Sme Consultant Resume
SUMMARY:
- Having 10 + years of experience in SAP Confidential 10.0, 10.1 & 5.3, R/3 Security.
- Currently working as Confidential SME for multiple projects in Confidential Solution Factory
- Having 4 End to End implementation and two support project experience in Confidential 10.X
- Implementation and support experience in Confidential 5.3
- Experienced in Security Upgrade for HANA system
- Having experience in both technical and functional implementation of Access Control 10.X with hands - on experience in configuring and setting-up AC 10/10.1 modules such as Access Confidential Analysis (ARA), Access Request Management (ARM), Emergency Access Management (EAM), Business Role Management (BRM) & User Access Review
- Working on Estimations & RFPs and preparing the RFP presentation document for Confidential and ECC systems.
- Received ACE ( Confidential Excellence) for the 3rd quarter of 2016
- Certified in SAP Confidential AC 10.0 with 100%
- Trained on Confidential Process Control 10.0 in SAP Labs, Bangalore
- Trained on Confidential 5.3 - SAP Business Objects Access Control 5.3 - Implementation & Configuration in SAP Labs, Bangalore
- Thorough knowledge and understanding the Access Control application
- Having experience on Rule Building and Validation Confidential Analysis, Confidential Analysis Framework, Confidential Remediation, Mitigation, Workflow approval set up, Continuous Compliance, Super User Privilege Management (Firefighter ID) and
TECHNICAL SKILLS:
SAP: Confidential 5.3, 10.0, 10.1, R/3 Security, BI, CRM, Visual Admin and Vendavo Confidential 10.0
Tools: Peregrine, HPOV, SM7, Remedy Tool, ICM, Solution Manager and Vendavo
PROFESSIONAL EXPERIENCE:
Confidential
SME Consultant
Environment: 10.1
Responsibilities:
- Planned for design and deployment strategies for Confidential 10.1 project
- Conducting weekly gateway meetings and presenting the status of Project details
- Leading the project and updating status of project to Confidential and client management
- Collecting initial requirements as per their existing landscape
- Designed and Presented Confidential 10.1 features & scope of ARM, ARA, BRM and EAM
- Designed project plan for Confidential 10.1 modules ARM, BRM, UAR & SPM
- Analyzed and prepared documentation for customizable activities and estimated number of Man-days from Design phase to deployment and PGLS support
- Designed, developed logic and configured Confidential workflows for ARM, EAM & UAR
- Created and developed required logic for Confidential workflows in BRF plus tool
- Coordination of Confidential TIM team for setting up master d Confidential source
- Successfully configured LDAP connectivity for Confidential system as Primary master d Confidential with coordination of basis team
- Involving Confidential TIM team to integrate Confidential system with TIM system
- Developed and configured required notification mails contents for ARM & BRM modules
- Designed and configured workflows for UAR
- Performed Unit test and Integration test and supporting for UAT issues.
- Configured LDAP groups provisioning in LDAP system by mapping ECC roles
- Prepared the documentation & presented to client on newly configured modules
- Preparation of documentation and providing to client management
- Successfully moved the changes to Production environment for Go-live
Confidential
Module Lead
Environment: 10.0
Responsibilities:
- End to End Confidential 10.0 Implementation for SAP and Non SAP systems.
