We provide IT Staff Augmentation Services!

Sap Security Architect Resume

4.00/5 (Submit Your Rating)

Boston, MA

SUMMARY

  • Hands - on SAP Security Architect with 8 years’ of experience providing advisory and subject matter expertise on SAP’s platforms: ECC, BW/BI, BOBJ, GRC, Enterprise Portal, HANA, CRM, SRM, CUA
  • Proficient in gathering business requirements, understanding client needs and translating to blueprint design, testing and implementation using SAP’s ASAP methodology
  • Skilled in establishing true test scenarios, tracking defects and resolution
  • Experience in managing Go-Live activities and end-user support
  • Proficient in SAP security audits, risk analysis and providing recommendations
  • Excellent in executing Transports, User Management, Authorizations & Roles Management
  • Proficient in teh GRC access control suite: SOD analysis (segregation of duties) and mitigation controls
  • Adept in tracking project scheduling, budget and resource management
  • Expert in stakeholder engagement, leading and coordinating projects
  • Proficient in delivering presentations, documentation, and knowledge transfer to clients
  • Passionate in mentoring junior colleagues and interns

PROFESSIONAL EXPERIENCE

Confidential, Boston, MA

SAP Security Architect

Responsibilities:

  • Security lead and project coordinator developing SOW and design of SAP Architectural landscape
  • Collect functional business requirements, establish blueprint design following security guidelines and standards.
  • Create and maintain Analysis Authorizations in BW 7.5 (RSECADMIN)
  • Create BW users (end users, power users, developers, basis) in SU01/SU10
  • Create and maintain BW 7.5 roles in PFCG
  • Perform authorization tracing and defect correction in ST01; Maintain authorizations in SU53.
  • Create and modify design time roles (business and data access level) using scripts in HANA Studio
  • Assign System, Object, Analytic, Application Privileges in HANA Studio to roles and users
  • Create dynamic analytic privileges using store procedure and scripts
  • Configure single sign on (SSO) in HANA using SAML/Kerberos certificates
  • Configure single sign on in BOBJ with integration to Native HANA
  • Integrate BI Security, HANA Views and BOBJ Security. Create Folder and Group structure; Access Level, Connections and Universe Security in BOBJ CMC (Central Management Console) and IDT (Information Design Tool)
  • Troubleshoot missing authorizations and privileges in Native HANA
  • Create different user types; creating and transporting roles for Developers, Power/End Users and Database Users

Confidential

Business Development/SAP Security Architect

Responsibilities:

  • Reviewed BW 7.3 and ECC 6 landscape, architecture, roles, and authorizations
  • Reviewed access control, process control and emergency access. Reviewed audit security logs
  • Established Statement of Work (SOW) for SAP security project and allocated resources to teh project
  • Collaborated with functional leads on gathering business requirements from users
  • Reviewed SAP Security design documentation and recommended best practices for design improvement
  • Utilized teh SAP GRC (Governance, Risk and Compliance) tool to mitigate SODs and risks
  • Led workshops with process owners for process improvement
  • Led RFP (request for proposals), developed business plans and delivered SAP business solutions to clients
  • Tracked project deliverables and project performance against monthly targets

Confidential

SAP Security Consultant

Responsibilities:

  • USDA (ECC, BW to BI Upgrade with Enterprise Portal and GRC)
  • Polo Ralph Lauren (BW to BI Upgrade)
  • Kelloggs (BI Implementation) ECC, BW/BI Security Implementation
  • Led security architecture design for BW/BI security implementation
  • Performed requirements gathering and design of teh “as is” Security landscape
  • Analyzed client’s security setup vs. standard SAP delivered roles theirby recommended a redesign to job position-based security
  • Developed blueprint design for ECC and BW/BI Security roles for SAP modules: FI, CO, and SD
  • Maintain user master records using central user administration (CUA)
  • Completed BI 7 Security Blueprint design for Clients containing roles, authorization objects, analysis authorizations
  • Built all BI 7 Analysis authorizations and roles
  • Unit tested all BI 7 authorizations on corresponding validated FI/CO and SD reports
  • Established test scenarios for roles and authorizations
  • Ran authorization traces using trace tools during Testing and Production
  • Provided Go-Live support, client training and knowledge transfer
  • Mapped all Authorization Relevant InfoObjects to BI Analysis Authorizations
  • Determined all Restricted Key Figures and Characteristic values on validated queries
  • Used Restricted Key Figures and Characteristic values to build BI Authorizations
  • Worked with Audit team to redesign production roles to meet all SOX (Sarbanes Oxley) compliance standards and recommendations
  • Analyzed delta between current and upgraded systems and delivered list of new transactions
  • Updated existing roles with new transactions and authorization objects. Applied OSS notes as necessary Enterprise Portal and GRC
  • Gatheird Business requirements and established a publishing strategy for EP 7 integration
  • Built EP Roles and Query iViews
  • Fully implemented EP 7 integration with client’s Active Directory for UME (user management engine) utilization
  • Worked with business users to customize rulesets, defined risk levels and built mitigation controls
  • Created and assigned firefighter IDs to users
  • Generated SOD reports for management and executive review

We'd love your feedback!