We provide IT Staff Augmentation Services!

Sme Consultant Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Having 10 + years of experience in SAP Confidential 10.0, 10.1 & 5.3, R/3 Security.
  • Currently working as Confidential SME for multiple projects in Confidential Solution Factory
  • Having 4 End to End implementation and two support project experience in Confidential 10.X
  • Implementation and support experience in Confidential 5.3
  • Experienced in Security Upgrade for HANA system
  • Having experience in both technical and functional implementation of Access Control 10.X with hands - on experience in configuring and setting-up AC 10/10.1 modules such as Access Confidential Analysis (ARA), Access Request Management (ARM), Emergency Access Management (EAM), Business Role Management (BRM) & User Access Review
  • Working on Estimations & RFPs and preparing the RFP presentation document for Confidential and ECC systems.
  • Received ACE ( Confidential Excellence) for the 3rd quarter of 2016
  • Certified in SAP Confidential AC 10.0 with 100%
  • Trained on Confidential Process Control 10.0 in SAP Labs, Bangalore
  • Trained on Confidential 5.3 - SAP Business Objects Access Control 5.3 - Implementation & Configuration in SAP Labs, Bangalore
  • Thorough knowledge and understanding the Access Control application
  • Having experience on Rule Building and Validation Confidential Analysis, Confidential Analysis Framework, Confidential Remediation, Mitigation, Workflow approval set up, Continuous Compliance, Super User Privilege Management (Firefighter ID) and

TECHNICAL SKILLS:

SAP: Confidential 5.3, 10.0, 10.1, R/3 Security, BI, CRM, Visual Admin and Vendavo Confidential 10.0

Tools: Peregrine, HPOV, SM7, Remedy Tool, ICM, Solution Manager and Vendavo

PROFESSIONAL EXPERIENCE:

Confidential

SME Consultant

Environment: 10.1

Responsibilities:

  • Planned for design and deployment strategies for Confidential 10.1 project
  • Conducting weekly gateway meetings and presenting the status of Project details
  • Leading the project and updating status of project to Confidential and client management
  • Collecting initial requirements as per their existing landscape
  • Designed and Presented Confidential 10.1 features & scope of ARM, ARA, BRM and EAM
  • Designed project plan for Confidential 10.1 modules ARM, BRM, UAR & SPM
  • Analyzed and prepared documentation for customizable activities and estimated number of Man-days from Design phase to deployment and PGLS support
  • Designed, developed logic and configured Confidential workflows for ARM, EAM & UAR
  • Created and developed required logic for Confidential workflows in BRF plus tool
  • Coordination of Confidential TIM team for setting up master d Confidential source
  • Successfully configured LDAP connectivity for Confidential system as Primary master d Confidential with coordination of basis team
  • Involving Confidential TIM team to integrate Confidential system with TIM system
  • Developed and configured required notification mails contents for ARM & BRM modules
  • Designed and configured workflows for UAR
  • Performed Unit test and Integration test and supporting for UAT issues.
  • Configured LDAP groups provisioning in LDAP system by mapping ECC roles
  • Prepared the documentation & presented to client on newly configured modules
  • Preparation of documentation and providing to client management
  • Successfully moved the changes to Production environment for Go-live

Confidential

Module Lead

Environment: 10.0

Responsibilities:

  • End to End Confidential 10.0 Implementation for SAP and Non SAP systems.
  • Gathering the initial requirements as per the existing business process
  • Preparation of the strategic plan for executing Confidential Project
  • Designed and presented workflows details to client
  • Setting up weekly meetings with business team for their requirements
  • Analysis of the impacts of new Confidential tool for current process
  • Preparation of the TDD and MoG (Maintenance of the Guide) documents
  • Getting the signoff mail from client for TDD and MoG
  • Getting the Signoff mail for UAT and Technical go-live
  • Designed new workflows as per the client requirement and configured
  • Customized ARM request as per the client requirement by using SE80
  • Configured and implemented for Non SAP systems by using FLAT files
  • Customization of notifications mails
  • Confidential and BRF plus customization
  • Defined scripts for UAT and same executed in DEV and QA
  • Successfully gone for the Live without any major issues

