Sap Security Team Lead Resume
Folsom, CA
SUMMARY
- Motivated self - starter with over 18 years of focused SAP Security experience including: solid, hands-on design, development, configuration, testing, and implementation experience with S/4HANA 1610, ECC 6.0 EHP 7 and ECC 6.0 EHP 7 with ISU, ECC 5.0, R/3 4.7/4.6, Solution Manager 7.1, ISU 6 EHP 7, BI 7.4/7.3/7.0, BW 7.4, 3.5, BOBJ 4.0 and BOBJ 4.1 w/ Data service 4.2, SAP Contact Center (BCM) 7.0, SAP PI 7.4, and CRM 7.0 EHP 3
- Multiple award winner for individual project contributions
- Strong team lead and team member abilities
- Strong project management abilities
- Adaptable and flexible with experience in fast paced, frequently changing environments
- Well versed developing strategy and design of SAP Security as well as processes and procedures
- Effective partnering approach with cross-teams to accomplish objectives and reach results
- SOD conflict management experience using SAP’S GRC, Symmetry’s ControlPanelGRC, as well as manual management solutions
- Ability to travel nationally and internationally
- SAP Governance, Risk, and Compliance (GRC)
- Enterprise Warehouse Management (EWM)
- Transportation Management (TM)
- Variant Configuration (VC)
- SAP Contact Center / Business Communications Management (BCM)
- Customer Relationship Management (CRM)
- CRM Web UI / Customer Relationship and Billing (CR&B)
PROFESSIONAL EXPERIENCE
Confidential, Folsom, CA
SAP Security Team Lead
Responsibilities:
- Understand clients’ needs; be responsive; help to reduce total cost of ownership
- Successfully lead and manage all aspects of SAP Security from design to configuration to implementation and upgrades, while addressing any kind of audit, regulatory compliance or risk management requirements
- Successfully deliver on-time project plan tasks and progress reporting
- Evaluate current state to determine and recommend where improvements can be attained
- Effective partnering and liaise with cross-teams (technical, functional, business, audit, etc.) to accomplish objectives
- Successfully manage offshore resources to ensure understanding of tasks and that objectives are met
- Provide knowledge and guidance for SOX, internal controls, audits, etc.
- SAP Security SME (subject matter expert)
- Resource management and requirement needs for projects
- Successfully interface with all levels of management
- Process and procedure gap analysis, development, and implementation
- Successfully in corporate clients’ existing guidelines, policies, and standards into SAP security model
- Ensure a consistent and easily sustainable SAP security model
- Successfully work within all existing SLAs (service level agreements), or, assist with creating new ones
- Document overall SAP security strategy and design
- Develop strategy to thoroughly technical, functional, and integration test security and resolve all issues
- Design, manage, and maintain SAP Security according to SAP and clients’ Best Practices
- Provide knowledge transfer and train clients’ staff
Confidential, Dubuque, IA
Security Team Lead
Responsibilities:
- Designed, configured, and implemented SAP security for this international manufacturing company across its multiple business units, plants, warehouses, and distribution centers for the PTP (Procure to Pay, aka P2P), QTC (Quote to Cash, aka Q2C, OTC), PTM (Plan to Manufacture, aka P2M), I2D (Inventory to Deliver), and RTR (Record to Report) business processes, which included Vistex and VC
- Designed security model specifically covered QTC order management, billing, source documents, rebates and commission management using Vistex, sales rebates and commissions documents; PTP invoice payables, operational procurement, sourcing, contract management, purchase order, purchase requisition and vendor invoice approval workflows, and quality management; I2D order management, freight, execution, integration with EWM, execution monitoring, freight charges and settlement; EWM inbound processing, storage and operations, integration with TM, manufacturing process, and outbound operations; FICO RTR, accounts payable, accounts receivable, controlling, bank accounting, G/L accounting, asset accounting, month-end closing; PTM MRP and interplant planning, scheduling and shop floor execution, and master data for all business processes
- Security for various WRICEFs, data loads, labels, EDI, and PO functions
- Hands-on security role build for SAP GUI transactions and Fiori apps
- Collaborated with cross-functional teams in requirements gathering, security design, and configuration of business process roles
- Managed and supported technical, unit, and integration testing, ensuring positive and negative testing, as well as defect resolution of all
- Performed gap analysis of existing security business processes to determine where new SAP security business processes should fit or where existing processes should be augmented
- Designed mock business processes for management consideration, included help desk process
- Trained employees on security design principles, maintenance practices, support concepts, and overall Best Practices of each
- Collaborated with management on SAP security parameter settings
- Collaborated with management on what production support access should like to meet SOX requirements
- Collaborated with management on emergency access process
