Senior Consultant (it/cyber Security) Resume
New, JerseY
SUMMARY:
- More than 15 years of IT experience as Cyber Security consultant, SAP Security Consultant, IT Audit Controls, System Admin - IT Infrastructure Architect, Business Analyst, Transitions.
- 7+ Years of experience as a SAP Security Consultant with good exposure in areas of system monitoring, security administration. Working on Topics like User Management (CUA/SAP-IDM, GRC), Transport Management, Scheduling and maintaining background jobs.
- 7+ Years experience in Infrastructure Architect (Technical & Lead Roles) Support and Implementation of network and computer hardware, leadership in phases of application development, Transition Manager, Problem Management.
TECHNICAL SKILLS:
IT Skills: Cyber Security, IT Security & Audit Controls, SAP Security & Compliance, IT Infrastructure, Incident Triaging.
Technologies: Cisco WSA, Cisco AMP, Cisco IPS/IDS, McAfee ePO, Dell SecureWorks, SAP R/3 4.6C/ECC 6.0, Virsa 4.2, GRC AC5.3, GRC10 - Emergency Access Mgmt., SAP IdM 7.1 (Identity Access Management), Approva Bizz rights, BW/BO, HANA sp12 - User Administration & Role Management. s Attended: Cyber Security - CSX ISACA, Cyber Security - Technology, Application and Policy - M.I.T Boston, SAP NW IdM 7.1, SAP NW IdM 7.2, SAP ADM940, ADM950, ADM960, SAP Cronacle/Redwood, Approva Bizz rights.
PROFESSIONAL EXPERIENCE:
Confidential, New Jersey
Senior Consultant (IT/Cyber Security)
Responsibilities:
- Operations maintenance Lead - Mentor and provide knowledge transfer sessions of available tools that are used by support teams to the subordinates. Have the ability to quickly assimilate to new knowledge based on the engagement.
- Research security standards, security systems. keep abreast with latest trends in the cyber security industry.
- Manage Cyber threat intelligence tools and make recommendations on new tools or services when renewals are required and develop and maintain documentation and standard operational procedures for cyber threat hunting.
- Review and analyze raw network captures and network flow data and security events to identify malicious and suspicious behaviors/signatures, technical components of malware, phishing and attacks & vulnerability assessment.
- Familiarity with security regulatory requirements and standards not limited to ISO 27000, NIST, understanding of GDPR.
- Strong understanding and exposure to E-mail security, Operating System Security, Web Security, Incident Response, Security Audits and Assessments, Malware Analysis, Monitoring and log analysis. Triaging, Stabilizing, re-mediating Security Incidents.
- Maintain policies and control standardsas to ensure that the CLIENT's IT controls framework is operating effectively and in accordance with its business and regulatory requirements.
- Triaging, Stabilizing, investigating and re-mediating IT Security Incidents Review appropriate procedures and evidence to ensure continuous compliance with firm IT policies, regulations and customer requirements.
- Perform security assessment and compliance activities by using the existing client procedures.
- Identifying potential areas of compliance vulnerability and risk. Facilitates the formulation of corrective action plans for resolution of problematic issues.
- Collaborate with IT professionals to determine if solutions currently exist (internally or externally) or whether new solutions are feasible to meet business requirements.
- Provide overall support to ensure the successful testing, and implementation of applications that support the business unit.
- Responsibility for maintaining documentation on all incidents and job-related procedures.
- Support in the completion of audits and/or projects within established timelines - Interact with IT Security Director and SME group.
- Assist in the development and maintenance of policies, standards, processes, and procedures to assess, monitor, report, escalate and remediate risk and compliance issues.
- To work with IT managers, staff, business users and 3rd party vendors in order to provide timely and efficient IT coordination of security services to business needs.
- Assists the business process redesign and documenting the same as needed for new technology.To Train the customer staff on application security and remediation of the issues.
- Understanding the importance of Business Ethics and setting up of the best practices in the AMS support delivery model - Follow and update operational processes, policies and procedures.
