

Confidential

Responsibilities:

  • Setup security documents used to explain BI terms and provide User Instructions on RSA1, RSECADIM, and PFCG
  • Conducted workshops to gather information needed to create security roles
  • Interfaced with technical and functional teams to solve security problems
  • Worked on SAP BI Security using SU53, PFCG, SU24, ST01,SM20, SUIM and working with the user base to design and solve user problems.
  • Set up BW authorizations for BW queries, (using RSECADMIN)(BI-NetWeaver7.0) )
  • Assign Portal roles and groups to users
  • Setup folder authorizations in BOBJ to allow users access to assigned Queries
  • Setup Info-Objects,InfoProviders and Process Chains to gather into the BI production system security data from the various productions systems.
  • Wrote user Instructions for RESECADMIN and RSA1. (using Word, Excel, PowerPoint)
  • Setup classes in which I taught users how to user RSA1 and RESECADMIN
  • Perform study to determine the required rights that are required for “Special” IDs used in the production systems so that SAP ALL might be removed.
  • Assist in the design, development, maintenance, and testing of SAP roles and provide consulting support to security team, project members and business users
  • Used SM36 and Sm37 to setup Batch processing (with the use of variants).
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • Worked with ABPA programmers in assigning Authorization Objects to custom programs
  • In ECC systems worked with Functional Teams and users to resolve authorization needs and Errors. Using transaction like SU01, SU53, ST03N, PFCG, and ST01
  • Using PFCG to add/ remove transaction and authorization objects and SU10 to perform mass changes to users roles assignments
  • Interfaced with technical and functional teams to solve security problems

SAP Security

Confidential, WI

Responsibilities:

  • Assist in the design, development, maintenance, and testing of SAP roles and provide consulting support to security team, project members and business users
  • BI Architected/Security lead (Version 4)
  • Conducted workshops to gather information needed to create security roles
  • Interfaced with technical and functional teams to solve security problems
  • Worked on SAP Security using SU53, SU24, SUIM and working with the user base to design and solve user problems.
  • Work with client to help set up testing processes used to test out roles.
  • Performing study to determine how to solve conflicts between the necessary rights of the user and the rights that the user actually has been given by the assigned roles
  • Using PFCG to add/ remove transaction and authorization objects and SU10 to perform mass changes to users roles assignments
  • Conduct meetings with the heads of the functional teams to explain how role security works.
  • In ECCC systems worked with Functional Teams and users to resolve authorization needs and Errors. Using transaction like SU01, SU53, ST03N, PFCG, and ST01
  • Using ST01, ST05, PFCG, SU53 to solve problems between transactions and roles
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • Worked with ABPA programmers in assigning Authorization Objects to custom programs
  • Using AL08, SM51, and SM04 to monitor/ kill users and SU01 to add/ changed users, set/ reset users passwords, lock/ unlocked users, and to assign/ unassigned roles to users.
  • Set up BW authorizations for BW queries, (using RSECADMIN) )(BI-NetWeaver7.0)
  • Set users up in portal and setup user backend roles
  • Using SUGR to setup user groups
  • Used SU10 to perform mass changes to users roles assignments
  • Working knowledge of SE80
  • Re-wrote the BW security at Confidential and set up a technical document that outlines the BW security system and is used by developers and functional users
  • Work with GRC and SymSoft(Symmetry Corporation) analytical software to check and solve any SOD problems/remediation.
  • Worked with FI Audit and used to resolve SODs problems.
  • Trained Client employees in BI Security.

SAP Security Lead, Seattle, WA

Confidential

Responsibilities:

  • Security lead and setup security policies and review including presentations to senior client staff
  • BI, CRM, FI, HCM, IV, SRM, CO, SD, PP,etc Architected/Security lead
  • Conducted workshops to gather information needed to create security roles
  • Interfaced with technical and functional teams to solve security problems
  • Managed a security team of 3
  • Conduct computer security reviews, violation investigations, and prepare reports to Management
  • Conduct meetings with the heads of the functional teams to explain how role security works.
  • Worked with ABPA programmers in assigning Authorization Objects to custom programs
  • Assist in the design, development, maintenance, and testing of SAP roles and provide consulting support to security team, project members and business users in USA and Europe
  • In ECCC systems worked with Functional Teams and users to resolve authorization needs and Errors. Using transaction like SU01, SU53, ST03N, PFCG, and ST01
  • Worked on SAP Security using SU53, SU24, SUIM and working with the user base to design and solve user problems.
  • Performing study to determine how to solve conflicts between the necessary rights of the user and the rights that the user actually has been given by the assigned roles
  • Using PFCG to add/ remove transaction and authorization objects and SU10 to perform mass changes to users roles assignments
  • Using ST01, ST05, PFCG, SU53 to solve problems between transactions and roles
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • Using AL08, SM51, and SM04 to monitor/ kill users and SU01 to add/ changed users, set/ reset users passwords, lock/ unlocked users, and to assign/ unassigned roles to users.
  • Work with functional SAP to map user task to related SAP transactions. Then used this mapping to develop roles. (system R/3 & BW & HCM & CRM) (client is converting from JD-Edwards to SAP)
  • Used various transactions in HCM, (example: PA10, PA20, PA30, SPRO, PO13, PO03, ESS, LSO, MSS)
  • Set up BW authorizations for BW queries
  • Set users up in portal and setup user backend roles
  • Work with client to help set up testing processes used to test out roles. And Provided Post Go Live Support
  • Used SPAD and SP01 to add and maintained printers
  • Using SUGR to setup user groups
  • Used SU10 to perform mass changes to users roles assignments
  • Trained Client employees in ECC and BI Security.
  • Meet with the CFO of Confidential to recommend that VIRSA and CUA be purchased and installed.

SAP Security, Denver, CO

Confidential

Responsibilities:

  • Worked on SAP Security using SU53, SU24, SUIM and working with the user base to design and solve user problems.
  • Conducted workshops to gather information needed to create security roles
  • BI. CRM, FI, HCM, IV, SRM, CO, SD, PP,etc Architected/Security lead
  • Performing study to determine how to solve conflicts between the necessary rights of the user and the rights that the user actually has been given by the assigned roles
  • Using PFCG to add/ remove transaction and authorization objects and SU10 to perform mass changes to users roles assignments
  • Using ST01, ST05, PFCG, SU53 to solve problems between transactions and roles
  • Using SUIM to determine the roles assigned to users or what authorization objects are assigned to roles
  • Worked with ABPA programmers in assigning Authorization Objects to custom programs
  • Using AL08, SM51, and SM04 to monitor/ kill users and SU01 to add/ changed users, set/ reset users passwords, lock/ unlocked users, and to assign/ unassigned roles to users.
  • Work with functional SAP to map user task to related SAP transactions. Then used this mapping to develop roles. (system R/3 & BW & HCM) (client is converting from JD-Edwards to SAP)
  • Used various transactions in HCM, (example: PA10, PA20, PA30)
  • Work with client to help set up testing processes used to test out roles. And Provided Post Go Live Support for USA and Europe
  • Setup and taught how to install CUA…(USA and Belgium)
  • Used SPAD and SP01 to add and maintained printers
  • Using SUGR to setup user groups
  • Used SU10 to perform mass changes to users roles assignments

We'd love your feedback!