We provide IT Staff Augmentation Services!

Grc & S4 Hana Security Consultant Resume

5.00/5 (Submit Your Rating)

Houston, TX

PROFESSIONAL SUMMARY:

  • Strong organizational and time management skills
  • Plan execute and Support SAP projects successfully
  • Excellent Knowledge of user Administration, Role Administration and Security Policies
  • Role creation single, composite. Master and derived according as per business requirement
  • Analysis of critical Authorization tables, missing Authorization objects, User Master Record reconciliation
  • Manage User Administration Utilizing SU01 and SU10 efficient usage of SE16, SUIM to retrieve data and SU24 to enable or disable security checks on audit and audit reports
  • Performed all Access Control Components ARA, EAM, BRM and EAM for both GRC 10X and 12
  • Access Risk Analysis (SOD/Remediation and Mitigation process. MSMP work flow configuration access request approval
  • Emergency Access Management creating FFID, Assigning FFID to controllers and Fire - Fighter users, Creating Reason codes
  • Worked on HR Function by setting up HR security using both General and Structural Authorizations in Payroll and ESS/MSS
  • Created authorize HANA Roles for Developer, Modelers, Data base Administrators and end users
  • Configure and Authenticate Hana Roles against front end reporting tool such as BOBJ with more SAP BW/HANA experience than SAP ECC Security

TECHNICAL SKILLS:

  • SAP ERP Skills SAP ECC 6.0, EHP8 SAP NetWeaver GUI 720,730, 750 SAP GRC 10X AND 12
  • Good Knowledge of Virtualization concept such as Virtual Box, VMware, VMware ESXI
  • Post SAP Installation Activities and GRC 12 Configuration
  • RFC Connections for SAP GRC Connectors for all satellite systems
  • Applying ADD-ONS and various SNOTES
  • Installation and Configuration of Linux SUSE 12 SP4 with S/4 HANA1809

PROFESSIONAL EXPERIENCE:

GRC & S4 Hana Security Consultant

Confidential, Houston, TX

Responsibilities:

  • SAP HANA Security activities like user management, Assigning Roles to user
  • Extract source system data using BODS and SLT. Data provisioning and replicating data from source to HANA
  • Worked on S/4 HANA Security and developed reports
  • Data Modeling in HANA Studio using Attribute, Analytical and calculation views
  • Evaluation and decision detailed presentation to compare and proposed HANA Scenario
  • Prepared business plans, project plans for system installation, configuration, planning and designing.
  • Manage entire project in timely manner to meet deadlines.
  • Lead team of six from forefront by evaluating the project scope and complexity, system strategies, software selection and successfully deliver the project with installation and configuration of the SAP systems.
  • Performed configuration settings for Access risk Analysis (ARA), Emergency Access management (EAM) and maintaining.
  • Scheduling back ground jobs for synchronizing authorization into Access control Repository and monitoring the jobs.
  • Performed user & Role analysis to find the existing SOD violation of users and roles.
  • Creating mitigation controls for customized risks as per business process owners and auditor’s suggestions, Assigning mitigation controls to users.
  • Creating fire fighter-id with Emergency access. Mapping firefighter-id’s to firefighters for a limited period of time with proper approvals.
  • Generated the MSMP workflow related business rules and defining the business rule framework by using BRF+ workbench. Customizing and maintain the MSMP workflows for Access control.
  • Maintaining access control owners and change the approvers when they leave the organization. Performed simulation for proactive SOD analysis.
  • Assist security team with role level risk analysis when needed related to creating/ updating and provisional roles including user access validations and identifying false positives.
  • Monitor of rule sets, maintain critical roles and profiles, creation of mitigation control and running ad hoc risk analysis reports.
  • Implementation of global SAP role structure, including standard business role, global process roles, derived roles and associated SAP security process.

GRC & Security Consultant

Confidential, Milwaukee, WI

Responsibilities:

  • User Access provisioning in independent R/3 system.
  • Managing user master record creating user, user groups and assigning authorization groups and roles
  • Mass user management using SU10 Role maintenance creating, changing and deleting
  • Creation and modification of different types of roles according to client request.
  • Transporting roles from development to quality to production.
  • Analysis of the users, profiles, roles, authorization, objects and change documents.
  • Worked with security related tables AGR* & USR*.
  • Authorization checks using transaction SU24 and maintained check indicators for transaction codes.
  • Firefighter role creation and assignment through SPM (super user privilege management) Map Firefighter ID’S to owners and controllers.
  • Troubleshooting User access through authorization error analysis via SU53, SU56 and system trace ST01.
  • Monitor and maintained user ID through user information system SUIM.
  • Finding Business related roles with the help of ECC roles for IDM users.
  • User master record creation and modification.
  • Assist on audit reports and logs using SM18, SM19, and SM20.

GRC & Security Consultant

Confidential, Cincinnati, OH

Responsibilities:

  • Ensure application security standards are well integrated into system by incorporating SOD testing into security process.
  • Monitors and maintains SAP application security policies, standards, guidelines, and procedures that are in alignment with the corporate strategic plan and supports the project team during the implementation.
  • Responsible for implementation and integration of SAP GRC-SOD and other post-go live sustainment tools.
  • Support and educate business areas on risks and proposed mitigating controls.
  • Understand compliance related issues as it relates to SAP roles.
  • Identify and evaluate business & technology risks. Raise risk awareness and made recommendations to mitigate these risks.
  • Update rule sets, mitigating controls and process flows.
  • Articulate security policies, procedures and guidelines to all levels.
  • Configured workflow, actions and rules.
  • Performed remediation and mitigation against various risks associated with roles and profiles.
  • Provided limited access to FF and FFID.

We'd love your feedback!