We provide IT Staff Augmentation Services!

Sap Security Resume

Anchorage, AK

Summary

  • Experienced technical and functional SAP Security Consultant specializing in SAP security
  • Global design and implementations with the next methodology:ASAP, SAP User - Centered Design (UCD), Centralized and De-Centralize Business Model, 3 Tier Approach Model, Position Based Model, Task Oriented Model, RBAC Model - IDM (SAP and none SAP Systems integrations), BW/HR Structural Authorizations Architectural Model
  • SAP securityglobal design and implementations, security strategies and policyfor:
  • SAP Portal (EP) UME, XI/PI, MDM, Global CUA build, Solution Manager, SRM,CRM 2007 (7.0, 7.1), ACE , Business Role (WEB UI), BI, BOBJ, SAP R3, Enterprise Portal, Global Trade Services, ERP, ECC, ESS/MSS, PSCD, HR, HCM, TREX, SCM, PS, APO, ERP, PLM, SCM, SAP Human Resource Management Systems (HRMS), MDM, MII, LPO, E -Sourcing, Portal (SRM, CRM, BI, MDM), GRC Access control, Process control and Risk control, Virsa, Virsa Compliance Calibrator, Virsa Firefighter, Access Enforcer, Role Expert, Risk Analysis and remediation (RAR) application, the Enterprise Role Management (ERM) application, the Super User Privilege Management (SPM) application, and the Compliant User Provisioning (CUP) application, Access Risk Analysis, Emergency Access, Business Role Management, Access Request Management
  • CRM2007, Access Control Engine (ACE), Business Roles (Web UI), Technical Roles (ABAP)
  • ACE General Parameters, Ace activation and Super Object Type set, Work Package Definition
  • Business Role (Web UI) - Creating Role Configuration Keys,Transaction Launcher, Menu Navigator, Logical Link for Transaction, Actors creation, Rules and Rights creation, ACE Design Report
  • Customer Relationship Management (CRM) includes the methodologies, strategies, software, and web-based capabilities that help an enterprise organize and manage customer relationships
  • Proposal preparation on client site with security analysis on real systems and real data
  • Proficient in use BI, BW Analysis Authorizations tools as ( RSECADMIN, RSD1, RSA1,RSRT)
  • Log changes to analysis authorizations and other authorization-related activities:RSUDOLOG, RSECVAL_CL, RSECHIE_CL, RSECUSERAUTH_CL, RSECTXT_CL, RSECTXT_CL
  • NetWeaver SAP Identity Manager (NWIM 7.0 and 7.1), TAM
  • Event-driven SAP ERP HCM integration with SAP IDM
  • Path work flow based on request type and user attributes
  • Position based Security via Indirect Org Assignments (infotype 0001)
  • Context Sensitive HR solution, Structural authorization (infotype 0017)
  • The HR: Master Data with Context authorization object (P_ORGINCON)
  • Extended integration with SAP\'s GRC solution (SAP Business Objects Access Control)
  • More then 8 years in Segregation of Duties and Audit Compliance Standards, Audit Compliance Standards
  • Participated actively with internal training/knowledge transfer to new security team members as well as project support team members. Security based on industry standards
  • Development of tailored security and controls techniques in conjunction with system upgrade (i.e. ERP) and the design or re-engineering of business processes (i.e. shared services environment)
  • SAP framework for SAP Global security upgrade
  • SAP Global security and authorization support, development and design

Professional Experience

Sub contractor
Confidential, FloridaJune 2012 to July 2012
SAP Security Consultant
HCM, BOBJ, BW , BW-BPS, SRM , ECC, PORTAL,
“Go life” and after ”Go Life” Support, BOBJ re-design,
Front End and Back End BOBJ integration

Confidential- Anchorage, AK February 2012 to April 2012
Principal Consultant - Sap Security

  • Municipality of Anchorage
  • HCM PROJECT
  • Structural Authorization, Indirect Assignment, Strategy, Policy
  • SRM, PORTAL, BI, ECC, HCM, ESS/MSS

Confidential – Multiple Projects September 2010 to February 2012
Managing Consultant - Application Architect SAP Security