- Collaborated with Training and OCM on the delivery of roles and tcodes for course development and user mapping
- Developed SOD matrix
- Managed offshore security resource
- Documented overall security design
Environment: S/4HANA1610
Confidential, Bellevue, WA
Security Team Lead
Responsibilities:
- Rejoined the Financial Transparency Improvement Program to support the project team during integration testing, Go-Live, and post Go-Live (issue identification and resolution)
- Created documentation that detailed project-related custom transactions codes and why they were or were not added to the GRC ruleset
Environment: ECC 6.0 EHP7, BPC 10.1, BW 7.4, HANA 8.1
Confidential, Trumbull, CT
Security Team Lead
Responsibilities:
- Requirements gathering, hands-on security design and configuration for CRM Interaction Center for various departments and management
- Updated existing ECC roles with FICA collections and dunning access
- GRC (version 10) SOD conflict identification between systems, within roles, between roles, and against users
- Managed functional team unit testing and issue resolution
- Issue resolution for all integrated testing cycles to include user acceptance testing
- Created and setup training access for end users
- Security knowledge transfer to AWC security staff
Environment: CRM 7.0 EHP3, ECC 6.0 EHP7, NetWeaver 7.4
Confidential, Bellevue, WA
Security Team Lead
Responsibilities:
- Partnered with SAP on PSE’s Financial Transparency Improvement Program; Program consisted of upgrades to BW on HANA, BPC (Planning only) and significant financial simplifications to FICO and Project Systems
- Responsible for overall security framework, design, and implementation
- Provided post Go-Live security design of HANA Design Studio for Security, Basis, and BW developers
- Incorporated SOX-relevant Key Controls into the security framework and overall security design needed to deliver project to Production as well as to comply with audit requirements
- Part of team that reviewed custom transaction codes for GRC ruleset additions
- Part of team that evaluated updates to existing roles and the creation of roles for SOD conflicts
- Managed offshore security resources
Environment: ECC 6.0 EHP7, BPC 10.1, BW 7.4, HANA 8.1
Confidential, Marquette, MI
Security Team Lead
Responsibilities:
- Created Blueprint that was accepted by UPPCO management
- Hands-on security design and configuration for all implemented modules
- Managed functional team unit testing and resolved all issues
- Issue resolution for all integrated testing cycles to include user acceptance testing
- GRC (version 10) SOD conflict identification between systems, within roles, between roles, and against users
- Worked with CFO and other Finance & Accounting management for SOD conflict remediation and assisted with implementing mitigation controls and tracking
- Worked with IT, HR, and Business Unit management to define new security processes and procedures as well as modifying existing ones
- Worked with IT management to implement a security logging strategy
- Training system setup (ID creation and access definitions)
- Worked with senior management to map end users to production roles
- Created an eCATT script to load users in Production
- Secured sensitive SAP-delivered user IDs
- Reviewed and implemented SAP security parameters with IT management
- Documented new security processes and procedures
- Documented security implementation
- Post Go-LIVE support and issue resolution
Environment: ECC 6.0 EHP7 with ISU, Solution Manager 7.1, ISU 6 EHP 7, BOBJ 4.1 w/ Data service 4.2, CRM 7.0 EHP 3, SAP PI 7.4, BW 7.4, SAP Contact Center (BCM) 7.0
Confidential, Portland, OR
Security Team Lead
Responsibilities:
- Made all roles upgrade ready by removing tcodes from roles’ configuration and placing them into roles’ menu
- Upgraded security and adjusted roles as necessary
- New / upgrade tcodes identified and added to roles by business analyst direction
- Supported business analysts during unit testing
- Eliminated profile name conflicts between systems so roles could be transported error free
- Managed tasks, deadlines, team work, and reported status to Project Team
- Created SAP security maintenance / management Best Practice documentation for security administrators
- Brought awareness to management of SOD conflicts between roles assigned to users and SOD conflicts within singles roles assigned to users
Environment: ECC 5.0, ECC 6.0 EHP7
Confidential, Mission Viejo, CA
Security Team Lead
Responsibilities:
- Created upgrade project plan, managed progress, created status reports
- SU24 tables compared and adjusted
- New tcodes identified and added to roles by business analyst direction
- All affected roles adjusted
- Technical tested roles
- Facilitated functional team unit testing
- Resolved all testing issues
- Upgraded security from BW 3.5 to 7.0:
- Built security using analysis authorizations
- Unit tested all roles for proper execution and security configuration
- Resolved all unit testing issues
- Held workshops for BI 7.0 security development, configuration, and troubleshooting
- Created project plan for custom tcode project to get them mapped to Security Weaver SOD rules and placed in its SOD matrix:
- Worked with cross teams to identify current tcodes and eliminated those not in use