- Acts as a liaison between external/internal auditors and the technology teams as to execute the audit plan and documenting reports and work on recommendations/Mitigating risks (Deloitte, E&Y) with the defined time-frame.
- Guides and Tracks remediation efforts for all deficiencies noted by Internal/External Audits.SAP analysis of production systems for audit related tasks. (Inactivity, SOD conflicts, approvals, and owners for accounts).
- General administrator responsibilities including creation of users, troubleshooting of Approva, ECC and BW /BOBJ security tasks.
- Demonstrated ability to analyze, define, and recommend security concepts, processes, and continuously contribute to improvement to meet business needs.
- Defining and implementing security policies, standards and baselines.
- Collaborate with technology teams by performing security analysis of solutions, risk assessment including security requirements.
- Proactive management of associated risks to user’s profile in the system.
- Perform periodic reviews, in conjunction with Internal Audit, to assure that security policies and procedures are being complied with, and develop recommendations for improvements.
- Documenting policies (Run book) and procedures surrounding the system including daily, weekly and monthly tasks within the security team.
- Responsible for ensuring information systems are secure and systems are protected from unauthorized access.
- Maintain compliance in all business control activities by Controlling permissions and user rights.
- Maintain good stakeholder engagement and vendor/supplier relationships.
- Responsible for all SAP Security tasks, role design, development, configuration, troubleshooting, resolution, and documentation of all Production, Test, Development Systems of all SAP landscapes.
- Maintenance of SOD rules during role redesign project based on audit requirements.
- Emergency user definition and approval process setup for the business.
- Supporting SAP Business Support, Business Integration Managers, Super Users, in Role Testing and change management procedures.
- Clean-up existing Roles to be compliant with new Security Design.
- Administrating ‘APPROVA Bizz Rights’ tool used for day to day SoD analysis for the users.
- Works well both in a team environment and independently.
- Ensure client satisfaction by setting up the Governance Meetings on regular basis.
Confidential
SAP Security Consultant, System Operations lead specialist
Responsibilities:
- Provide Leadership and Coaching to offshore (Team Size - 14) - IdM 7.2 & GRC10 upgrade project.
- Requirement gathering and Implementing / enhancing the business solution into IdM including workflow configuration setup in IdM.
- Handling Position based security through HCM system and Identity access management tool (IdM).
- User administration with Identity Access Management tool (SAP IdM) - GUI based.
- Role administration using PFCG.
- Implementing Emergency Access Management for GRC10 and setting up of jobs for reporting and logging.
- Day today issues handling related to User Access Management, interface setup and troubleshoot connectivity issues with the systems in the landscape, Regular Communication with Stakeholders and cross functional teams for issues handling.
- Supporting SAP applications to meet the needs of the business and in compliance with the corporate security strategy, maintain compliance and business support model
- Support all SAP go live activities as related to IdM/GRC, Advise business users on how to use tool, Create documentation, Support all systems connected to IdM/GRC as related to issues with the application, manage daily support calls, configure IdM/GRC to connect to SAP.
- Configured GRC Emergency Access Mgmt along with Workflow (MSMP) for Firefighter Approval process.
- Preparing Documents for Technical & Business users, Updating Collaboration site, Solman and HPQC as to maintain consistency and good practices as per industry standards.
- Focus the team on the tasks at hand, Facilitate problem solving and maintain healthy relationship as to meet internal and external customer requirements.
- Deliver s (Technical & Business users), Closure of scheduled tasks and meeting deliverables. Cross team Co-ordination. Raising SAP Support Incidents for defects resolution.
Confidential
SAP Security Consultant
Responsibilities:
- Successfully Transition of the account at Offshore (Guided phase, Assistance phase, Parallel phase) Preparation of Application Information Document as for the application understanding and formal sign-off from the client.
- IDM server administration 7.1
- IDM for provisioning (ABAP, Portal Systems) based on request.