Confidential- Global HCM Project
Lead of HCM Security ( 36 Countries)
ESS/MSS, Portal, Eureka, ECC, HCM, ESS/MSS, XI/PI
Global HCM Project in 36 countries

Confidential- Global Projects
Back Point 1, Back Point 2( 170 Countries)
ECC, HCM, SRM, CRM, EWM, WEB UI (Business role), BI, BI-BPS, Portal, ESS/MSS, XI/PI

Confidential – Transition Project
Lead of SAP Security
Global implementation (46 Countries)
HCM, ESS/MSS, R/3, GTS, APO, BW-BPS, BI, CRM, SNC, MDM, MII, LPO, ESourcing, Portal (SRM, CRM, BI, MDM), Solution Manager, GRC, SLD, Business Process Management (BPM)

Confidential – Development
Lead of SAP Security
Global implementation (36 Countries)
R/3, GTS, APO, BW, BI, CRM, SNC, MDM, Portal, HCM, ESS/MSS

Applied Materials -Total Upgrade, Security Lead (20+ Countries)
ECC, CRM, SRM, BI, GRC, GTS, Portal, XI/PI

Confidential
Projects Description/Scope:
Business Scenario Overview
Confidential will offer leasing in Canada for Cadillac and Buick vehicles. The program will be administered by FLinx. GM will provide risk sharing in the form of a first loss guarantee.
GM is implementing the VIN-by-VIN Revenue Recognition Accounting System in SAP-ECC6. Three GM scenarios will be included in Phase 1:

  • Collateralized Borrowing (CB) for GM US
  • Limited Risk Leasing (LRL) - specifically Canada Leasing - for GM CA
  • Multi-Element Arrangement (ME) for GM US and GM CA

Responsibilities/Deliverable/ Achievements:

  • ECC 6, BI,CRM, SolMan, SRM, BI_BPS, BOBJ,PORTAL, Ldap, Sun IDM, XI/PI
  • Sap Security Approach- high level design
  • R3 Security Strategy and Architecture
  • Portal Security Strategy
  • BI, CRM, SRM Security Strategy, HCM
  • Sap Security Integration
  • Business processes, data elements, documents and user position assignments
  • Portal, BI, CRM, R3 roles and integration
  • Testing, Cut Over and "Go life"

Confidential
Project is consolidating its extensive global collection of individual SAP applications and versions into a single global instance that will deliver greater resilience and flexibility to IBM\'s operations in 170 countries around the world

Responsibilities/Deliverable/ Achievements:

  • ECC 6, CRM2007, BI – Cognos, Portal
  • SAP Security Strategy and Architecture
  • BI Cognos Reconciliation
  • GRC reports and BI Cognos reconciliation
  • Internet Portal and BI Cognos integrations
  • Ldap Bi Cognos Groups and Roles
  • Integration with ECC6, CRM2007

Confidential May 2010 to September 2010
SAP Security Consultant
Sub-Contract with Canada Corp and CSI in Sap Security Field (Clearance)
Montreal, Canada
Project Description/Scope: Extended Warehouse Management (EWM)
Responsibilities/Deliverable/ Achievements:
Solution Manager, Remediation SOD (segregation of duties), Re-design roles, ERP, Approva BizRights

Confidential October 2009 to April 2010
Lead SAP SECURITY Consultant
Subcontractor from IBM ISM/MODIS

  • ECC 6, BI,CRM, Sol Man, SRM, PORTAL, Tivoli IDM
  • HCM Remediation Project
  • Roles and Infrastructure re-design
  • Migration from ECC 5 to ECC 6
  • BW 3.5 migration to BI 7.0
  • XI/PI

Responsibilities/Deliverable/ Achievements

  • Integration TIVOLI Identity Manager, UME and corporate LDAP
  • RBAC - Role Based Access Control Model development
  • Overview Role Based Access Control, Consideration of Role Based Access Control, The Role modeling challenge, Role Based Access Models Overview, Statement of the Problem
  • Access Control Principles, The Implementation and Conversion Program, Migration Plan
  • Implementing the Pilot Program, Role Based Access Control security AIX management overview,
  • RBAC in Oracle (RDMS), Role Based Access Model for SAP, Policy-Based Authorization
  • Business Processes, Business Policies, The RBAC pattern as an extension of the Authorization pattern,
  • Role-Based Access Control (RBAC) Pattern, Implementing and Modeling Roles in ITIM
  • Separation of Duty in Role Based Access Control System Pattern

