We provide IT Staff Augmentation Services!

Sap Security & Hana Consultant Resume

New, JerseY

SUMMARY:

  • Confidential is a SAP Certified Security/ GRC Consultant with extensive experience in maintaining authorizations of different SAP Components which include ECC 6.0, BI 7.0, HANA 1.0, BOBJ 4.0, HCM, APO/SCM, and SRM, CRM 7.0, GRC 10.1(Access Control),Solution Manager and implementation of Central User Administration.
  • Above 11years of SAP Security Authorizations Experience including Net weaver 07 Products in North America.
  • Implemented 4 Full life cycle SAP implementations to ECC 6.0 (FI,SD, MM, HR) and BI 7.0, HANA 1.0, HCM, CRM 7.0 - IC Web Client UI and implemented 2 GRC Full life cycle implementations
  • Implemented All 4 modules ( ARA, ARM, BRM and EAM) end to end Configuration, testing, trouble shooting and maintenance
  • Worked with HANA/Business team to gather the business requirements, created the Analytic privileges, administered the users by Creating and assigning the Roles/Privileges through HANA Studio
  • Implemented Security related to Finance, Sales, Payroll and Material Management Areas by creating Master/ Derive Roles.
  • HR Security: Created Roles as per job roles and assigned the roles to their position by using T-code PP02 and PO13. Created Communication info type 105 (attached SAP User id with Personal number) so that users can inherit the roles automatically after they login into SAP.
  • Designed Business Roles by working closely with Functional Team and Created respective PFCG roles to provide access to logical links of work centers in Business Roles, Assigned Business roles to the Business Users in the Organization Structure, Created Business Partner and associated them with user (employee)
  • Assigned Portal roles corresponding to backend roles to user view and use in the portal, Created portal roles using portal content which allow access to Iviews in Portal and Mapped the backend roles of ECC 6.0, BI 7.0 roles to Portal groups and assigned portal groups to users using User Management Engine.
  • Configured Roles related to different projects and worked as team member to support CHARM.
  • Expertise in Role-based Security (design and maintenance), Solution Manager, BI Security, Portal Security / User management, CTS, Single Sign On
  • Analytical and creative problem solving capabilities in all SAP environments.
  • Expert in resolving R/3, BI, CRM, HR and portal security Authorization issues and trouble shooting.
  • Have adequate knowledge of SAP compliant identity management for user provisioning and Roles provisioning automatically through HR Org structure.
  • Implemented security, implementation methodologies, IT governance, IT processes and IT procedures for various clients
  • Applicable laws and regulations as they relate to security.

TECHNOLOGIES:

SAP COMPONENTS AND RELEASES: SAP R/3 (4.6B, 4.6C, 4.7EE, ECC 5.0 ECC 6.0 Web AS 6.20,6.40.7.0), APO3.5, SRM 5.0/7.0, BOBJ 4.0,CRM 4.0,5.0,7.0, SCM 7.0 SOLUTION MANAGER 3.2- 4.0 / 7.0

NETWEAVER COMPONENTS: ENTERPRISE PORTAL 5.0 -6.0.7.0 BI 7.0,XI, ADD-ON’s GRC 10.0/5.3, VIRSA 4.0

PROFESSIONAL EXPERIENCE:

Confidential, New Jersey

SAP Security & HANA Consultant

Responsibilities:

  • Security Design in a Global implementation of SAP Business Suite on HANA from project preparation phase through go-live in multiple geographies comprising of Contract to Cash, Finance and SCM modules
  • Created Analytic privileges, Users using HANA Studio
  • Created various roles for Business folks, Sustainment team members using HANA Studio and assigned various privileges such System, Object, Analytical and restricted the data very low level on various data models in SAP HANA.
  • Worked with basis folks to Configure HANA for Single Sign on to login through BOBJ System
  • Worked with HANA Functional team and business members to get the requirements related to privileges and incorporated the privileges using HANA Studio.
  • Integrated SAP HANA with SAP BOBJ for SSO
  • Worked on CMC Console in BOBJ to create custom Access levels, Groups and mapped the users to Groups.
  • Restricted Data very low level in BI system by creating Analysis Authorization objects and performed Authorization relevant for required info objects while setting up Analysis Authorization objects
  • Working on GRC 10.1 Access Control ( ARA, ARM, EAM and BRM)
  • Conducted workshops with the Business process owners to gather the requirements related to Rule sets, Created Mitigation controls by classing mitigation monitors and Mitigation Control id owners.
  • Configured Business process design, performed RICEFW Functional Design and performed end to end for Business users
  • Configured Access Risk Analysis module by Creating Connector, setting up Connector type, updating Global Rule sets, Updating Repository Sync (User, Role and Profile).
  • Created Mitigation Controls as per required by Business process and evaluated strategy to remediate and if in case remediate not possible worked closely with Business folks to Develop Mitigation Controls .
  • Configured MSMP ( Multi Stage Multi path workflows ) as per Business requirements
  • Configured BRF+ Rules as per Business requirements
  • Performed workshops with Business users to make them understand how to get more benefits from GRC and let them know End to End GRC Functionality and gathered the required data from business users
  • Created Custom Rule sets by coping Standard GRC Rule sets and adjusted Custom rule sets as per Business needs and Generated Rule sets
  • Worked on ARA Configuration, Creating Connectors, Activating BC Sets, Identifying Risk/ Mitigation owners and monitors and incorporated them into ARA
  • Expert in Configuring EAM and configured Fire Fighter id's, Fire Fighter owners and Fire Fighter Controllers .
  • Provided Emergency Access to Business users /Sustainment team on demand basis after getting appropriate approvals from management.
  • Analyze existing Roles/Authorizations and redesign the roles by working closely with the Functional team/Business process owners to gather the requirements, Configured the Roles/Security and Supported the project after go live. Worked with Auditors to make sure no SOX Issues arise in the roles and designed the job specific roles to business users.
  • Created Analysis Authorization objects in SAP BI 7.2
  • Created custom Access levels in SAP BOBJ 4.0
  • Worked closely with the Business users to resolve Authorization issues
  • Analyzed the Authorization issues by Activating the Trace and SU53 Dump and resolved user access issues.
  • Created Users (Production and Non Production environment) and provided appropriate access to Business users after getting proper approvals. Updated Roles ( Single, Master and Derive ) as per Role Matrix, Worked closely with the Business process owners / Role owners to make sure roles Tested properly before Transporting to production

Confidential

SAP Security Consultant

Responsibilities:

  • Configured BC Sets, Global Parameters, Created Connector and associated with Connector type, Generated Rule Sets as per Business process for ARA
  • Configured Mitigation Controls, Mitigation Monitors, sync the jobs related to Auth, users and profiles from Backend systems to GRC and Configured end to end Risk Analysis for Business users in ARA.
  • Created Custom Rule sets after discussing with Key Stake holders as per there business process.
  • Configured Risk Analysis and Remediation by working closely with business folks after identifying Role owners, Mitigation Controls Monitors and Mitigation Control owners for ARA
  • Configured Emergency Access Management ( EAM) for Sustainment team by working closely with business folks to identify Role Owners, Fire Fighter ID Controllers, owners and monitors and provided automated process for Sustainment team to get broader access in Emergency situation and sends reports automatically to process owners to review for audit purpose
  • Configured Emergency Access Management by working closely with Business users and Functional team. Created Fire Fighter user id’s after identifying Fire fighter owners and Fire Fighter Controllers
  • Configured Access Request Management (ARM) for automated user provisioning and Configured MSMP
  • Created analysis authorization objects for authorization relevant characteristics and Key figures
  • Creating Portal roles for BI Portal (EP 7.0) to Publish Queries
  • Assigned Portal roles corresponding to backend roles to user view and use in the portal
  • Created portal roles using portal content which allow access to Iviews in Portal
  • Map the backend roles of ECC 6.0, BI 7.0 roles to Portal groups and assigned portal groups to users using User Management Engine.
  • Created backend roles in BI for BOE crystal reports to access data from SAP BI
  • Created roles for BI Data ware house objects and BI Reporting layer objects
  • Implemented BI security at Infoarea, Infocube, InfoObject, DSO’s, MultiProvider levels
  • Providing user administration support in all SAP systems, and daily processing of user requests and account maintenance by communicating with functional teams to facilitate the resolution of issues;
  • Responsible for security roles/profile maintenance and account creation and deletion by doing a roles assignment or by removing roles from an account in secure way in SAP;
  • Act as workflow engine to convert end user access requests into a list of roles in accordance with the security and segregation of duties (SOD) framework of all SAP environments;
  • Maintain, manage, and administrate the support of SAP Governance Risk and Compliance (GRC) Access control module 10.0 to manage role violations, role owners, and associated documentation;
  • Resolve end user production support security issues in a timely and accurate manner;
  • Monitor and self-assign incoming tickets related to security and user administration.
  • Monitor and self-assign incoming tickets related to security and user administration.
  • Creating new accounts for new hires and as requested
  • Delete accounts for terminations
  • Maintain Security roles as required to resolve authorization issueswith Central User Administration - CUA
  • Working with Emergency Access Management - EAM - (Firefighter) in a GRC 10.0 environment
  • Working with Access Risk Analysis - ARA in a GRC 10.0 environment