- Mapped tcodes to SAP modules
- Worked with cross teams to determine if tcode was copy of standard tcode or brand new code
- Worked with cross teams to understand tcode functionality and difference between custom tcode and standard tcode
- Worked with Internal Audit to identify tcodes with risks and mapped them to SOD rules within the Security Weaver rule set
Environment: ECC 5.0, ECC 6.0 EHP6, BW 3.5, BW 7.0
Confidential, Rochester, MN
SAP Security Consultant
Responsibilities:
- Conducted a limited security review of the RPU’s existing SAP ECC 6.0 Productive environment
- Analyzed current roles for potential risks and/or exposures that would be realized once the HCM implementation went live
- Provided RPU with findings, risks, risk levels, recommendations, and a remediation plan needed to shore up its application security before going live with HCM
Environment: HCM, ECC 6.0 EHP, OM, PA, TM, PR (Gross only), ESS / MSS for TM functions, NWBC
Confidential, Omaha, NE
Security Team Lead
Responsibilities:
- Honor: Confidential was selected by SAP’s utilities team as one of the Best-Run Utilities across the U.S. and Canada, and received the Best-Run Utility 2013 award
- Certificate of Appreciation received from client for “outstanding contributions and dedication to the SAP CRB Project”
- Hands-on security configuration of CRM, BOBJ, FICA, Billing, Work Management, Energy Data Management, Device Management, Business Process Exception Management, and Maintenance Repair & Overhaul
- Facilitated functional team unit testing
- Issue resolution for unit testing and user acceptance testing
- Post Go-LIVE support and issue resolution
Environment: ECC 6.0 EHP5, CRM 7.0 EHP1, NW PI 7.3, NW BI 7.3, BOBJ 4.0 w/DQM, SAP CPS - Redwood 8.0
Confidential
Security Team Lead
Responsibilities:
- Defined security strategy for HCM (Compensation Management, Personnel Administration, Performance Management, Talent Management, Variable Incentive Compensation Program, ESS, and MSS), Configit, and e-Loaner (BYOD) Implementations
- Implemented ControlPanelGRC SoD tool to monitor environment for SoD conflicts, violations, and mitigating controls
- Managed production support for Security Team using Remedy
Environment: ECC 6.0, BI 7.0, Enterprise Portal 7.0
Confidential, San Diego, CA
Security Team Member
Responsibilities:
- Developed Best Practice guidelines for SAP security implementation
- Developed ECC and BI roles according to functional specifications as well as coordinated unit testing
- Developed ECC roles using the single and composite role concept
- Updated SU24 tables to simplify on-going role creation and maintenance
- Resolved all security issues that resulted from unit and integration testing
- Documented security role design for ECC and BI
Environment: ECC 6.0, BI 7.0, Enterprise Portal 7.0
Confidential, White Plains, NY
Security Team Lead
Responsibilities:
- Managed various BI security implementation projects (FI/ISU-CCS/HR) that ran simultaneously
- Redesigned FI & ISU-CCS BW 3.5 security and implemented new security model in BI 7.0
- Designed, Configured, and Implemented HR CATS, Benefits, Personnel Administration, Staffing Assignments, Benchmarks, Compensation Analysis, Headcount & Personnel Actions, and Training/Talent and Event Management security in BI 7.0
- Designed security model so that FI and ISU-CCS users could not see or access HR data and also that each division could only see or access its own data
- Secured “backdoor” access to HR tables for personally identifiable employee information
- Configured security for access to InfoProviders, MultiProviders, Process Chains, InfoSources, DataSources, DataStore Objects, InfoObjects, InfoSets, Data Transfer Processes, Transformations, Master Data & maintenance, hierarchies, BEx Broadcasting, and various authorization analyses
- Hands-on FI, ISU-CCS, and HR BI security development for general reporting users, query developers, super and power users
- Hands-on SEM BPS development for budget input, system administration, and data loads
- Conducted requirements gathering workshops
- Created and presented working security prototypes to business units to obtain security approach by-in
- Assigned and managed work for Security team members
- Monitored Security Team work to ensure work stayed on track according to project plan and budget
- Mentored Security Team members
- Presented security strategies to middle and senior-level management
- Solely responsible for SAP BI security strategic planning
- Supported UAT for all implementations
- Post Go-Live support for all implementations
- Wrote Blueprint and Security Standards documents for BW to BI security migration
- Developed Functional and Technical Design Specifications (FDS and TDS) for all implementations
- Developed and managed security project plans and tasks
- Held ECC and BI security training (knowledge transfer) workshops for employees
- Thoroughly documented security model for all implementations
Confidential, Atlanta, GA
SAP Security Team Lead
Responsibilities:
- Principal Award winner for “Passionately reinforcing the collaboration and commitment necessary for providing near round the clock support during the Paw SAP Deployment”
- Responsible for hands-on development and on-time delivery of R3 security as it related to Order to Cash (OTC), Record to Report (RTR), Record to Pay (RTP), Third Party Logistics (eSupply Chain), Forecast to Stock (FTS), Business Intelligence (BI), and Master Data Maintenance
