We provide IT Staff Augmentation Services!

Sap Security And Grc Consultant Resume

2.00/5 (Submit Your Rating)

SUMMARY:

  • Confidential is a self - starting and motivated IT professional who can deliver results with minimal supervision.
  • He is a team player and team builder due to his keen listening ability. He has over 7.5 years of IT experience with 5 years of experience in SAP Security and GRC implementation and support. He understands business processes and technical applications and can communicate effectively with the technical teams and the business process owners and various levels of decision makers.
  • Confidential is proficient in requirement gathering, Process design, Configuration, Testing, Training and supporting SAP Security and GRC- Access Control in Access Risk Analysis (ARA), Access Risk Management (ARM), Business Role Management (BRM) and Emergency Access Management (EAM).
  • He has Full cycle implementations Experience in SAP Security and GRC.

TECHNICAL SKILLS HIGHLIGHTS:

Tools: SAP R/3.SAP FIORI /S4 HANA FIORI/ ECC 6.0, / GRC AC 10.xAccess Control and MS Office (Word, Excel, PowerPoint, Outlook, Visio, Project)

Operating Systems: UNIX, MS Windows NT

Methodologies: ASAP Methodology, SDLC, Halo Hall Modified Methodology

PROFESSIONAL EXPERIENCE:

Confidential

SAP Security and GRC Consultant

Responsibilities:

  • Perform all aspects of SAP security implementation tasks which includes but not limited to coordinating and interacting with business leads and process owners, technical and functional SMEs, Internal Audit and Security Admins for the sole purpose of gathering SAP Security requirements.
  • Design/develop custom SAP roles, performed the security unit and integration testing, transport custom roles to approved landscapes for user testing, setup security system parameters, and generating analysis reports.
  • Trouble shoot authorization errors using SU53, SU56, SU24, ST01, SUIM and proffered timely resolutions.
  • Create a functional and technical design document to ensure role-building follows business and risks and controls requirement set forth by the internal control teams and obtain functional design signoff prior to build.
  • Configure various types of role such as Single and Master Roles, Composite Roles and Derived roles using the Profile Generator (PFCG).
  • Implement the SAP GRC AC ARA to ensure segregation of duties (SOD) exists and Sensitive Access in the SAP systems are enforced.
  • Configured ARA for continuous monitoring, risk detection, and assisted process owners in a mitigation and/or remediation of identified risks
  • Performs user provisioning activities which includes, setting up a new account, password resets, assigning users to appropriate groups and assigning security roles according to employee/contractor approved positions.
  • Leverage System trace to record authorization checks in different sessions.ST01, STAUTHTRACE
  • Design, develop and Activation of Rule Sets, created custom rulesets and updated the functions grouping with custom transactions as required.
  • Perform Role and User Level analysis for sensitive access and SOD worked with Role owner and process owners to address risk and assisted with outright remediation, and/or mitigation.
  • Provide technical support for any GRC production related issues.
  • Daily monitoring of GRC systems which includes monitoring of Batch Risk analysis
  • Perform Firefighter ID Provisioning Tasks and Troubleshoot any issues relating to Firefighters or IDs and GRC in general.
  • Monitor SAP GRC systems and troubleshoot the issues and report to the management on a timely basis.
  • Performed GRC AC post installation activities and implementation
  • Configure the MSMP workflow settings based on client’s requirement.
  • Review and act on daily monitoring/change reports. and perform regular system audits to detect deviations of established procedures, role mapping, and unauthorized changes to the SAP security and report finding to management.
  • Provide knowledge transfer and train the trainer exercise to client personnel on security authorization concept and security design/implementation.
  • Worked with offshore team, led and provide daily tasks, provided knowledge transfer (KT) and training to offshore resources for the entire security design/development and managed services and review the delivered work and deliverables.
  • Perform daily monitoring of scheduled jobs related to security and compliance activities and associated system administration tasks.
  • Involved in all clients’ environments (Development, Test/UAT and Production) and provided best practice for change management and SoD rule promotion in respective instances.
  • Prepare all applicable deliverables such requirement document, setup/configuration documents and weekly status reports.
  • Communicate with clients of all levels
  • Worked on creating Roles using S/4 Hana Fiori Security

Confidential

SAP Security Analyst

Responsibilities:

  • Involved in set up of the scope of engagement- Documenting the Statement of work (SOW) -Creating Single, Derived, Composite roles in Dev and Quality landscapes.
  • Hosting workshops with Business process owners/Module owners, Security, Internal Audit and SMEs to gather requirements (As-Is > To-Be).
  • Participated in the planning phased, security was implemented in DEV, SIT, and QUA landscapes with client taking ownership of PROD.
  • Designed, authored and implemented security related standard procedures for the user administration, roles and profile generation
  • Elicit security info such Naming convention, Derived role iterations, SOD i.e. number of Orgs, Field specific actions to create Functional design document (FDD), Create the Technical design document (TDD)
  • Secure the approvals for the FDD and TDD documents from designated stakeholders to avoid project creep.
  • Worked with the Business Process Owners to restrict sensitive transactions and security authorizations and ensured segregation of duties across business areas.
  • Created segregation of duties
  • Built security requirements and carried a unit test in Dev environment (Built roles using PFCG)
  • Migrated roles from Dev environment to SIT using TR request.
  • Work with SMEs to perform integration testing -SIT and fixed logged issues in the ticketing system (Remedy)
  • Performed troubleshooting on issues using SU56, SU53, SU24, SUIM, ST01, SE16N
  • Updated FDD and TDD based on the changes at the end issue resolution
  • Prepared the environment for UAT-Migrating roles from SIT to UAT, Map roles to UAT users who tested and logged security issues and signed off after all issues were resolved. Secured Go-Live decision/Sign off from Mgt.
  • Performed cutover tasks- Migrate roles to Production (Transport by BASIS team), Assign users the roles.
  • Performed production support by troubleshooting and resolving the user logged issues (In remedy).
  • Report generation at the time of auditing based on business requirement by using SUIM
  • Worked on authorization groups and tables trace from applications technical data and SE16N.
  • Worked on Table restrictions via Authorization Group Confidential

Confidential

Technical Solution Consultant

Responsibilities:

  • Demo2Win -live demonstration of Confidential solutions on premise solutions that meet the documented pain and needs of the customer
  • Supporting of all RFI\RFP needs to include Q&A assistance as well as a preliminary in depth discovery to qualify fit and acceptance of a response
  • Progressive work experience with Session Initiation Protocol (SIP), Real-Time Transport Protocol (RTP) including
  • G.711 and G.729 codecs, Digital Tone Multi Frequency (DTMF)
  • Consulting on contact center software business management best practices, data integration and optimization
  • Responsibilities include consulting, preparation, execution. In many instances this also includes assistance and follow-up with the presentation of results via on-site demonstrations or Goto meeting
  • Post demo support for all technical questions that occur before the Negotiate stage of an opportunity to typically answer questions involving integration and minimum hardware and software specifications.

We'd love your feedback!