Confidential

Analyst and Developer

Environment: 10.1

Responsibilities:

  • Mainly involving in enhancements of Confidential workflows with new requirements
  • Configuration activities for new SAP system and supporting to end user issues
  • Root cause analysis for Confidential and BRF plus workflow issues
  • Defining new workflows in Confidential and updating BRF plus with new logic for new requirements
  • Design and develop new logics for new systems

Confidential

Team Lead

Environment: 10.0 & 5.3

Responsibilities:

  • Workflows configured in Confidential for New User, Change user, Firefighter Access with BRF+ Initiator Rule ID
  • Creation of Connecters and Connector Groups for each backend system and
  • Custom Agents rules, Initiator Rules Defined in BRF + and used in Confidential Workflow
  • Mapping approvers in BRF+ Agent rule
  • Custom Initiator Rule created in BRF plus for New user, Change User, Lock user and Firefighter Access
  • Synchronization Jobs scheduled for Repository Object Sync, Authorization sync, users and Transactions
  • Generated rules and rule IDs for Confidential Analysis
  • Configured Access Control settings with required parameters
  • Maintained auto provision settings globally
  • Mass roles uploaded into Confidential system
  • Confidential Workflow configured for new/change Functions & Risks
  • Mapping Roles and approvers to Functional Area in BRF plus tool
  • Transporting Functional area and approvers list from BRF Plus tool
  • Creating Functional Area and Business Process as per the requirement.
  • Applying Mitigation Controls at role and user level.
  • Applying Mass Mitigation Controls by using download and upload programs
  • Creating New Mitigation controls and Administrators and mapping the same.
  • Weekly SoD review at role level and User level
  • Analyzing the Custom transaction codes and updating the Confidential Ruleset if risks are exist in the base transaction code.
  • Giving Security Clearance for Custom Transaction by following FS and TS docs
  • Knowing the functionality of the custom transaction from Functional & technical team
  • Ruleset updation post giving security clearance of new custom T-code
  • Resolving Confidential 10 support issues
  • Creating new mitigation controls for newly identified risks
  • Adding Approver and Monitors to existing Business Units
  • Adding new approvers & Monitors to existing Mitigation Controls and deleting old approvers
  • Modifying functions with custom T-codes
  • SOD report - report on mitigated and unmitigated risks with information about critical risks
  • Involving Global Confidential UAT and Change Impact Analysis
  • Persona Admin support: Adding flavors & groups to end users
  • Providing to Business user on Confidential 10 requests
  • Taking care of escalations by attending the client calls
  • Reporting weekly, monthly and annually tickets updates
  • Taking care of SLAs for agreed tool ticket

Confidential

Responsibilities:

  • Prepared strategic plan and executed the project
  • Conducted project phase gateway meetings
  • Gathering the requirements for project execution at preparation phase
  • Conducting the meetings with all stakeholders for at Preparation phase, Feasibility phase and UAT
  • Analyzed the impacts of up gradation with all stakeholder
  • Activated Confidential & GRAC BC Sets and Services in SICF
  • Plug-Ins installed in ERP system with require patches
  • Installed Confidential 10.0 Add-on GRCFND A Component with patches
  • Performed post & pre installation steps for ARA, ARM. EAM and BRM
  • Created Connectors and Connector Types for back end systems and also defined subsequent connectors
  • Maintained Connectors with Integrated Scenarios
  • Workflows configured in Confidential for New User, Change user, Firefighter Access with BRF+ Initiator Rule ID
  • Custom Agents rules, Initiator Rules Defined in BRF + and used in Confidential Workflow
  • Mapping approvers in BRF+ Agent rule
  • Custom Initiator Rule created in BRF plus for New user, Change User, Lock user and Firefighter Access
  • Synchronization Jobs scheduled for Repository Object Sync, Authorization sync, users and Transactions
  • Generated rules and rule IDs for Confidential Analysis
  • Configured Access Control settings with required parameters
  • Maintained auto provision settings globally
  • Mass roles uploaded into Confidential system
  • Confidential Workflow configured for new/change Functions & Risks
  • Confidential Workflow configured for Mitigation Control creation and assignment
  • Maintained Confidential Workflows for Agents, Rules and Paths
  • Number Ranges defined for Access Request
  • Applied Snotes when we got an errors for new Function approve
  • Created new mitigation controls and mapped the owners and monitors
  • Created root organization and maintained with mitigation controls
  • Assigned Mitigation controls for Identified Risks
  • Centrally Configured Fire Fighter IDs and created control owners in Access Control
  • FF ID, FF Monitor, Confidential approver, Mitigation Monitors owners created in Access Control
  • BRM role methodology and process configured for Single and Derived Roles
  • Defined BRF plus rule for role methodology and assigned Condition Groups
  • Condition Group Types assigned to BRF plus Application and Functions

