We provide IT Staff Augmentation Services!

Sap Security Architect Resume

3.00/5 (Submit Your Rating)

PROFILE:

  • Results - oriented IT Specialist with Bachelor’s Degree in Information Technology and over 11 years of advanced IT experience in SAP Security, IT Controls, IT Auditing, System Administration, and Project Management.
  • Personal skills include: Team building, multi-tasking, verbal and written communication skills.
  • Design, implement, and support business process / IT controls in an SAP environment, including new implementations, control redesigns, or assessment of a client’s SAP Control environment.
  • Experience in implementing security for SAP Fiori apps using Catalogs and Groups.
  • Basic knowledge on Catalog, Group creation from Fiori Launchpad.
  • Information Life cycle management security implementation to meet the GDPR requirements.
  • Experience in designing business aligned role-based security in compliance with best practices with SAP systems using profile generator (PFCG).
  • Designed, developed and implemented security roles for ECC (SD, FI, CO, MM, and WM), BI, SCM, SRM and Portal.
  • Recognized for reliability and getting the Job done through persistence and strong work ethic.
  • Experience includes Authorization Issues troubleshooting, user administration, password management, authorization profiles internal auditing to ensure that all companies are followed.
  • Have been appreciated for innovative thinking and automate manual tasks.
  • A motivated individual and a quick learner, committed to teamwork, multicultural experience.
  • Able to communicate clearly and honestly with clients, peers and managers.
  • An analytical mind with the ability to think clearly and logically and pay attention to details.

SKILLS & EXPERIENCE:

  • SAP Security and Implementation
  • BI Security
  • BW/4 Hana
  • FIORI security
  • IDM support
  • E - sourcing and CMAT security
  • GRC Applications Support
  • Project Management

PROFESSIONAL EXPERIENCE:

Confidential

SAP Security Architect

Responsibilities:

  • Worked on a Greenfield implementation of security design template for BW/4 Hana.
  • With the help of development team created a custom program (similar to standard) that helps generation of Analytic privileges and replicate DBMS as per clients needs.
  • Automated creation of BI analysis authorization.
  • Designed Fiori security roles.
  • Configured Fiori apps and build security roles for various apps to be used by the client.
  • Providing expertise and guidance to security build team on security role creation to ensure compliance with sap security design standard to align with best practices.
  • Primary IDM support to raise SARs, provide Grace periods, forward approvals, creating privileges and parent roles.
  • Designing E-sourcing and CMAT security roles and user administration.
  • Designed the ECC archiving security roles.
  • Single handedly remediated roles to avoid the RFC risk for the client.
  • Information life cycle management security implementation to meet the GDPR requirements.
  • Analyzing and evaluating the technical security requirements for SAP R/3 Security
  • Performing troubleshooting for existing user roles, security objects and authorizations to resolve security conflicts, supporting users, setting up new accounts, password resets
  • Worked on SAP Check Indicator Defaults, Field values, and maintained check indicators for Transaction codes using (SU24).
  • Extensively used Profile Generator (PFCG) to create single roles and derived roles/profiles.
  • Extensively worked on Authorization objects, fields, authorizations, and authorization profiles.
  • Troubleshoot security/authorization related problems using user information system (SUIM) and Display Authorization Data (SU53).
  • Used System Trace (ST01 and STAUTHTRACE) to record authorization checks in different sessions
  • Used Transport Management System (STMS, SCC1, and SE10) to perform transports between clients within R/3 system
  • Preparing reports for Security Audits
  • Knowledge transfer to the team members, including off-shore resources.
  • Prepare technical documents for team.
  • Interact with client to define Security process and the improvement plan.
  • Maintain and design Security process related documents.
  • Develop innovative ideas for automating processes and tasks.