- Gathering the initial requirements as per the existing business process
- Preparation of the strategic plan for executing Confidential Project
- Designed and presented workflows details to client
- Setting up weekly meetings with business team for their requirements
- Analysis of the impacts of new Confidential tool for current process
- Preparation of the TDD and MoG (Maintenance of the Guide) documents
- Getting the signoff mail from client for TDD and MoG
- Getting the Signoff mail for UAT and Technical go-live
- Designed new workflows as per the client requirement and configured
- Customized ARM request as per the client requirement by using SE80
- Configured and implemented for Non SAP systems by using FLAT files
- Customization of notifications mails
- Confidential and BRF plus customization
- Defined scripts for UAT and same executed in DEV and QA
- Successfully gone for the Live without any major issues
Confidential
Analyst and Developer
Environment: 10.1
Responsibilities:
- Mainly involving in enhancements of Confidential workflows with new requirements
- Configuration activities for new SAP system and supporting to end user issues
- Root cause analysis for Confidential and BRF plus workflow issues
- Defining new workflows in Confidential and updating BRF plus with new logic for new requirements
- Design and develop new logics for new systems
Confidential
Team Lead
Environment: 10.0 & 5.3
Responsibilities:
- Workflows configured in Confidential for New User, Change user, Firefighter Access with BRF+ Initiator Rule ID
- Creation of Connecters and Connector Groups for each backend system and
- Custom Agents rules, Initiator Rules Defined in BRF + and used in Confidential Workflow
- Mapping approvers in BRF+ Agent rule
- Custom Initiator Rule created in BRF plus for New user, Change User, Lock user and Firefighter Access
- Synchronization Jobs scheduled for Repository Object Sync, Authorization sync, users and Transactions
- Generated rules and rule IDs for Confidential Analysis
- Configured Access Control settings with required parameters
- Maintained auto provision settings globally
- Mass roles uploaded into Confidential system
- Confidential Workflow configured for new/change Functions & Risks
- Mapping Roles and approvers to Functional Area in BRF plus tool
- Transporting Functional area and approvers list from BRF Plus tool
- Creating Functional Area and Business Process as per the requirement.
- Applying Mitigation Controls at role and user level.
- Applying Mass Mitigation Controls by using download and upload programs
- Creating New Mitigation controls and Administrators and mapping the same.
- Weekly SoD review at role level and User level
- Analyzing the Custom transaction codes and updating the Confidential Ruleset if risks are exist in the base transaction code.
- Giving Security Clearance for Custom Transaction by following FS and TS docs
- Knowing the functionality of the custom transaction from Functional & technical team
- Ruleset updation post giving security clearance of new custom T-code
- Resolving Confidential 10 support issues
- Creating new mitigation controls for newly identified risks
- Adding Approver and Monitors to existing Business Units
- Adding new approvers & Monitors to existing Mitigation Controls and deleting old approvers
- Modifying functions with custom T-codes
- SOD report - report on mitigated and unmitigated risks with information about critical risks
- Involving Global Confidential UAT and Change Impact Analysis
- Persona Admin support: Adding flavors & groups to end users
- Providing to Business user on Confidential 10 requests
- Taking care of escalations by attending the client calls
- Reporting weekly, monthly and annually tickets updates
- Taking care of SLAs for agreed tool ticket
Confidential
Responsibilities:
- Prepared strategic plan and executed the project
- Conducted project phase gateway meetings
- Gathering the requirements for project execution at preparation phase
- Conducting the meetings with all stakeholders for at Preparation phase, Feasibility phase and UAT
- Analyzed the impacts of up gradation with all stakeholder
- Activated Confidential & GRAC BC Sets and Services in SICF
- Plug-Ins installed in ERP system with require patches
- Installed Confidential 10.0 Add-on GRCFND A Component with patches
- Performed post & pre installation steps for ARA, ARM. EAM and BRM
- Created Connectors and Connector Types for back end systems and also defined subsequent connectors
- Maintained Connectors with Integrated Scenarios
- Workflows configured in Confidential for New User, Change user, Firefighter Access with BRF+ Initiator Rule ID
- Custom Agents rules, Initiator Rules Defined in BRF + and used in Confidential Workflow
- Mapping approvers in BRF+ Agent rule
- Custom Initiator Rule created in BRF plus for New user, Change User, Lock user and Firefighter Access
- Synchronization Jobs scheduled for Repository Object Sync, Authorization sync, users and Transactions
- Generated rules and rule IDs for Confidential Analysis
- Configured Access Control settings with required parameters
- Maintained auto provision settings globally
- Mass roles uploaded into Confidential system
- Confidential Workflow configured for new/change Functions & Risks
- Confidential Workflow configured for Mitigation Control creation and assignment
- Maintained Confidential Workflows for Agents, Rules and Paths
- Number Ranges defined for Access Request
- Applied Snotes when we got an errors for new Function approve
- Created new mitigation controls and mapped the owners and monitors
- Created root organization and maintained with mitigation controls
- Assigned Mitigation controls for Identified Risks
- Centrally Configured Fire Fighter IDs and created control owners in Access Control
- FF ID, FF Monitor, Confidential approver, Mitigation Monitors owners created in Access Control
- BRM role methodology and process configured for Single and Derived Roles
- Defined BRF plus rule for role methodology and assigned Condition Groups
- Condition Group Types assigned to BRF plus Application and Functions
Confidential
Environment: SAP R/3 Release 4.7, ECC 6.0
Responsibilities:
- User administration: User Creating, modifying, password resetting, locking and unlocking.