Confidential April 2007 to April 2009
SAP SECURITY Consultant
Permanent
Industry: Multiple
Projects Description/Scope: Multiple/Security
Role: Team Lead (Security)
Competency Areas:

  • SSO-Concepts (Certificates, SAP Logon Tickets)
  • Kerberos and Public-Key Cryptography
  • Business Continuity Planning
  • Security Management Practice
  • Security Infrastructure Architecture
  • Compliance
  • Enterprise SOA Security in SAP Systems
  • Authorization groups functional tables, custom development authorization solutions
  • Implementing and reviewing SAP Authorization Concept
  • Integrating ABAP User-Management with Organizational Management
  • Central User Storage Techniques
  • Build Framework: Security Audit tools & Change Documents (SCDO)
  • Maxware, IDM and LDAP in a company environment
  • GRC Suite: Compliance Calibraitor.5.X, Role Expert, Virsa, Fire F, Maxware
  • SAP UME administration and J2EE roles
  • Handling PFCG (check indicators, SU24, transport & upload roles)
  • Configure and implement cryptographic technologies in SAP System

Responsibilities/Deliverables/ Achievements:

  • Upgrade ECC 5.0 to ECC 6.0
  • Security Policy and Strategy
  • BI 7.0 Strategy and Tactics, Analysis Authorization, BI-BPS, BOBJ
  • HLD for HR - BI Dynamic Authorization Model
  • Conversion from Structural Authorization to BI analysis authorization.
  • New GL (Security), ESS, MSS
  • CUA Landscape and Presentation
  • CUA creation, review, and recommendation
  • P_ADM_SEC _70 Security Course Development (Author)
  • GRC configuration and review
  • Authorization Concept Lead Consultant (SAP Resource Management @ Field Services) New SAP development
  • Security GTS 7.1 design and implementation (Global Trade Services)
  • Analysis Authorizations (BI) creation and implementation
  • PD profiles and BI structure security and authorization design
  • Structural authorization BI analysis and BI structure conversation
  • Upgrade to SAP R/3 Enterprise Release 4.70
  • Integration Analysis: IBM Tivoli Identity Manager ,LDAP, SAML, SAP UME, Internet Portal, Biller Direct
  • IBM Tivoli Access Management Integration
  • CRM2007 security and design
  • Dynamic CRM Authorization Model, ACE and business roles set up and IMG (SPRO) configuration
  • ACE, Web UI and ABAP roles integration from complete UCD (User Centered design SAP Methodology)
  • An Architectural View of SAP\'s Analytical CRM Capability
  • CRM integration with ERP, BI
  • SAP CRM module, SAP Biller Direct, SAP Exchange Interface ("PI/XI")
  • Flexible security framework that can be adapted to specific customer (business partners) needs

Confidential- Jacksonville, FL April 2006 to April 2007
Sr. SAP HR Security Consultant Duration: 13 months
Industry:Software Consulting Company, Government, Banking, Chemical, Retail, Pharmaceutical, Telecommunications, Manufacture
Project Description/Scope:SAP Global security and authorization support, development and design for
Share service (multiple projects).
Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SRM, BW, BI 7.0, Portal, XI, ESS/MSS, HCM
Operation System: Windows XP
Responsibilities/Deliverables: • Security based on industry standards

  • SAP framework for SAP HR Global security and authorization support and implementations.
  • Development of tailored security and controls techniques in conjunction with system implementations (i.e. ERP) and the design or re-engineering of business processes (i.e. shared services environment

Achievements

  • Completed SAP Global security and authorization (HR) support for 11 Global companies
  • Completed SAP Global implementation for leading global provider of electronics • manufacturing services (EMS) and integrated supply chain solutions