Confidential

SAP Security Consultant

Responsibilities:

  • Collaborated with the business to understand the security requirements and provide the solution
  • Worked extensively on TABLE/Program security
  • Worked on SAP Check Indicator Defaults, Field values, and maintained check indicators for Transaction codes using (SU24)
  • Created single roles and derived roles/profiles by extensively using Profile Generator (PFCG)
  • Extensively worked on Authorization objects, fields, authorizations, and authorization profiles
  • Assessed and reviewed the use of the authorization object S TABU DIS and the table authorization classes (TDDAT) to determine whether all system tables are assigned an appropriate authorization class related to their job
  • Troubleshoot security/authorization related problems using user information system(SUIM) and Display Authorization Data (SU53)
  • Used System Trace to record authorization checks in different sessions
  • Used Transport Management System(STMS, SCC1, and SE10) to perform transports between clients within R/3 system
  • Re-designed roles to address business needs
  • Preparing reports for Security Audits - Worked closely with the Auditors to provide audit data and provide a remediation plan.
  • Activated the Audit filters across the landscape
  • Collaborated with HR functional consultant to define HR positions in the system
  • Mapped the roles and positions in SAP system
  • Resolved HR security related issue
  • Worked extensively with objects P ORGIN and P ORGINCON
  • Automation of Mass Analysis Authorization Object creation
  • Analyze and Resolve BW related issues
  • Worked with the BI Architects to define the security approach
  • Created roles, user groups in BODS and assigned access within the groups

Confidential

SAP Security Consultant

Responsibilities:

  • Performed SAP Security assessment for ECC, BI, PI, CRM, SCM, Portal and FSCM for security-related processes. Presented security assessment results and recommendations to Security Management, Staff and external auditors, bringing awareness to current SAP Security risks. Developed strategy and implemented recommended security solutions, strengthening their current security strategy
  • Maintain / oversee enforcement of policies / procedures and associated plans for system security administration as well as user system access based upon these policies and procedures.
  • Collaborated with business analysts and ABAP developers gathering requirements to define authorizations, unit test roles, and to secure custom code by adding authorization checks to programs, ensuring proper functionality and adherence to security standards.
  • Planning, designing, and leading the implementation of security measures, methods and procedures for safeguarding the integrity of and access to SAP systems.
  • Implemented access control on security related tables (AGR, USR and Custom Tables) and sensitive authorization objects (S TABU DIS, S DEVELOP, etc.).
  • Utilized systems trace ST01 and failed authorization SU53 to identify and resolve authorization issues for end users.
  • Worked on SAP Check Indicator Defaults and Field values for the scope of Authorization checks using transaction SU24 check indicators for Transaction codes.
  • Developed Security roles using standard & custom security objects, authorization field groups, program authorization groups, and table authorization groups, using Profile Generator (PFCG) providing granularity required to protect access to critical business processes.
  • Provided support and education of SAP security solutions such as RSECNOTE tool for analyzing systems to determine which SAP Security Notes should be applied.
  • Developed BI security roles using analysis authorization (RSECADMIN) to maintain security for reporting users and troubleshooting the reporting problems.
  • Proposed an excellent SOD remediation plan to address the SOD conflicts both at user level and role level as determined by the management.
  • Worked with OSS (SAP Service Marketplace users’ registration, creating messages) to resolve issues related to SAP software.
  • Performed User Administration of all the systems in the SAP landscape with SU01, SU10 and ECATT.
  • Worked with ABAP developers to create custom Tcodes, authorization objects, authorizations groups to restrict the access for programs and table maintenance.
  • Created ECATT scripts to create user ids, derived roles, populate organizational fields, and delete roles massively and to assign and inactivate user’s passwords.

Confidential

SAP Security Consultant

Responsibilities:

  • Participated in on-call support on a weekly rotation within the team
  • Provided excellent communic ation and customer service to the business and end users
  • Performed user provisioning, role maintenanc e, role administration, and security reports/analysis
  • Worked closely with role owners and role approvers to analyze and determine the most appropriate and efficient way to deliver authorizations to end-users.
  • Used SUIM reports and SE16 security tables daily for role/user information/analysis
  • Received very good exposure on Authorizations and Authorization concept.
  • Upload and download roles and copy role
  • Generating the mass profiles for roles using SUPC.
  • Created roles through PFCG in PP, MM, WM, PP and transporting themto QA for testing and then to production.
  • Performed Mass comparison of roles via PFUD
  • Troubleshooting - Identifying the missing authorizations using SU53, ST01 trace and maintaining themin suitable role.
  • Analyze and troubleshoot security issues using SU53, ST01 and SUIM
  • Secured table access by using the authorization object S TABU NAM.
  • Combined two and more tables using SQVI
  • Worked with security related tables such as AGR TCODES, AGR USERS and AGR DEFINE

We'd love your feedback!