- Handling IDOC’s processing issues from HR system to IDM sync.
- Handled Go Live and Post Go Live activities for China, Japan.
- Uploading of mass users and privileges in IDM based on mass load job in IDM.
- Troubleshooting IDM access related issues for users (grant role/privilege access to users in IDM).
- User Administration through IDM (creating roles/privileges).
- Providing project specific cross of IDM to team members across locations.
- Extensive knowledge on GRC CUP and IdM integration.
- Creating OSS id and Authorization, Registering developers for Developer/Object Keys access. Raising OSS for SAP for support.
- Medium exposure to Project Management skills, Excellent skills in organizing, team leading.
- Role Administration using PFCG.
- Assist users with access problems and authorization issues using SUIM and SU53.
- Compliant User Provisioning (CUP): Daily support all workflow issues, provide reports for audit teams and provide data requested for role owners, roles. Configure CUP to work with new systems.
- EAM: Setting up of FF owners.
Confidential
SAP Security Consultant / InfoSec Consultant.
Responsibilities:
- Requirement gathering, blueprint preparation, Realization. Understanding current landscape at client location. Involved in SAP ECC project lifecycle from Design to Post-implementation.
- Implementing SAP Security for the newly installed SAP ECC system as per project plan.
- Cleaning and adapting the roles (Merging, Renaming and Testing all the new roles with the functional and key-users)
- Role Administration using PFCG.
- Assigning the roles to the required Users as per role matrix for FI, CO, SD, MM, HR modules.
- Documenting the Procedures and process.
- Temporarily assigned SAP NEW profile to critical users (Developers, administrators, and end-users) to provide them interim access to new authorization objects.
- Review Security logs from Software and determine Impact of the error.
- Acting as Triage to the Incident - Analyzing Security Incident, Remediating and performing RCA.
Confidential
Redwood Lead / SAP Security Consultant
Responsibilities:
- Preparing the SLA, monthly and weekly reports.
- IDM server monitoring - Performance Monitoring and reporting any job related error to SME.
- As Dispatcher - Monitoring the Ticketing Tool Support group and ensured that there is equal distribution of Incidents among all the Consultants and ensure that user problem tickets are updated and solved within SLA.
- Co-ordination among the various SAP security process teams and Basis team and others.
- Import / Export of SAP System Standard & Periodic Jobs into CPS.
- License Configuration on DEV & PROD CPS Application Server.
- Setting up of OSS connection, configuring and updating of system landscape data in SAP service marketplace.
- Implementing and Scheduling ABAP jobs, Interface Configuration in form of Job chains in CPS.
- Day today Monitoring, Troubleshooting of Special/Critical Jobs in PROD / Non-PROD environment.
- Process server Installation ° Applying Licenses ° Process Server Upgradation.
- Preparing Decks, Participating and arranging meetings for Sign-off from various teams (functional) to handover systems after job implementations.
- Raising OSS Messages as to report bugs/issues in the application and providing dumps for analysis.
Confidential
Redwood Lead / SAP Security Consultant
Responsibilities:
- Central User Administration - User creation, password reset, global unlock and role assignment through CUA.
- Day today User administration.
- Providing temporary Access, Emergency Access and Configuration User Id’s based on request.
- Troubleshooting Security issues involving role changes, Day today Incident Management - Tansport of roles, user & authorization related issues using Trace (ST01), SUIM, SU53 transactions.
- Assigning specific roles to users after analyzing the SU53.
- Broad experience in maintaining single, composite, and derived roles using Profile Generator (PFCG).Defining new roles according to business design. Transporting of Roles.
- Producing and analyzing reports in SAP using SUIM, and security related tables (AGR*, USR*, USH* etc)
- Creating OSS id and Authorization, Registering developers for Developer/Object Keys access.
- Assisted in the security processes for User Acceptance Testing( In Support with Functional Team )
- Communication with client for analyzing user issues or security compliance/Sox issues & fixing it along with Sox Manager.