Confidential- Victoria, BC July 2005 to January 2006
Senior Security Consultant
Industry: Software ConsultingCompany, Public Sector, and Government
Project Description/Scope: SAP framework for security and authorization design for Public Sector.
Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SAP Biller Direct,
BW, Portal, XI, SAP FI, CO, MM, PP, SM, PSCD and others
Operation System: Windows XP
Project Development: ASAP/Value SAP, Security and Authorization
Responsibilities/Deliverables:

  • Role definition depends on HR positions
  • Conversion from "as is" to "to be" business processes
  • Assignment of Authorization Groups to Tables (TDDATA, VD_DATA)
  • Authorization groups and tables trace from applications
  • Access Control- Authorization Groups (SM30, TBRG table)
  • Role design "ABAP and JAVA" sites for XI
  • Security Strategy for web Methods Integration Platform
  • Role design, development and assignment (PFCG, SU01)
  • Authorization Groups-Report-types programs (SA38, SE38, AUTHORITY_CHECK)
  • Document Types in design and configuration processes (T003)
  • Check indicators (SU24, SU25, SE93, and SE97)
  • Authorization checks by assigning reports to authorization classes (RSCSAUTH)
  • Tables for relationship for Tcode, Roles and users (Agr_Users, Agr_Texts, Agr_Tcodes, and TSCT)
  • Developed CUA for all systems from XI
  • Sensitive Transactions Analysis (objects level matrix)
  • Segregation of Duty matrix (objects level matrix)
  • Role design and security policy strategy

Achievements: Completed Security and authorization design for Public Sector project.

Senior SAP Security Consultant
Confidential- Ottawa, ON April 2005 to July 2005
Industry: Government (Security Clearance)
Project Description/Scope: Re-Design SAP security and authorizations
Role: Senior SAP Security Consultant
Responsibilities/Deliverables:

  • Re-Design SAP security and authorization
  • Analyze current situation
  • Role selection multidimensional matrix
  • Role definition depends on HR position
  • Re-designed and re-built security roles (PFCG)

Pricewaterhouse Cooper PwC January 2005 to March 2005
Industry: Financial, Chemical (Security Clearance)
Project Description/Scope: • SAP audit (Automatic Control Environment)
• Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, ACE-Automatic Controls
Environment, Guardian- Manual Controls Environment
• Operation System: Windows 2000, Unix, and Oracle
• Project Development:
ASAP/Value SAP, Security and Authorization, SOX, SOD- Segregation of Duties
Test, STA-Sensitive Transaction Analysis

Responsibilities/Deliverables: • SOX, SOD Analysis and advice

  • Assessment of the SAP control environment to identify internal control deficiencies and recommend
  • improvements
  • SAP Audit (ACE)
  • Business Processes- "As is"-Transactions -objects-authorizations field\'s Analysis, best practice and
  • recommendations
  • Sensitive Transaction Analysis (objects level matrix)
  • Segregation of Duty matrix (objects level matrix)
  • Operational Control and Computer Operations Analysis
  • Physical Security and Security Polices
  • Completed assessment of the SAP control environment to identify internal control deficiencies and
  • recommended improvements.
  • Completed SOD and SOX analysis and recommended improvements

Confidential April 2004 to December 2004
Project Lead of Medical Designated Facilities
Industry: Oil, Health Care, and Hospitals
Project Description/Scope: • Medical Designated Facilities System involved 105 hospitals, clinics, and
remote area designated facilities across the country
Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal
6.0, SRM, APO, SRM, HR
Operation System: Windows XP
Project Development: ASAP/Value SAP, IS-H and IS-H* Med, Security and Authorization, Documentum
Role: Project Technical Lead of Medical Designated Facilities
System (105 hospitals, clinics, and remote area designated facilities,
Monitoring Quality of Healthcare), Kingdom of Saudi Arabia (50+ international
Consultants\' global team)
Responsibilities/Deliverables:

  • SAP User - Centered Design
  • Gave guidance and control to the project and project organization
  • Flexible framework, which can be adapted to specific customer needs
  • Increase productivity by provision of templates, tools, and examples
  • Completed Business Blueprinting
  • Industry-Specific Components for Hospitals (IS-H, IS-H*MED)

