Sap Security Architect Resume
4.00/5 (Submit Your Rating)
Boston, MA
SUMMARY
- Hands - on SAP Security Architect with 8 years’ of experience providing advisory and subject matter expertise on SAP’s platforms: ECC, BW/BI, BOBJ, GRC, Enterprise Portal, HANA, CRM, SRM, CUA
- Proficient in gathering business requirements, understanding client needs and translating to blueprint design, testing and implementation using SAP’s ASAP methodology
- Skilled in establishing true test scenarios, tracking defects and resolution
- Experience in managing Go-Live activities and end-user support
- Proficient in SAP security audits, risk analysis and providing recommendations
- Excellent in executing Transports, User Management, Authorizations & Roles Management
- Proficient in teh GRC access control suite: SOD analysis (segregation of duties) and mitigation controls
- Adept in tracking project scheduling, budget and resource management
- Expert in stakeholder engagement, leading and coordinating projects
- Proficient in delivering presentations, documentation, and knowledge transfer to clients
- Passionate in mentoring junior colleagues and interns
PROFESSIONAL EXPERIENCE
Confidential, Boston, MA
SAP Security Architect
Responsibilities:
- Security lead and project coordinator developing SOW and design of SAP Architectural landscape
- Collect functional business requirements, establish blueprint design following security guidelines and standards.
- Create and maintain Analysis Authorizations in BW 7.5 (RSECADMIN)
- Create BW users (end users, power users, developers, basis) in SU01/SU10
- Create and maintain BW 7.5 roles in PFCG
- Perform authorization tracing and defect correction in ST01; Maintain authorizations in SU53.
- Create and modify design time roles (business and data access level) using scripts in HANA Studio
- Assign System, Object, Analytic, Application Privileges in HANA Studio to roles and users
- Create dynamic analytic privileges using store procedure and scripts
- Configure single sign on (SSO) in HANA using SAML/Kerberos certificates
- Configure single sign on in BOBJ with integration to Native HANA
- Integrate BI Security, HANA Views and BOBJ Security. Create Folder and Group structure; Access Level, Connections and Universe Security in BOBJ CMC (Central Management Console) and IDT (Information Design Tool)
- Troubleshoot missing authorizations and privileges in Native HANA
- Create different user types; creating and transporting roles for Developers, Power/End Users and Database Users
Confidential
Business Development/SAP Security Architect
Responsibilities:
- Reviewed BW 7.3 and ECC 6 landscape, architecture, roles, and authorizations
- Reviewed access control, process control and emergency access. Reviewed audit security logs
- Established Statement of Work (SOW) for SAP security project and allocated resources to teh project
- Collaborated with functional leads on gathering business requirements from users
- Reviewed SAP Security design documentation and recommended best practices for design improvement
- Utilized teh SAP GRC (Governance, Risk and Compliance) tool to mitigate SODs and risks
- Led workshops with process owners for process improvement
- Led RFP (request for proposals), developed business plans and delivered SAP business solutions to clients
- Tracked project deliverables and project performance against monthly targets
Confidential
SAP Security Consultant
Responsibilities:
- USDA (ECC, BW to BI Upgrade with Enterprise Portal and GRC)
- Polo Ralph Lauren (BW to BI Upgrade)
- Kelloggs (BI Implementation) ECC, BW/BI Security Implementation
- Led security architecture design for BW/BI security implementation
- Performed requirements gathering and design of teh “as is” Security landscape
- Analyzed client’s security setup vs. standard SAP delivered roles theirby recommended a redesign to job position-based security
- Developed blueprint design for ECC and BW/BI Security roles for SAP modules: FI, CO, and SD
- Maintain user master records using central user administration (CUA)
- Completed BI 7 Security Blueprint design for Clients containing roles, authorization objects, analysis authorizations
- Built all BI 7 Analysis authorizations and roles
- Unit tested all BI 7 authorizations on corresponding validated FI/CO and SD reports
- Established test scenarios for roles and authorizations
- Ran authorization traces using trace tools during Testing and Production
- Provided Go-Live support, client training and knowledge transfer
- Mapped all Authorization Relevant InfoObjects to BI Analysis Authorizations
- Determined all Restricted Key Figures and Characteristic values on validated queries
- Used Restricted Key Figures and Characteristic values to build BI Authorizations
- Worked with Audit team to redesign production roles to meet all SOX (Sarbanes Oxley) compliance standards and recommendations
- Analyzed delta between current and upgraded systems and delivered list of new transactions
- Updated existing roles with new transactions and authorization objects. Applied OSS notes as necessary Enterprise Portal and GRC
- Gatheird Business requirements and established a publishing strategy for EP 7 integration
- Built EP Roles and Query iViews
- Fully implemented EP 7 integration with client’s Active Directory for UME (user management engine) utilization
- Worked with business users to customize rulesets, defined risk levels and built mitigation controls
- Created and assigned firefighter IDs to users
- Generated SOD reports for management and executive review