Confidential

SAP Security/ GRC Consultant

Responsibilities:

  • Implemented GRC 10.1 Access Control ( ARA, ARM, EAM and BRM)
  • Conducted workshops with the Business process owners to gather the requirements related to Rule sets, Created Mitigation controls by classing mitigation monitors and Mitigation Control id owners.
  • Configured Business process design, performed RICEFW Functional Design and performed end to end for Business users
  • Configured Access Risk Analysis module by Creating Connector, setting up Connector type, updating Global Rule sets, Updating Repository Sync (User, Role and Profile).
  • Created Mitigation Controls as per required by Business process and evaluated strategy to remediate and if in case remediate not possible worked closely with Business folks to Develop Mitigation Controls .
  • Configured MSMP ( Multi Stage Multi path workflows ) as per Business requirements
  • Configured BRF+ Rules as per Business requirements
  • Performed workshops with Business users to make them understand how to get more benefits from GRC and let them know End to End GRC Functionality and gathered the required data from business users
  • Created Custom Rule sets by coping Standard GRC Rule sets and adjusted Custom rule sets as per Business needs and Generated Rule sets
  • Worked on ARA Configuration, Creating Connectors, Activating BC Sets, Identifying Risk/ Mitigation owners and monitors and incorporated them into ARA
  • Expert in Configuring EAM and configured Fire Fighter id's, Fire Fighter owners and Fire Fighter Controllers .
  • Provided Emergency Access to Business users /Sustainment team on demand basis after getting appropriate approvals from management.
  • Configured ARM Module for various request types such as new / Change / Lock /Unlock and configured in GRC HR Triggers to automate provisioning of roles to positions based on Org Structure
  • Provided for Business users ( BPO Owners, Auditors, Risk owners and end users ) so that they can take appropriate action if they get any automated notifications from GRC or if any users request GRC Access or emergency Access
  • Performed the support of the project and worked closely with Client SAP Security resource to provide them required knowledge Transfer and Provided KT Documents
  • Expert in Creating Users like Requesters, coordinators, Role Approvers and Final approvers related to workflow of ARM for user provisioning in SAP Backend Systems
  • Security Design in a Global implementation of SAP Business Suite on HANA from project preparation phase through go-live in multiple geographies comprising of Contract to Cash, Finance and SCM modules
  • Created Analytic privileges, Users using HANA Studio
  • Created various roles for Business folks, Sustainment team members using HANA Studio and assigned various privileges such System, Object, Analytical and restricted the data very low level on various data models in SAP HANA.
  • Worked with basis folks to Configure HANA for Single Sign on to login through BOBJ System
  • Worked with HANA Functional team and business members to get the requirements related to privileges and incorporated the privileges using HANA Studio.
  • Integrated SAP HANA with SAP BOBJ for SSO
  • Worked on CMC Console in BOBJ to create custom Access levels, Groups and mapped the users to Groups.
  • Restricted Data very low level in BI system by creating Analysis Authorization objects and performed Authorization relevant for required info objects while setting up Analysis Authorization objects
  • Worked closely with the Business users to resolve Authorization issues
  • Analyzed the Authorization issues by Activating the Trace and SU53 Dump and resolved user access issues.
  • Created Users (Production and Non Production environment) and provided appropriate access to Business users after getting proper approvals. Updated Roles ( Single, Master and Derive ) as per Role Matrix, Worked closely with the Business process owners / Role owners to make sure roles Tested properly before Transporting to production

Confidential

SAP Security / GRC Consultant

Responsibilities:

  • Implemented GRC 10.1 Access Control ( ARA, ARM, EAM and BRM)
  • Conducted workshops with the Business process owners to gather the requirements related to Rule sets, Created Mitigation controls by classing mitigation monitors and Mitigation Control id owners.
  • Configured Business process design, performed RICEFW Functional Design and performed end to end for Business users
  • Configured Access Risk Analysis module by Creating Connector, setting up Connector type, updating Global Rule sets, Updating Repository Sync (User, Role and Profile).
  • Created Mitigation Controls as per required by Business process and evaluated strategy to remediate and if in case remediate not possible worked closely with Business folks to Develop Mitigation Controls .
  • Configured MSMP ( Multi Stage Multi path workflows ) as per Business requirements
  • Configured BRF+ Rules as per Business requirements
  • Performed workshops with Business users to make them understand how to get more benefits from GRC and let them know End to End GRC Functionality and gathered the required data from business users
  • Created Custom Rule sets by coping Standard GRC Rule sets and adjusted Custom rule sets as per Business needs and Generated Rule sets
  • Worked on ARA Configuration, Creating Connectors, Activating BC Sets, Identifying Risk/ Mitigation owners and monitors and incorporated them into ARA
  • Expert in Configuring EAM and configured Fire Fighter id's, Fire Fighter owners and Fire Fighter Controllers .
  • Provided Emergency Access to Business users /Sustainment team on demand basis after getting appropriate approvals from management.
  • Configured ARM Module for various request types such as new / Change / Lock /Unlock and configured in GRC HR Triggers to automate provisioning of roles to positions based on Org Structure
  • Provided for Business users ( BPO Owners, Auditors, Risk owners and end users ) so that they can take appropriate action if they get any automated notifications from GRC or if any users request GRC Access or emergency Access
  • Performed the support of the project and worked closely with Client SAP Security resource to provide them required knowledge Transfer and Provided KT Documents
  • Expert in Creating Users like Requesters, coordinators, Role Approvers and Final approvers related to workflow of ARM for user provisioning in SAP Backend Systems
  • Created Analytic privileges, Users using HANA Studio
  • Created Various roles for Business folks, Sustainment team members using HANA Studio
  • Worked with basis folks to Configure HANA for Single Sign on to login through BOBJ System
  • Worked with HANA Functional team and business members to get the requirements related to privileges and incorporated the privileges using HANA Studio.
  • Created Roles to restrict data by using RSECADMIN
  • Created Access levels in BOBJ as per Business needs and assigned to users
  • Created Analysis Auth objects and incorporated within the role to view restricted data
  • Created Analysis Auth objects in BI 7.0 and restricted Queries by Info object level
  • Created users in portal EP 7.0 and assigned Respective groups to them to login through portal and access various reports from ECC 6.0, BI 7.0 and CRM 7.0
  • Created Access levels in BOBJ and assigned to groups as per required by Business requirement.
  • Created user groups, assigned privileges and assign to users.
  • Creating SAP user ID's for testing, Resting password and other related tasks as assigned.
  • Helped Team for user licensing by assigning the users to proper licenses and run the USMM Report to send the report to SAP
  • Worked closely with the ABAP Team to make sure appropriate auth checks takes places within the program for Custom T-codes
  • Provided SAP security analyst support related to the operations of the Confidential
  • Created New roles and changes to existing roles
  • Process related SAP New/Change/Delete user access change requests from the various departments
  • Complete additional security tasks which may include troubleshoot SAP user's Security issues and Analysis of missing / required SAP authorizations working with helpdesk support staff and SAP configuration analysis regarding issues / Problems, Assist departments with processes
  • Updated SU24 for required T-codes and performed the Impact Analysis before updating new Auth objects to Auth check/Proposal for required T-codes
  • Performed Trace and analyzed SU53 dump from Business/Functional team to resolve Authorization issues
  • Created portal users and assigned appropriate roles in UME and assigned required backend roles

Confidential

Research and Development

Responsibilities:

  • Designed Security Framework for controlling access within each application of Confidential Financial Suite
  • Controlled the Rights of all individual users such as who can view, edit or delete records throughout all the different functional areas and process in these applications
  • Created unit tests for core products and worked as team member to accomplish daily tasks and reported to Team lead regarding various issues and provided solution to many issues.
  • Worked on development of .NET VB SQL Products and provided necessary hardware support to clients on adhoc basis.

Confidential, Syracuse, NY

Lead SAPSECURITY /HANA Consultant

Responsibilities:

  • Implemented GRC 10.0 Access Control (ARA, ARM, EAM, BRM)
  • Provided Fire Fighter Access to Business users in Emergency after getting proper approvals
  • Sync the Roles, Users and authorization objects from ECC to GRC
  • Setup the RFC Connections from GRC to ECC Systems
  • Configured ARA by Activating required BC Sets, Configuring Global parameters, Created Connector and Connector Types, Activated SICF Services, uploaded Rule Sets, Generated Risk as per Rule sets, Configured Mitigated Controls and Monitor through NWB, Sync the Role, users and auth into SAP GRC from backend systems
  • Configured EAM (Emergency Access Management ) by Configuring FF ID’s, FF Roles, Assigning the FF ID Controls, Owners in the system to monitor the logs of FF ID’s as per required by Business process
  • Created Analytic privileges, Users using HANA Studio
  • Reviewed Existing HANA System, Users, Roles and redesigned the security strategy to develop appropriate Security for end Users based on their job positions
  • Created Various roles for Business folks, Sustainment team members using HANA Studio
  • Performed Single Sign On Activities for HANA System with Active Directory and BOBJ Systems.
  • Created Security Strategy document by working closely with the Business/ IT Security Analyst and resolved many Security Gaps within the organization
  • Worked with basis folks to Configure HANA for Single Sign on to login through BOBJ System
  • Worked with HANA Functional team and business members to get the requirements related to privileges and incorporated the privileges using HANA Studio.
  • Created analysis authorization objects for authorization relevant characteristics and Key figures related to Sales chain & Finance reports related to District Managers, Directors and VP
  • Created BI 7.0 Roles for Various Department and sync the roles/users with BOBJ 4.0
  • Restricted Access to users by Creating Access Levels, Groups, personal folders for various Department in BOBJ 4.0 and Assigned users into Group.
  • Configured users to login BOBJ 4.0 through SSO and run the reports in BOBJ 4.0 and replicate the data as per Roles in BI 7.0
  • Assigned Portal roles corresponding to backend roles to user view and use in the portal
  • Created portal roles using portal content which allow access to IView’s in Portal
  • Map the backend roles of ECC 6.0, BI 7.0 roles to Portal groups and assigned portal groups to users using User Management Engine.
  • Created backend roles for HR Employer self service ESS and Manager self serviceMSS
  • Gathered the security requirements for PFCG roles as per the business requirements
  • Assigned portal Roles for accessing ESS for employees, MSS for Managers in the EP 7.0
  • Created Roles for Payroll supervisor, Time admin and assigned the roles to the position
  • Created Communication info type for users to inherit the roles
  • Worked with Business owners to identify the issues related to payroll and time admin and updated the missing authorizations within the Role.
  • Worked closely with Business users to identity the new positions and assigned the roles the respective positions
  • Business Roles by working closely with Functional Team and Created respective PFCG roles to provide access to logical links of work centers in Business Roles.
  • Created PFCG roles for the Business Roles in CRM 7.0IC WebClient UI
  • Worked closely with the CRM Customizing team in creating the Business Roles
  • Traced and Resolved Authorization issues.
  • Created Roles in Solution Manager for different projects to view their specific projects
  • Worked on ITSD Project and created users to work with in ITSD to resolve daily tickets.
  • In ITSD, Created Business partner for each user and assigned the Business partner in org
  • Structure
  • Created Project in Solution Manager and uploaded documents related to various projects as per ASAP Methodologies
  • Worked with CHARM within the team to coordinate and move transports to production systems.

Confidential, SAN Antonio, TX

SAP Security / GRC Analyst

Responsibilities:

  • Developed reports for user access to sensitive info types for OM, PA, Compensation and Benefit roles
  • Worked as a BI-HR expert to redesign the global access
  • Created PD Profiles According to business requirements and assigned to users
  • Worked with HR Functional specialists to help them understand what SAP authorization objects are causing the conflicts and what all options exist for mitigating the conflicts
  • Configured Risk Analysis and Remediation in GRC 5.3 to update new risks for the rule set
  • Configured workflows in CUP (Compliance User provisioning) and automated User Provisioning related to different types of User requests (New Requests, Change Request, Delete Request, Lock and Unlock).
  • Recommend policy changes as per the Best Practices and Sox Compliance
  • Ensured no SOD’s existed at the role- and user- level
  • Implemented enhancement to secure FF ID’s
  • Designed the Security Structure for SAP BI 7.0
  • Created Analysis Authorization objects in BI 7.0 using RSECADMIN
  • Created analysis authorization objects using for authorization relevant characteristics and Key figures
  • Created custom access levels in SAP BOBJ 4.0 and integrated BOBJ Systems with BI
  • Created various groups in SAP BOBJ 4.0 and assigned various users into groups for reporting purpose
  • Designed and created portal roles in the EP6.0 and EP 7.0
  • Created PFCG roles for the Business Roles in CRM 7.0IC WebClient UI
  • Worked closely with the CRM Customizing team in creating the Business Roles
  • Traced and Resolved Authorization issues for BSP Applications in IC WebClient UI
  • Coordinated with the offshore teams and monitored the progress of the project
  • Managed and coordinated daily tasks with the global offshore Teams
  • Created and defined the deliverables for the Blue print phase
  • Communicated technical and non-technical issues to the client supervisors
  • Reviewed the custom code and closed the security GAP’s by comparing with the Tech specs
  • Experience in setting up users with AOD (Access on Demand) access.
  • Responsible to prepare the deliverables for the role redesign project
  • Develop and document policies to fill the GAP’s in the security architecture

Hire Now