Roles and security strategy designfor: • SAP R3

  • Customer Relationship Management (CRM) includes the methodologies, strategies, software, and web-based capabilities that help an enterprise organize and manage customer relationships.
  • Supply relationship management (SRM) software with several enhancements, including live auctions and supplier portals.
  • Advanced Planner & Optimizer (APO) provides up-to-date information about a company\'s current
  • inventory and triggers orders for more supplies when a certain quantity of customer orders have been placed and processed. Authorization of APO users has to specify in the BW system
  • Different scenarios for Single Sign-On to SAP Systems
  • Defined on high level design which method of Single Sign-On (SSO) you use with a SAP System
  • Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal 6.0, SRM, APO, SRM
  • Operation System: Windows XP
  • Project Development: ASAP/Value SAP, IS-H and IS-H* Med, Security and Authorization, Documentum
  • Defined quality assurance checkpoints and formats of deliverables
  • Guided customer staff in implementation tasks with clearly defined rules and responsibilities
  • Supported consultants in the various functional areas to work in a similar way within a project team
  • Detailed design phase of the project
  • Captured the detailed scope and requirements for:
  • Business processes
  • Master data
  • Organization structures, Hospitals structures
  • Development work
  • Produced a blueprint to describe how the business intends to run its business using the SAP R/3 system:
  • Established the development system:
  • Provided Team Training, Business Process Master List, Development Master List (DML)
  • Business Blueprint Document, Configuration Approach Document
  • Landscape Strategy, Rollout Strategy, Change Management Document Strategy
  • Development System Environment, BB Management Summary
  • Patient Management, Eligibility Check, Contract Management
  • Basic Data flow modeling, Data selection matrix

Confidential- Kingston, ON August 2001 to January 2004
Senior SAP Analyst/SAP Security Analyst
Industry: Health Care, Hospitals
Project Description/Scope: SAP-Security and Authorization. IS_H* prototype
Role: Senior SAP Analyst/SAP Security Analyst
Responsibilities/Deliverables: • ASAP/Value SAP

  • Evaluation of business processes
  • Design high-level strategy for SAP Security (Architecture)
  • SAP-Security and Authorization
  • SAP profile Generator (PFCG)
  • SAP module concept
  • SAP Hierarchy Concept
  • SAP Technical Structure and promote to Production Strategy
  • Security Control Tools
  • Organizational Management
  • Structural Authorization
  • Business conception (model) of structural authorization
  • Security upgrades using SU25 and Profile Generator (PFCG)
  • Review and correction of sensitive authorizations (s_tabu_dis, s_rfc, etc.), including creation and
  • assignment of custom authorization groups for sensitive tables
  • Evaluation and recommendation of SAP menu vs. user menus
  • Resolve issues arising from testing using system traces and dumps
  • PD and PA Switches (OOPS, OOAC)
  • Conversion of manual profiles and implementation of role based security, including IM department
  • Evaluated and used SAP standard roles as templates for custom roles
  • Review critical and sensitive authorizations, implement improvements to meet audit requirements
  • Post Go Live support to resolve all security-related issues
  • Evaluation of Central User Administration (CUA)
  • Maintenance of HR organizational structure to administer and control user access, including timedelimited access (e.g. temporary assignments to positions)
  • Basic HR configuration (e.g. create Evaluation Paths for reporting purposes)
  • Comprehensive knowledge exchange and documentation of Security and HR functions, including use of PPOMW, Expert functions (PO10, PO13, etc.)
  • Profile Generator (PFCG) and related functions
  • IS_H* prototype
  • Established detailed security upgrade plan, strategy and dual maintenance procedures
  • Created of new 4.6C authorization objects and values
  • Evaluated customized matrix of Authorization groups - tables, users - groups
  • Used of HR structural transactions (e.g. PPSC) to maintain workflow position to position assignments
  • Customized HR to allow activity group assignment in PPOMW
  • Created of HR security authorization objects for structural authorizations based on Info Type and allowed functions / activities (e.g. Help Desk staff were only allowed to display structural assignments, not change users assigned to positions, etc.)
  • Created Organizational Plan (PPOM_OLD), Personal Master Record (PA40), User I.D (SU01, SU10),
  • Info type 105(PA30), Structural Authorization Profiles (OOSP), Info type 1017 (PO10), Assigned Info type 1017 (PO13), Assigned Structural Authorization Profiles to User I.D (SE38), Setup Regular security (PFCG)
  • Cleaned up and optimized security Roles
  • Established security testing procedures and tools
  • Worked on procedures and applications of dual-maintenance of security changes
  • Worked to build strategy and implemented structural authorization
  • Built and evaluated up to 5 different IS_ H* prototypes