- Worked on ticketing tool to resolve the issues & problems in different kinds of Sap Security modules - SD, FICO, MM, PP, MDM.
- SAP Security through PFCG and Management of Users and Authorizations.
- Implementing and Scheduling ABAP jobs ° Interface Configuration ° OS jobs as in form of Job chains in Redwood.
- Day today Monitoring, Troubleshooting of Special/Critical Jobs in PROD / Non-PROD environment.
- Process server Installation ° Applying Licenses ° Process Server Upgradation.
- Successfully handled 4 go-live phases and provided leadership during HYPERCARE for business UAT (Hypercare is the support from Project team to the new application for the decided set of days, weeks etc. as per business needs.) - Portugal, Hungary, Denmark, Germany go lives.
- Import / Export of SAP System Standard & Periodic Jobs into redwood.
- License Configuration on DEV & PROD redwood Application Server.
- Day to day Incident / Problem Management / Identifying root causes, outlining resolution options.
- Transports between Dev, QAS, and PRD servers using STMS.
- Understand and coordinate client’s needs / enhancements, customization, software-related issue of clients and consult with technical team to provide solutions in adherence to delivery schedules.
- Raising OSS Messages as to report bugs/issues in the application and providing dumps for analysis.
- Escalations handling and supporting team members in various technical issues.
- Involved in setting up the Offshore Support Team. Understand the application and its business rules from Onsite and trained the support members for Defect free delivery.
- Responsible for setting up the Infrastructure Server Support Team at Offshore.
- Understanding of the applications and its business rules from Onsite and trained the support team members technically for Defect free delivery.
- Designated as an active member for hiring & work on boarding.
- Preparing of Application Information documents (Technical) for further Sign-Off as to bring them into Steady State.
- Handling of Post transition activities - Evaluating Support Team members and rectifying gaps and mentoring.( GAP analysis and preparation of skills matrix plan ) ed with several performance s for value added work, professionalism and confidence.
- Leadership in Parallel Performance and Technical Leadership to the team.
Confidential
Technical Lead (Server Support)
Responsibilities:
- Setting up of daily Meetings & Team Huddle regularly for Onshore - Offshore Sync to maintain defect free delivery and proper shift hand-over.
- Helping out new and junior members of the team as appropriate in terms of mentoring and guidance around technical/functional area and help them develop their skills and capabilities.
- Handling Problem and Change Management
- Preparing the Design Standards/Development Standards. Maintain technical and documentation standards in delivery.
- Server Administration, providing Support on 24*7 Basis.
- Monitoring Day today problems & resolving the errors by logging onto Servers Remotely via tools like MSTSC, VNC, PC Anywhere, and Dameware etc.
- Responsible for Server Health Checks for Branch & Corporate Servers & Datacenter Servers.
- Troubleshooting the problems w.r.t Hardware & Application on Servers and resolving by coordinating with Onsite Support & IBM Hardware vendors and Performing QA for the servers.
- Maintaining Compliance by Deploying Patches on the Servers, Maintaining Security on the servers by doing User revalidation / Management, Setting user roles & file permissions, Setting Performance Monitor on the servers.
- Writing monthly IT Security Diary as per IBM standards as to maintain compliance & IT standard within the organization.
- Perform Problem Management, Manage Performance/Capacity, Use Systems Monitor Tools, and Ticketing Tool - Heat, Info man, IBM-ManageNow, Remedy, and Maximo as per Lean Methodology.
Confidential
Senior Network Administrator
Responsibilities:
- Appointed as the first Service Management contact point for the delivery organization for all the "operational activities of the customer".
- Monitoring APL Servers, Links for APAC region with help of monitoring tools - Vital Suite, Big Brother.
- Maintaining day to day application support to end users (APAC)
- Monitoring Requests created in Kintana and ensures proper routing of requests to appropriate persons for further troubleshooting within SLA.