Confidential

Environment: SAP R/3 Release 4.7, ECC 6.0

Responsibilities:

  • User administration: User Creating, modifying, password resetting, locking and unlocking.
  • Creating authorization groups and maintenance of the table authorizations
  • Roles Maintenance, Roles Uploads & Downloads
  • Mass Transports & Deletion of Roles

Confidential

Environment: SAP R/3 Release 4.7, ECC 5, ECC 6.0, Confidential 5.3, CRM & BI 7.0

Responsibilities:

  • Involved in the Confidential 5.3 CUP, RAR and SPM Implementation & Configuration tasks.
  • Created FF users for SPM and converted them into FF IDs.
  • Uploaded UME roles like CC, AE & RE UME ROLES.txt files in RAR.
  • Created AC Administration user in UME D Confidential base with AEADMIN, READMIN & Confidential CC ADMINISTRATOR roles
  • As per document, created JCo connections and Technical system for target systems
  • Created Logical Systems and Assign System Connectors
  • Downloaded Static Text from R/3 system by using report / Confidential /ZCC DOWNLOAD DESC and uploaded to Confidential system
  • Downloaded SU24 d Confidential from R/3 system and uploaded to Confidential system by using report / Confidential /ZCC DOWNLOAD SAPOBJ
  • Uploaded SAP delivered Rule files to Confidential system
  • Configured Organization Rules for new company code in RAR
  • Uploaded 3 initial d Confidential (XML) files into CUP
  • Connecters Creating and testing
  • Created System connectors for User D Confidential Source
  • Configured CUP for the workflow with creation of Initiators, Stages and Path
  • Configured Custom Approver Determinator (CAD) for SPM
  • Maintained Number ranges in CUP
  • Created new mass & single roles in CUP with primary and back up approvers
  • Created Firefighter ID’s and assigned approvers as owners for execution in production level.
  • Creation of new Mitigation controls and business units.
  • Creation of the Monitors and Approver for Mitigation Controls
  • Adding Approver and Monitors to existing Business Units
  • Adding new approvers & Monitors to existing Mitigation Controls and deleting old approvers

Confidential

Responsibilities:

  • User administration: Creating, modifying, password resetting, locking and unlocking.
  • Role creation, modification and role transports
  • Ensure segregation of duties (SoD) exists in the SAP system using Confidential systems VRAT tool
  • Extending FF IDs and maintenance of FF IDs
  • Giving Fire call access through Firefighter tool and extending fire call access
  • Checking missing authorizations by using SU53
  • Resolved incident and new hire tickets
  • Creating new roles according to business requirements subjective approval.
  • Creating and transporting roles to destination systems
  • Creating authorization groups and maintains the table authorizations.
  • Applying S-Notes with instructions.
  • Monitoring background jobs and system logs
  • Transporting roles to destination systems
  • Creating authorization groups and maintain the table authorizations
  • Restricting and providing table level access by using Authorization groups

Confidential

Windows Administrator

Responsibilities:

  • Installation of Windows 2000/2003 Servers and XP
  • Creating and administering users and giving permissions
  • Creating and modifying of MS SQL d Confidential bases
  • Maintaining particular d Confidential base backups and restores
  • Installation of Antivirus copy on servers and clients
  • Installation of patches and service packs for OS
  • Installation and Troubleshooting of Operating System, and Printers
  • Installed and configured IIS server
  • Applied windows service packs on XP
  • Installed HR Payroll software for HR department

We'd love your feedback!