- Developed strategy, launched and lead BI process improvement mini project where all aspects of BI security were documented - where no documentation existed before; cube and multiprovider security in development, test, and production was normalized - where it was not before; SLAs defined - where none existed before; processes defined for access requests, new cube/multiprovider development, requirements gathering, and testing - where none existed before
- Deployed production access of new development to plants, distribution centers, warehouses, and third-party locations
- Transferred knowledge of new development deployed to Production Support
- Partnered with Production Support in problem solving of issues
- Partnered with process team leads to define roles and responsibilities among teams
- Partnered with process team members in security requirements gathering as well as unit testing the security development of those requirements
- Worked with developers to create authorization groups and write authorization check statements into their code
Confidential, West Lafayette, IN
SAP Security Team Lead
Responsibilities:
- Compass Award winner for “managing an extremely difficult client situation well” and also that my “commitment to the client was greatly valued and was demonstrated on a daily basis”
- Team Lead, led Security Team to the most successful Go-Live the Project Team had ever experienced
- Developed strategy and design of SAP Security
- Documented Blueprint security design along with security assessment of current environment
- Developed and maintained security project plan
- Presented security concepts and design options to various levels of technical and business area management
- Established authorization concept with functional teams
- Hands-on ECC 6.0 security development for the Asset Accounting, Accounts Payable and Receivable, Public Sector Collection and Disbursements, Finance and Controlling, Funds Management, General Ledger, Treasury, Grants Management, Inventory Management/Warehouse Management, Materials Management, Plant Maintenance, Production Planning, Quality Management, Project Systems, Supplier Relationship Management, and Travel modules
- Hands-on BI 7.0 security development for Business Intelligence reporting and query development in Production, QA, and Development, for query developers, super users, power users, and end users; assigned analysis authorizations directly to some users and to roles; authorization analysis built according to SAP’s recommended approach of assigning three basic characteristics to each authorization
- Hands-on Strategic Enterprise Management - Business Planning Simulation (SEM-BPS) based on budget planning Funds Centers
- Hands-on ECC 6.0 position-based HR security development for the Payroll, Organizational Management, Benefits, Personnel Administration, Time Management, Manager Self Service, and Employee Self Service modules
- Technically tested and unit tested roles ensuring proper configuration and functionality
- Developed strategy and supported Cycle and User Acceptance Testing
- Member of integration testing team, followed test scripts, positively/negatively tested roles for proper configuration/functionality, ensured SOX compliance (this institution followed SOX model)
- Collaborated with functional teams and Internal Audit to develop segregation of duties matrix
- Developed authorization management strategy for production
- Lead workgroup to define security production processes
- Developed weekly, monthly, bi-annual, and annual security system monitoring strategies
- Provided knowledge transfer to university employees
Confidential, Herndon, VA
SAP Security Team Lead
Responsibilities:
- Analyzed and redesigned BW and SEM security for three government bureaus
- Managed security for portal roles and user assignments for three government bureaus
- Supported integration testing by creating negative test scripts, setting up IDs with appropriate access and resolving simple to complex authorization-related defects
Confidential, San Jose
SAP Security Consultant
Responsibilities:
- Assisted SAP Security Team with their SOX readiness
- Generated reports against multiple users and systems to determine existing segregation of duties conflicts
- Analyzed data to determine root cause of segregation of duties conflicts
- Interfaced with business units’ Authorized Approvers to develop strategy to eliminate conflicts or to develop compensating controls for conflicts
- Met with SAP Security Management Team to recommend improvements for their existing security and controls model as well as process improvements
Confidential, Glendale, CA
Security and Controls Team Member
Responsibilities:
- Security Team Lead for SEM-BPS and BW Ultimates Project, responsible for security blueprint and design, co-managed security testing and implementation with SEM-BPS Team Lead
- Designed, configured, and implemented SEM-BPS and BW security with the following security objects: planning folders, planning levels, InfoObjects, table authorization groups, and document types
- Designed, configured, and implemented security for complex SEM-BPS and BW enhancements, interfaces, and conversions