Senior Systems Analyst
Confidential- Foster City, CA June 2000 to April 2001
Technical Lead

  • Conversion (migration) from Assembler 370 (3, 5 millions lines of cod) to C/C++ (mainframe and PC) environment was using Visual Age C++ for TPF. My responsibilities involve directing the Process and Technology Deployment (PTD). PTD supports the Shared Services Organization in the evaluation, acquisition, and roll out of software tools and development methodologies.
  • Responsibilities also involve object oriented (OO) mentoring the teams (Over 500 people) engaged in OO development using UML based tools for analysis and design. Advising development teams on how to effectively utilize tools for OO structuring team oriented development. Also need to participate in the development of guidelines and other forms of support documentation such as guides in setting up their environment and instruction manuals.
  • Designed a critical Visa International application for TPF (CVV-Card Verification Value, Functional Messages, and Address Verification Value) Carried out initial system study and design and involved in full phase of development. The project contains over 3 million lines of code. Worked as software architect and consultant for project VISA NEW GENERATION

Application and software:Rational Rose, Visual Age C/C++, Extra! For TPF, NFS Maestro Solo, MS
Exchange/MS Outlook, MS Internet Mail, MS Office and MS Excel
Operation System:Window NT4.0, AIX UNIX 4.2, MVS, VM, TPF (VPARS)
Hardware:IBM mainframe, PC workstation
Project Development: Large system, locking critical Visa applications

Member of Boeing
Confidential- Carleton Place, ON September 1999 to June 2000
Senior Embedded Programmer Analyst

  • Designed air traffic Control System for Cuba (drivers for fire wire backup of air traffic system, radar simulator), Air traffic Control Simulator (client and telecommunication server), TCP/IP, SMTP, Voice Communication Systems, DSP\'s SIEMENC, MOTOROLA (MPC7450), i960, INTEL, EMULEX, (PEB 20560 20340), drivers, these entailing the development of deferent models to forecast the effects of alternative sector and route geometry\'s, the establishment of a lab to house simulation models and the reams of data they employ and the development of a internationally recognized process for airspace
  • Designed Small Computer Systems Interface (SCSI), back up systems for Air traffic Control SCSI-3 technologies disk array applications, Hot-Swap support. Worked as software architect for low level software and hardware development
  • Designed 3 functional areas: Interfacing, Switching and Conferencing, Supervision and Control
  • Designed the program for main component of architecture a Peripheral Component Interconnect adapter card
  • It performs the Switching/Conferencing, Supervision and Control. It communicates with the Interface Shelf for reception of Signaling and Supervisory signal, voice, and data

Application and Software:C/C++ compiler for Linux, Hardware and Software Configuration, Assembler, C/C++, and, Java 2.0, Vi editor
Operation System: Linux (Caldera, Slack ware, Red Hat 4.1-6.1, Turbo Linux), UNIX, Windows NT, Windows 98, Qunix
Hardware:PC server/workstation, oscilloscopes
Project Development:Air traffic control systems, Air traffic control simulator, backup systems, firewire
drivers, Linux drivers (PCI, ISA, Firewire), touch screen drivers

Senior Programmer Analyst
Confidential- Toronto, ON
March 1999 to June 1999

  • Designed, programmed, tested, and documented set of batch applications to check information in the database
  • Designed, programmed, tested, and documented the interface application between two warehouse systems.

Environment:Application and software: Oracle 7, C, Pro*C/C++, PL/SQL, OOP methods, MS Exchange/ MS Outlook, MS Internet Mail, MS Office 98 and MS Excel. Operation System: AIX UNIX 4.2, Window NT4.0 server/workstation, Windows 95. Hardware: PC server/workstation
Project Development: Real time warehouse system

Education
Diploma in Software Engineering
Master of Science in Computer Science and Electronic Engineering

Hire Now