- Creating authorization groups and maintenance of the table authorizations
- Roles Maintenance, Roles Uploads & Downloads
- Mass Transports & Deletion of Roles
Confidential
Environment: SAP R/3 Release 4.7, ECC 5, ECC 6.0, Confidential 5.3, CRM & BI 7.0
Responsibilities:
- Involved in the Confidential 5.3 CUP, RAR and SPM Implementation & Configuration tasks.
- Created FF users for SPM and converted them into FF IDs.
- Uploaded UME roles like CC, AE & RE UME ROLES.txt files in RAR.
- Created AC Administration user in UME D Confidential base with AEADMIN, READMIN & Confidential CC ADMINISTRATOR roles
- As per document, created JCo connections and Technical system for target systems
- Created Logical Systems and Assign System Connectors
- Downloaded Static Text from R/3 system by using report / Confidential /ZCC DOWNLOAD DESC and uploaded to Confidential system
- Downloaded SU24 d Confidential from R/3 system and uploaded to Confidential system by using report / Confidential /ZCC DOWNLOAD SAPOBJ
- Uploaded SAP delivered Rule files to Confidential system
- Configured Organization Rules for new company code in RAR
- Uploaded 3 initial d Confidential (XML) files into CUP
- Connecters Creating and testing
- Created System connectors for User D Confidential Source
- Configured CUP for the workflow with creation of Initiators, Stages and Path
- Configured Custom Approver Determinator (CAD) for SPM
- Maintained Number ranges in CUP
- Created new mass & single roles in CUP with primary and back up approvers
- Created Firefighter ID’s and assigned approvers as owners for execution in production level.
- Creation of new Mitigation controls and business units.
- Creation of the Monitors and Approver for Mitigation Controls
- Adding Approver and Monitors to existing Business Units
- Adding new approvers & Monitors to existing Mitigation Controls and deleting old approvers
Confidential
Responsibilities:
- User administration: Creating, modifying, password resetting, locking and unlocking.
- Role creation, modification and role transports
- Ensure segregation of duties (SoD) exists in the SAP system using Confidential systems VRAT tool
- Extending FF IDs and maintenance of FF IDs
- Giving Fire call access through Firefighter tool and extending fire call access
- Checking missing authorizations by using SU53
- Resolved incident and new hire tickets
- Creating new roles according to business requirements subjective approval.
- Creating and transporting roles to destination systems
- Creating authorization groups and maintains the table authorizations.
- Applying S-Notes with instructions.
- Monitoring background jobs and system logs
- Transporting roles to destination systems
- Creating authorization groups and maintain the table authorizations
- Restricting and providing table level access by using Authorization groups
Confidential
Windows Administrator
Responsibilities:
- Installation of Windows 2000/2003 Servers and XP
- Creating and administering users and giving permissions
- Creating and modifying of MS SQL d Confidential bases
- Maintaining particular d Confidential base backups and restores
- Installation of Antivirus copy on servers and clients
- Installation of patches and service packs for OS
- Installation and Troubleshooting of Operating System, and Printers
- Installed and configured IIS server
- Applied windows service packs on XP
- Installed HR Payroll software for HR department