- Managed audit of security design to ensure the SEM-BPS/BW solution met Sarbanes Oxley requirements
- Managed the security and resolved all problems related to the R3 Project Systems module and the BW reporting of said module, to include the BW Project Systems security enhancement that gave users access to one or multiple projects
- Designed, developed, and implemented R3 cost center security, to include a cost center security enhancement that enabled users to gain access to one or multiple individual cost centers versus an entire cost center group
- Configured and implemented BW cost center security enhancement that leveraged R3 cost center authorizations as well as the R3 cost center security enhancement authorizations
- Managed the security and resolved problems related to EBP, Profit Center & Cost Center Accounting, Internal Orders, Cost Allocation, Alternate Hierarchy, R3/BW Consolidations, Fixed Assets, Accounts Payable, Accounts Receivables, Special and General Ledger, Purchasing, Inventory, Media Product Master, Cost Element, and Cash Management
- Provided second-level production support to resolve simple to complicated user-related security problems across modules in a timely manner while interfacing with various functional teams
- Managed the security and resolved problems related to BDC sessions and edit error
- Performed bi-annual and quarterly reviews with Business Unit Approvers of user access and validity of user accounts
- Kept documentation current for security policies regarding password reset and unlocking user IDs, user request/approval process, user master record management, emergency access requests, SAP security parameter settings, user verification for password reset, assignment of SAP ALL/SAP NEW, security approach to table and program maintenance access, system administration, and batch processing and administration, unlocking of conversion programs, management of super user IDs, SAP security monitoring, authorized approver matrix, SAP security access form, CUA error log validation and processing procedures
Confidential, New Orleans, LA
SAP Security Consultant
Responsibilities:
- Performed SAP Security assessment of the productive environment and security-related processes, revealing opportunities to intentionally or unintentionally defraud Confidential
- Presented security assessment results and recommendations to Security Management, Staff and external auditors, bringing awareness to current SAP Security risks
- Developed strategy and implemented recommended security solutions, strengthening their current security strategy
- Provided expert security solutions for high-risk financial processes, drastically decreasing the possibility of fraud and abuse
- Developed roles to meet business requirements, ensuring ISU-CCS and other R/3 users can only perform functions required to complete their tasks
- Interfaced with business users and cross-functional teams, providing first level support for issues resulting from ISU-CCS quality assurance testing, and second level support to the Help Desk, resolving general security issues promptly and efficiently
- Provided expert customer support for day-to-day position-based and non-position-based security administration, turning all requests around within same business day
- Provided training to security personnel, increasing knowledge and awareness of SAP Security, monitoring, and potential security risks
Confidential, San Dimas, CA
Sr. Systems Analyst
Responsibilities:
- Co-defined SAP Security strategy using conceptual and analytical skills and strategic planning which allowed team to stay ahead of project plan dates and to quickly change security strategy when business direction changed
- Collaborated with business analysts and ABAP developers gathering requirements to define authorizations, unit test roles, and to secure custom code by adding authorization checks to programs, ensuring proper functionality and adherence to security standards
- Designed, implemented, and maintained security authorizations as required by business needs
- Developed SAP roles using custom security objects, authorization field groups, printer authorization groups, program authorization groups, and table authorization groups, using Profile Generator, providing the granularity required to protect ADP's money movement products
- Performed segregation of duties reviews to ensure appropriate transaction code assignment
- Performed SAP security maintenance and provided solutions to positive and negative security testing, stress and volume testing, pre-production (beta testing), and production support issues, ensuring appropriate functionality
- Successfully installed, configured and maintained Central User Administration (CUA), streamlining the process of creating and maintaining user master records and positioning team to quickly and effectively respond to security incidents
- Developed security standards for production and non-production; putting into place standards where none existed; in addition, enabling servers to be secured during the build process, reducing the chance of servers being deployed unsecured
- Presented SAP security strategy to internal and external auditors and management from various areas
- Bonus received for efforts in ensuring application security readiness, successfully positioning project team to meet critical deadline dates
