We provide IT Staff Augmentation Services!

Sap Security Consultant Resume

Honolulu, HI

PROFESSIONAL SUMMARY:

  • Confidential has implemented SAP security and business process solutions for over 19 years.
  • She understands managing and being hands - on for SAP implementations in the area of SAP Security and SOD/SOX compliance.
  • Confidential is a proven consultant in designing and configuring a security design that is free of segregation of duty conflicts but designed to meet the business requirements.
  • Confidential is knowledgeable in business processes for Hire to Retire, Order to Cash and Requisition to Pay.
  • She has implemented for a wide variety of industries, including Department of Defense, Public Sector, Utilities and Manufacturing.
  • Implemented GRC ARA, ARM, BRM and EAM along with redesigning the GRC ruleset to check at the permission level and include custom transaction codes.
  • Confidential is certified in the ASAP Methodology and has completed 12 full implementations.
  • Implementations have included versions 3.1g-4.7, ERP2005 and ECC 6 & 7.
  • Modules include Portal, HCM, DFPS, BI/BW, FI, CO, TR, AM, ECCS, MM, SD, PS, PP, PM and GRC AC and EAM. She has also implemented APO, IS-U, CCS, CRM, SRM, WMS, Mobile Handhelds, Web UI, IVR, Workflow, FERC, C Folders and XI/PI.
  • Designing and documenting the overall security strategy
  • Scoping and planning all SAP security tasks, deliverables, timelines with resources
  • Working with functional teams to understand security requirements and design SAP security roles
  • Configuring and unit testing SAP security roles based on design
  • Supporting positive and negative integration testing of security roles
  • Completing Segregation of Duty analysis on security roles
  • Role mapping SAP security roles to end users/positions
  • Knowledge transfer and of SAP Security to the team
  • Performing security cutover activities, loading security roles and structural profiles to positions, loading users and IT0105 subtype 0001 via CATT or LSMW scripts
  • Going live and supporting the SAP security implementation
  • Completing SAP Security Policies and Procedures.
  • Procedures include detailed screenshots of step-by-step procedures on SAP transaction codes. Policies include steps to control audit related issues, including security on tables, programs, spools, batch jobs, and other basis related audit concerns
  • In addition, to completing the security tasks, Confidential has implemented these additional functions:
  • Working with audit team on redesigning security roles to be within SOX and audit compliance.
  • Working with audit team on HIPAA privacy compliance.
  • Setup Central User Administration (CUA) at 5 clients to ease user administration. worked with programmers on custom ABAP programs to automate and streamline Security Processes.
  • These include automation of user id creation when employees are hired into the organization, deactivation of user ids when employees are separated, and change user id last name, first name and user group based on employee information changing in HR.
  • Working with programmers to create a custom function module and custom table used in HR structurals.
  • This method eliminated the need to derive security roles and structurals by agency/org unit.
  • The method changed the need to build 1000’s of security roles and 1000’s of structurals to only needing a total of 18 derived agency security roles.
  • The use of the SAP Portal was used at 3 clients. Tasks included mapping portal roles to SAP roles so access was controlled via SAP. Also, worked with Portal Team to upload BW reports into the portal, creating portal roles to BW reports and mapping portal roles to SAP roles.
  • Implementing the use of ECC Structurals migrating into BI on 3 implementations.
  • Tasks included working with the BI team to setup infocubes into BI, scheduling SAP RHBAUS00, RHBAUS01, RHBAUS02 programs in ECC and fine tuning the performance of the job.
  • Implemented Position Based Security on 5 implementations.
  • Assignment of security roles to SAP positions. Access is granted to the user based on the employee being hired into the SAP position.
  • Implemented use of new security functionality of derived and composite security roles at 11 clients.
  • Secured custom programs and custom tables with authorization groups to be in audit compliance.
  • Worked with GRC Access Controls for both Access Requests with SOD analysis and Firefighter and clear understanding of GRC Process Controls.
  • Documented GRC configuration settings based on GRC design that was established from GRC workshops.
  • Confidential is proficient in the use of SAP security tools: Profile Generator (PFCG), Manual Profiles (SU02), Manual Authorizations (SU03), Security Reporting Tools (SUIM), User Creation Process (SU01), Mass Security Changes (SU10), Profile Generator Auth Update (SU24), Security Tables (USR/AGR tables), Authorization Issues (SU53), CATT, LSMW, Audit Information Systems (AIS), System Traces (ST01), Segregation of Duty Analysis Tools (RSUSR008, manual spreadsheet analysis) and Assignment of Authorization Groups to Programs and Tables.

