We provide IT Staff Augmentation Services!

Lead Sap Solution Consultant Resume

4.00/5 (Submit Your Rating)

SUMMARY

  • I have a strong background in technology complemented with leadership positions in international projects.
  • I served in leadership positions for projects with budgets ranging from $2 million to $1250 million.
  • My experienced visioning, costing and executing projects from inception to launch and is able to provide a structured framework to analyze complex situations into simple strategic imperatives.
  • I am an expert in both agile and traditional project management
  • Develops and directs the implementation of goals, objectives, policies, procedures and work standards for assigned division; interprets and complies with all applicable federal and state regulations
  • Monitors and directs daily operations to ensure that policies and procedures are being followed, that goals and objectives are met, and that services are being provided efficiently and effectively; takes corrective action as necessary; personally handles the most difficult, sensitive or controversial projects for the division
  • Develops and monitors the division’s budget; oversees financial well - being of the division by analyzing cost effectiveness and directing cost control activities; prepares, submits and justifies budget enhancement requests
  • Plans, organizes, administers, reviews and evaluates the work of subordinate professional, technical, office support and operational staff through subordinate levels of supervision.
  • Provides for the selection, training, professional development and work evaluation of subordinate staff; makes recommendations on hiring, termination, promotion and discipline as required.
  • Confers with and represents the Security division and the department in meetings with other departments and divisions; serves as the representative with a variety of public, business and community organizations; fosters collaborative relationships to the benefit of the division, department and the organization
  • Prioritizes and allocates available division resources; reviews and evaluates program and service delivery, makes recommendations for improvement and ensures maximum effective service provision
  • Develops systems and maintains records that provide for the proper evaluation, control and documentation of assigned activities; prepares and directs the preparation of a variety of written correspondence, reports, procedures, directives and other materials
  • Provides a formal and structured way of viewing and defining an enterprise in a two dimensional classification schema that reflects the intersection between two historical classifications (Zachman Framework)
  • Uses a reliable, practical method - the TOGAF Architecture Development Method (ADM) - for defining business needs and developing an architecture that meets those needs, utilizing the elements of TOGAF and other architectural assets available to the organization

TECHNICAL SKILLS

  • Oracle Database, Unix, Windows, Policy-Based Authorization, Business Processes, Business Policies, RBAC pattern as an extension of the Authorization pattern
  • Identity Center Database, Work-flow User Interface, Monitoring User interface, Management Console, Run time Engine and Dispatcher, Event Agent, Virtual Directory Server, VMware
  • Guardian, ACE, Approva Biz-Rights, Virsa, GRC 5.0-10x, and SOD, SOXSOX ACE-Automatic Controls Environment for SOD, SOX, Approva Biz-Rights, Virsa, GRC5.0-10.x, Access control
  • Process control and Risk control, RAR, ERM, SPM, CUP, Access Risk Analysis (ARA), Emergency Access Management (EAM), Business Role Management (BRM), Access Request Management (ARM)
  • Business Rules Management Systems, MSPM, GRC MSMP CONFIGURATION, Design and Manage Roles, Emergency Access Management, Provision and Manage Users
  • Analyze and Manage Risk, Managing Compliance with Access Control

PROFESSIONAL EXPERIENCE

Confidential

Lead SAP Solution Consultant

Responsibilities:

  • Integration TIVOLI Identity Manager, UME and corporate LDAP
  • RBAC - Role Based Access Control Model development
  • Overview and consideration of Role Based Access Control, The Role modeling challenge, Role Based Access Models, Overview, Statement of the Problem
  • Access Control Principles, The Implementation and Conversion Program, Migration Plan
  • Implementing the Pilot Program, Role Based Access Control Solution AIX management overview,
  • RBAC in Oracle (RDMS), Role Based Access Model for SAP, Policy-Based Authorization
  • Business Processes, Business Policies, The RBAC pattern as an extension of the Authorization pattern,
  • Role-Based Access Control (RBAC) Pattern, Implementing and Modeling Roles in ITIM
  • Separation of Duty in Role Based Access Control System Pattern

Confidential

SAP Security and Solution Consultant

Responsibilities:

  • Authorization groups functional tables, custom development authorization solutions
  • Implementing and reviewing SAP Authorization Concept
  • Integrating ABAP User-Management with Organizational Management
  • Central User Storage Techniques
  • Build Framework: Solution Audit tools & Change Documents (SCDO)
  • Maxware, IDM and LDAP in a company environment
  • GRC, VIRSA, Compliance Calibrator, Access Enforcer, Firefighter, Role Expert, SOX, SOD
  • SAP UME administration and J2EE roles
  • Handling PFCG (check indicators, SU24, transport & upload roles)
  • Configure and implement cryptography technologies in SAP System
  • Upgrade ECC 5.0 to ECC 6.0, ERP 6.0
  • Solution Policy and Strategy
  • BI/BW Strategy and Tactics, Analysis Authorization, BI, BOBJ, BPC
  • HLD for HR - BI Dynamic Authorization Model
  • Conversion from Structural Authorization to BI analysis authorization
  • New GL (Solution), ESS, MSS
  • CUA Landscape and Presentation
  • CUA creation, review, and recommendation
  • P ADM SEC 70 Solution Course Development (Author)
  • GRC configuration and review
  • Authorization Concept Lead Consultant (SAP Resource Management @ Field Services) New SAP development (Global HCM)
  • Solution GTS design and implementation (Global Trade Services)
  • Analysis Authorizations (BI) creation and implementation
  • PD profiles and BI structure Solution and authorization design
  • Structural authorization BI analysis and BI structure conversion
  • Upgrade to SAP R/3 Enterprise Release 4.70
  • Integration Analysis: IBM Tivoli Identity Manager, LDAP, SAML, SAP UME, Internet Portal, Biller Direct
  • IBM Tivoli Access Management Integration
  • CRM2007 Solution and Design
  • Dynamic CRM Authorization Model, ACE and business roles set up and IMG (SPRO) configuration
  • ACE, Web UI and ABAP roles integration from complete UCD (User Centered design SAP Methodology)
  • An Architectural View of SAP's Analytical CRM Capability
  • CRM integration with ERP, BI
  • SAP CRM module, SAP Biller Direct, SAP Exchange Interface ("PI/XI")
  • Flexible Solution framework that can be adapted to specific customer (business partners) needs

Confidential

Sr. SAP HR Security and Solution Consultant

Responsibilities:

  • Solution based on industry standards
  • SAP framework for SAP HR Global Solution and authorization support and implementations.
  • Development of tailored Solution and controls techniques in conjunction with system implementations (i.e. ERP) and the design or re-engineering of business processes (i.e. shared services environment

Confidential

Senior Solution and Security Consultant

Responsibilities:

  • ASAP methodology/User Centered Designed
  • Role definition depends on HR positions
  • Conversion from "as is" to "to be" business processes
  • Assignment of Authorization Groups to Tables (TDDATA, VD DATA)
  • Authorization groups and tables trace from applications
  • Access Control- Authorization Groups (SM30, TBRG table)
  • Role design "ABAP and JAVA" sites for XI
  • Solution Strategy for web Methods Integration Platform
  • Role design, development and assignment (PFCG, SU01)
  • Authorization Groups-Report-types programs (SA38, SE38, AUTHORITY CHECK)
  • Document Types in design and configuration processes (T003)
  • Check indicators (SU24, SU25, SE93, and SE97)
  • Authorization checks by assigning reports to authorization classes (RSCSAUTH)
  • Tables for relationship for Tcode, Roles and users (Agr Users, Agr Texts, Agr Tcodes, and TSCT)
  • Developed CUA for all systems from XI
  • Sensitive Transactions Analysis (objects level matrix)
  • Segregation of Duty matrix (objects level matrix)
  • Role design and Solution policy strategy

Confidential

Senior SAP Security and Solution Consultant

Responsibilities:

  • Re-Design SAP Solution and authorization
  • Analyze current situation
  • Role selection multidimensional matrix
  • Role definition depends on HR position
  • Re-designed and re-built Solution roles (PFCG)

Confidential

SAP Solution Advisor

Responsibilities:

  • Medical Designated Facilities System involved 105 hospitals, clinics, and remote area designated facilities across the country and monitoring quality of health care Responsibilities/Deliverable:
  • SAP User - Centered Design
  • Gave guidance and control to the project and project organization
  • Flexible framework, which can be adapted to specific customer needs
  • Increased productivity by provision of templates, tools, and examples
  • Completed Business Blueprinting
  • Industry-Specific Components for Hospitals (IS-H, IS-H*MED)

Confidential

Senior SAP Analyst / SAP Solution Analyst

Responsibilities:

  • ASAP/Value SAP
  • Evaluation of business processes
  • Design high-level strategy for SAP Solution (Architecture)
  • SAP-Solution and Authorization
  • SAP profile Generator (PFCG)
  • SAP module concept
  • SAP Hierarchy Concept
  • SAP Technical Structure and promote to Production Strategy
  • Solution Control Tools
  • Organizational Management
  • Structural Authorization
  • Business conception (model) of structural authorization
  • Solution upgrades using SU25 and Profile Generator (PFCG)
  • Review and correction of sensitive authorizations (s tabu dis, s rfc, etc.), including creation and assignment of custom authorization groups for sensitive tables
  • Evaluation and recommendation of SAP menu vs. user menus
  • Resolve issues arising from testing using system traces and dumps
  • PD and PA Switches (OOPS, OOAC)
  • Conversion of manual profiles and implementation of role based Solution, including IM department
  • Evaluated and used SAP standard roles as templates for custom roles
  • Review critical and sensitive authorizations, implement improvements to meet audit requirements
  • Post Go Live support to resolve all Solution-related issues
  • Evaluation of Central User Administration (CUA)
  • Maintenance of HR organizational structure to administer and control user access, including time delimited access (e.g. temporary assignments to positions)
  • Basic HR configuration (e.g. create Evaluation Paths for reporting purposes)
  • Comprehensive knowledge exchange and documentation of Solution and HR functions, including use of PPOMW, Expert functions (PO10, PO13, etc.)
  • Profile Generator (PFCG) and related functions
  • IS H* prototype
  • Established detailed Solution upgrade plan, strategy and dual maintenance procedures
  • Created new 4.6C authorization objects and values
  • Evaluated customized matrix of Authorization groups - tables, users - groups
  • Used HR structural transactions (e.g. PPSC) to maintain workflow position to position assignments
  • Customized HR to allow activity group assignment in PPOMW
  • Created of HR Solution authorization objects for structural authorizations based on Info Type and allowed functions / activities (e.g. Help Desk staff were only allowed to display structural assignments, not change users assigned to positions, etc.)
  • Created Organizational Plan (PPOM OLD), Personal Master Record (PA40), User I.D (SU01, SU10),
  • Info type 105(PA30), Structural Authorization Profiles (OOSP), Info type 1017 (PO10), Assigned Info type 1017 (PO13), Assigned Structural Authorization Profiles to User I.D (SE38), Setup Regular Solution (PFCG)
  • Cleaned up and optimized Solution Roles
  • Established Solution testing procedures and tools
  • Worked on procedures and applications of dual-maintenance of Solution changes
  • Worked to build strategy and implemented structural authorization
  • Built and evaluated up to 5 different IS H* prototypes

Confidential

Technical Lead - Senior Systems Analyst

Responsibilities:

  • Large system, locking critical Visa applications
  • Conversion (migration) from Assembler 370 (3, 5 million lines of code) to C/C++ (mainframe and PC) environment was using Visual Age C++ for TPF. Responsibilities involved directing the Process and Technology Deployment (PTD). PTD supports the Shared Services Organization in the evaluation, acquisition, and roll out of software tools and development methodologies.
  • Responsibilities also involved object oriented (OO), mentoring the teams (over 500 people) engaged in OO development using UML based tools for analysis and design. Advising development teams on how to effectively utilize tools for OO structuring team oriented development. Also participated in the development of guidelines and other forms of support documentation such as guides in setting up their environment and instruction manuals.
  • Designed a critical Confidential application for TPF (CVV-Card Verification Value, Functional Messages, and Address Verification Value). Carried out initial system study and design and involved in full phase of development. The project contains over 3 million lines of code. Worked as Software Architect and Consultant for project VISA NEW GENERATION

Confidential

Senior Embedded Programmer Analyst

Responsibilities:

  • Designed Small Computer Systems Interface (SCSI), back-up systems for Air traffic Control SCSI-3 technologies disk array applications, Hot-Swap support.
  • Worked as Software Architect for low-level software and hardware development
  • Designed 3 functional areas: Interfacing, Switching and Conferencing, Supervision and Control
  • Designed the program for main component of architecture a Peripheral Component Interconnect adapter card; it performs the Switching/Conferencing, Supervision and Control and communicates with the Interface Shelf for reception of Signaling and Supervisory signal, voice, and data

Confidential

Senior Programmer Analyst

Responsibilities:

  • Designed, programmed, tested, and documented set of batch applications to check information in the database
  • Designed, programmed, tested, and documented the interface application between two warehouse systems

Environment: Application and software: Oracle 7, C, Pro*C/C++, PL/SQL, OOP methods, MS Exchange/ MS Outlook, MS Internet Mail, MS Office 98 and MS Excel. Operation System: AIX UNIX 4.2, Window NT4.0 server/workstation, Windows 95. Hardware: PC server/workstation

Confidential

Director of Information Technology

Responsibilities:

  • Provided consulting services to various organizations
  • Managed information systems and associated hardware (up to 33 mainframes in service in more than 20 different organizations)
  • Specified, designed, and implemented customized information system solutions.
  • Design, implementation and maintenance of the Inventory Management System Application for storing, searching, retrieving information about buildings belonging to municipal property.
  • Participated in analysis, design evaluation, development, testing and implementation of Application systems
  • Designed at high-level all steps of Application systems (Architecture)
  • Supervised a team of up to 20 Computer Engineers

Application and Software: Borland C/C++, Assembler, Embedded Systems, PL/1

We'd love your feedback!