Sap Security Consultant Resume
3.00/5 (Submit Your Rating)
OBJECTIVE:
Seeking an SAP Security Analyst position that requires strong skills with the profile generator, authorization objects, internal and external audits, consultation, problem resolution, upgrade, consolidation, and architecture.
SUMMARY:
- Experience with Profile Generator across multiple modules. Role/activity group creation based on organizational needs.
- Expertise implementing security for various transport tools.
- Advanced understanding of Segregation of Duties Controls with respect to application security implementations.zi k
- Ability to develop plans and follow through to the end.
- Adept at formulating and documenting appropriate procedures and processes.
- Experienced at providing user maintenance and application support for DEV and QA /STG systems.
- Expert in Incident and Change management processes.
- Advanced in Active Directory, assigning users to security groups, files.
- Excellent communication, customer service, and client - facing skills. Highly motivated problem solver. Detail-oriented and organized.
TECHNICAL SKILLS:
- SAP Software Versions 3.0h, 3.0i, 4.0, 4.6h, 5.0, 6.0, 7.0, EBPro, BWs, BI, GRC 10, Tivoli, SRM, CRM, SLM, & numerous others
- Security Administration and Architecture CUA, Administration
- Advanced Profile Generator
- OSS/SAPNET, SAP Market Place
- SAP Notes/User Administration
- OSS ID Creation and administration
- Developer key creation
- AS400/SUS Security
- Creating user accounts on AS400/SUS Systems, adding access, deleting access
- Service Center, GWI Software, Netman & iDeliver, Remedy, SGW, Solman
- Problem/Change Management
PROFESSIONAL EXPERIENCE:
Confidential
SAP Security Consultant
Responsibilities:
- I worked on the SOLV problem tickets which came in to our queue.
- I resolved SU53 authorization issues and any other problems which may arise to our customer.
- Our customers were International.
- I opened SAP ACCESS REQUEST forms for role assignment and enabler assignments as needed for the customer.
- I would use GRC to ensure there were no SOD, segregation of duty, issues prior to submitting a request form.
- I know how to run numerous reports out of GRC to find approvers, GRC request numbers and pending requests.
Confidential
SAP Security Role Administrator
Responsibilities:
- Ensured that a new employee completed online before assigning new role to said user.
Confidential
SAP Security Consultant
Responsibilities:
- Creation of SAP accounts on numerous SAP systems including ECC, CRM, SRM, SLM, Bl, ERP for dev, staging, sandbox, parallel systems, and production environments.
- Resolution of authorization errors on all systems.
- Mapping of AD groups to users accounts for access to various role assignments via the Portal.
- GRC 10.0 SOD queries.
- Go-live and cutover support for projects.
- OSS account creation and developer keys.
- Problem tickets incoming via Incident management, SGW, which is the Security Governance Workflow application for new production account requests and Solman tickets. Creation of business partners in SLM.
- Direct email requests as well.
- Worked closely with developers, business users, basis team, application support, and management, in a fast-paced environment.
- Excellent written and oral communication skills.
- Excellent customer service skills.
Confidential
Information Security and Account Administration
Responsibilities:
- Account Administration and technical support for ECC staging and dev systems.
- Resolving SAP security authorization errors, creating accounts, updating accounts.
- Creating SUS/AS400 accounts and modification of accounts.
- Using GRC for SOD analysis and approval process for supplemental access requests.
- Tivoli used to update user accounts.
- Raincoat software used to run network usage reports.
- HPQC tool, set up user accounts and assigned to specific projects, Active Directory administration.
Confidential
SAP Security Technology Consultant
Responsibilities:
- Third level security support for customer and application support teams.
- Responsible for the creation and maintenance of Lyondell-Basell Chemical companies SAP security models.
- Proficient in problem resolution and recommendations to customers regarding security requirements.
- Create security for external 'bolt-on' software tools used for data extraction.
- Maintain and create users in the existing STMS transport user tables and in the use of STMS. Transport system now supported through a ZIN table and automation.
- Create and support security needs for numerous versions of SAP including 4.0, 4.6, 5.0, 6.0 & 7.0, for Lyondell-Basell SAP landscapes. These systems are managed on separate landscapes and servers.
- Responsible for all SAP security support for development and quality systems, basis team members and developers.
- Creator of all OSS accounts, developers’ keys and maintenance of these accounts.
- Reconcile any SOD issues which are brought to security's attention by Internal Controls. Work closely with Internal Controls to ensure no future SOD concerns.
- Responsible for evergreen security documentation.
- Apply security to SAP servers, as well as, create admin and service ids for said servers.
- Reconcile audit issues recognized by Internal and/or External auditors.
- Participated in numerous integrations of new companies into the Lyondell-Basell network and SAP systems.
Confidential
SAP Security Administrator
Responsibilities:
- Third level support for customers and application support teams:
- Responsible for creating, editing roles for business owner/user administrators utilized on production systems. Creator of Security Operating Procedures for third level support.
- Creator of non-production roles for use on development and acceptance systems.
- Performed problem analysis, consultation, and resolution regarding authorization issues.
- Evaluated, made recommendations and resolutions internal and external audits. Performed Security 'health checks' prior to audits.
- Developed User Administration Documentation for use by business customers. Presented User Administrators these processes and procedures and trained accordingly.
- Specialized in security administration for several different versions of SAP tailored to individual customer and project requirements. SAP software versions 3.0h, 3.0i, 4.0, 4.6b, 4.6c (manual & profile generator):
- Participated in the security implementation for an SAP R/3 System including core modules.
- Participated in the security implementation for an SAP EBP System including organization-based user set-up and workflow enabled purchasing approvals.
- Formulated and documented appropriate procedures/processes.
- Accelerated and delivered security requirements on several 'bolt-on' Tools, for example: IHUB, Data Stage, and Epproval.
- Position of SAP Security focal point for several projects simultaneously:
- ISIS Project. A global based SAP system used in the USA, Asia-Pacific and European regions providing time-keeping services for over 4,600 world-wide users. The system incorporated the use of applications for all business requirements by Confidential .
- Stargate Project. Consisted of over 750 users in the US. This SAP system provided business applications for use by Shell Oil Company and all business partners associated with Shell Oil in the USA. My exemplary efforts contributed to the successful upgrade from version 4.6b to 4.6C of SAP.
- GSAP Project. Shell Chemical, Global: 4773 SAP R/3 Users, 550 EBPro Users, 2091 BW users. SEPCO - Shell Exploration and Production: 3091 SAP R/3 Users, 253 EBPro Users. Provided Web site information to Web Designer.
- ATLAS Project. Shell International Exploration and Production; 1000 SAP R/3 users.