TECHNICAL SKILLS:

Modules: SAP HR (Payroll, Benefits, Time, PA, PD, OM, Recruitment, /Events, ESS, MSS, Travel), FI/CO, Engagement Management, AP, Travel, AR, Fixed Assets, Treasury, SD, MM, PP, PM, APO, CRM, SRM, ICWeb, ISU-CCS, WMS, Mobile Handheld Units, Mobile Infrastructure, Business Warehouse, Business Intelligence, BW-BPS, Consolidations, Special Ledger, FERC, Funds Management, C folders & CUA, SAP Portal, Workflow, Solution Manager

SAP Versions: 3.1, 4.0, 4.5, 4.6, Enterprise 4.7, ERP2004, ECC 6, ECC 7

Programming Languages: COBOL, C, SAS, Pascal, BASIC

Audited Hardware: IBM mainframes (MVS/ESA 4.3), 900, 4341-N2 J; PCs; AS400; DEC/VAX; LAN/WAN; HP-UX ( .2) H50, I70, K400, T500, T520.

Audited Software: Mainframe CA-Top Secret, RACF, TSO/ISPF, CICS, IMS, DB2, ChangeMan, CA-7, CA-11; DEC BARCO, MANMAN and SAP

PROFESSIONAL EXPERIENCE:

SAP Security Consultant

Confidential, Honolulu, HI

Responsibilities:

  • Completed SAP Security Strategy to provide foundation on security role design and set strategy to be in compliance with Confidential and segregation of duties compliance
  • Completed security role design for modules including Finance, Supply Chain, Work Management and HR/Payroll
  • Completed SOD analysis on role design
  • Worked with the external audit on Confidential compliance
  • Worked with information assurance group to complete risk analysis to be SOX compliant
  • Setup development environment for project team to configure and write code
  • Worked with the client to design GRC ARA, ARM and BRM. Determined workflow designs and determined GRC ruleset changes, along with GRC mitigating controls
SAP Security Consultant

Confidential, Richmond, VA

Responsibilities:

  • Led the redesign of RoleMan to be changed from user based to position based.
  • This change decreased the number of RoleMan generated roles by over half the number of roles
  • Supported the Confidential HR position based security. Positions
  • Maintenance Managers, Property Book Clerks), have been established and security roles assigned.
  • Decentralized Access Administrators have been granted access to hire soldiers into the positions so access is established.
  • Access Admins use HR Actions for hiring, transferring and off boarding users from the HR positions so access is automatically granted/removed/transferred
  • Supported the user base. User base of 50,000 users which was growing to 160,000 soldiers
  • Additionally, completed a redesign of the sustainment security roles to eliminate Segregation of Duty conflicts, while providing the support access required.
  • Targeted Firefighter security roles were designed and built to provide the sustainment team the necessary access to support in an emergency.
  • Use of GRC Firefighter is used to provision Firefighter access to the sustainment team members. Redesigned GRC Firefighter IDs and Owners.
  • Modified GRC ruleset to include additional custom transactions.
  • Ran SOD analysis on all users to clean up security roles, which had SOD conflicts.
  • Re-established and setup new Role and Controls Owners based on new design.

SAP Security Manager

Confidential

Responsibilities:

  • Managed and provided hands-on design and implementation for a new implementation where over 5500 users were part of the new implementation to the existing SAP system.
  • Managed the project plan, redesigned the security roles free of SOD conflicts, mapped security roles to users based on and job requirements and managed go-live plan for SAP security
  • Managed the SAP Security team to support their live production environment with 2600 users
  • Managed and provided hands-on design and implementation for the go-live of GRC for the live users. Converting old security roles to new GRC business roles for over 1500 users so that GRC could be used for provisioning of security roles
  • Hands-on implementation for the new implementation of security roles in the GRC Access Controls system for requests to be completed via GRC
  • Mapped ECC, BI and SNC roles into the GRC Business Roles so all three systems were provisioned
  • Met monthly on ITS Operations and presented CIO with project and production support status
  • Worked with Corporate Finance to partner on security design and controls and discuss future implementation of security controls framework

SAP Security Consultant

Confidential, Scottsdale, AZ

Responsibilities:

  • SAP Security Consultant Lead for new FI, CO, MM, SD and BI implementation
  • Removed audit related concerns from security roles that had previously been tested in time for last phase of testing to be in audit compliance
  • Setup production support roles that would be used after go-live/stabilization

Confidential, Roanoke, VA

SAP Security Consultant

Responsibilities:

  • SAP Security support in modules HCM, FI, MM, SRM, BI, e-Recruiting, PI
  • Support P2P, R2R, HTR business processes
  • Assisted with GRC AC upgrade from 5.3 to 10.0. Hands-on implementation for GRC upgrade
  • Assisted with design of GRC Process Controls implementation
  • Updated GRC ruleset to include custom transactions to be more complete
  • Used SAP ChaRM for security transports
  • Provided knowledge transfer to Norfolk Southern Security Team

Continental

SAP Security Consultant Lead

Responsibilities:

  • Redesigned security roles for 10 different German organizations and 2 other countries to standardize the security roles. Built security role template to work for all business units
  • Joined EPI-USE for this project

Confidential, Sacramento, CA

SAP Security Consultant Lead

Responsibilities:

  • Completed full implementation and security project plan from blueprint, design, realization, go-live and support
  • Setup custom HR structural authorizations to ease administrative support.
  • This custom method eliminated the need to derive security roles and structurals by agency/org unit.
  • The method changed the need to build 1000’s of security roles and 1000’s of structurals to only needing a total of 18 derived agency security roles.
  • Use of P ORGINCON allowed for flexibility in security role design
  • State of CA project was same scope as Confidential but larger. State of CA scope was for 250,000 users, while Confidential was 80,000 users
  • BI reports were imported into the SAP portal. BI Structural authorizations were imported into BI as Analysis Authorizations, this allowed for structural authorizations within the BI system
  • Position Based Security was implemented for security roles to be assigned on positions. Users automatically inherited the security roles if hired into the position and user automatically lost the access when separated from the position
  • Custom ABAP programs were created to automate and streamline Security Processes. These include automation of user id creation when employees are hired into the organization, deactivation of user ids when employees are separated, and change user id last name, first name and user group based on employee information changing

Confidential, Columbia, SC

SAP Security Consultant Lead

Responsibilities:

  • Completed full implementation with all phases.
  • Project was a smaller Confidential scope so implemented exactly what was completed in security at Confidential but at a smaller scope.
  • Setup BI reports in the portal for users to access in a user-friendly environment

Confidential, Newark, NJ

SAP Security Consultant Lead

Responsibilities:

  • Completed the design to go-live to implement this complimented module of CCS, CRM, IS-U.
  • Worked with Audit and the Compliance Manager to determine best practices related to SOX and SOD compliance.

Confidential, Raleigh, NC

SAP Security Consultant Lead

Responsibilities:

  • Setup position based security to leverage the HR organization structure
  • Setup BI reports in the portal. Moved structural authorizations into BI to have same security organizational levels in BI as in ECC. Jobs scheduled to move auths from ECC into BI
  • Continued to work part-time June 1, 2008 - July 1, 2011 to assist with custom abaps to ease security administration

Confidential, ChaddsFord, PA

SAP Security Consultant Lead

Responsibilities:

  • Met with European leaders on data privacy concerns.
  • Implemented policies to ensure data privacy concerns were implemented within the SAP Security environment

Confidential, Portland, ME

SAP Security Consultant Lead

Responsibilities:

  • Completed design to go-live and support.
  • Determined SOD analysis and designed security roles to be free of SOD conflicts.

Confidential, San Antonio, TX

SAP Security Consultant Lead

Responsibilities:

  • Confidential led implementation.
  • Previous Confidential colleague requested my come to implement.
  • Integration testing had begun.
  • Fixed the authorizations to be more restricted and also to be open where needed in time for next integration testing cycle

Confidential, Portland, ME

SAP Security Consultant Lead

Responsibilities:

  • From Security standpoint, it was a full implementation, which included a redesign and additional functionality for modules SAP HCM (PA, PD, OM, Payroll and Time), FI, AP, AR, CO, PS, Treasury, Consolidations, Special Ledger, FERC, MM, Workflow and BW.

SAP Security Consultant

Confidential, ChaddsFord, PA

Responsibilities:

  • SAP Security Consultant Lead on full global implementation.
  • Upgraded from v4.6c to Enterprise 4.7; BW version 3.0b; CRM version 3.0.
  • Implemented CRM for call center usage.
  • Completed design to go-live and stabilization

Hire Now