- Chasing request owners, approvers, administrators to ensure completion of requests within timeframe via e-mail / Voice Calls.
- Guiding Team in Preparing User guides for types of requests configured in Kintana, and helping end-users in understanding workflow - by uploading the same on Intranet site.
- Preparing Daily / Weekly reports w.r.t links, requests.
- Providing service support based upon defined service level agreements.
Confidential
Lead (Network Administrator)
Responsibilities:
- Configure, install, maintain, troubleshoot, and support Hardware / LAN equipments. LAN consists of more than 600 systems of HP / Dell make.
- Designated as Spoc to set-up the entire Gurgaon IT Infrastructure from scratch i.e. Installation of Servers (File Server, FTP Server, Terminal Server etc.), Workstations, Setting up of connectivity across the Development Center’s, Setting up of VOIP box etc.
- Ensure maintaining an accurate inventory of all LAN/WAN hardware and software.
- Work with hardware Vendors & ensure timely service of all equipments.
- Preparation of Shift Roster, allocation of task and assisting juniors in handling support work.
- Provides day to day support to end users, including LAN connectivity, hardware, software, printing and telephony issues, and enterprise-wide IT servers and applications.
- Installing, Designing & configuring servers (HP / Dell / Compaq) based on client requirement.
- Installation of VOIP phones & configuring on EPABX - Nortel 11c Meridian.
- Provides hardware and software administration and maintains the highest level of systems availability.
- Responsible for installation, operation, troubleshooting, and support of telephony systems.
- Responsible for system integration and networking of Computers on big Projects.
- Deployment of NAV and SUS client to desktops and servers and audit the network for any corruption on the daily basis, auditing and reporting the same as per corporate requirement.
- Maintaining system backups and control records restore corrupted data.
- Installation of SAP R/3 4.6x on windows2X server with Database Oracle as per the project.
Confidential
Customer Support Engineer
Responsibilities:
- Day to day Monitoring Configuration and Maintenance of mail servers using Lotus Domino R5 which includes Monitoring of mail queues, user id creation / deletion, DL and group, Proper replication of databases, Implementation of rights and permissions, Backups and Restoration of mails servers using DAT drives with Ntbackup, Handling mail clients using Lotus Notes and network systems to insure proper functioning.
- Installing and configuring computer hardware and software and procedures to enhance existing network providing technical assistance to users, maintaining system backups and control records, restore corrupted data.
- Deploying New Servers, Antivirus Management, and Network Printers, performing co-ordination with Vendors and scheduling hardware repairs. Internal Network comprised of more than 200 Computers of IBM make.
- Operating systems used for servers and desktops are windows NT4 server and win98 series . Troubleshooting in terms of both Computer hardware and software and maintaining of LAN/WAN was also an integral part of job profile.
- Troubleshooting WAN Connectivity through Leased Line Modems & RF Modem with offices at remote locations.
Customer Support Engineer
Confidential
Responsibilities:
- Desktop, LAN support and coordination with other centers with respect to connectivity and Servers support (Compaq Proliant)
- Installed of various software products.
- Troubleshooting of hardware and Network related problems, Desktop Support for users using various software.
- Troubleshooting when ever required the connectivity, printers, Hubs and Modems.
- Installation of OS (WinNT, Win2K, Linux configuration and maintenance)
- Up gradation of hardware and software.
- Vendor Management.
- Installation of PDC's, BDCs, assigning of permissions to Groups and Users and installation and maintenance of LAN's and Server.
- Troubleshooting of hardware and Network related problems, Desktop Support for users.
- Installation of various software applications. (Microsoft, Adobe, Corel products)
- Troubleshooting when ever required the connectivity, printers, Hubs and Modems
- Hardware Troubleshooting / Repairing of IT Equipments (CPU, Printer etc.)
- Lotus Notes server/client R5 configuration.
- Digital Camera Setup & Video Conferencing / Web-based Conference Setup
- Configuring of Nortel 02 Phone sets to Nortel Epabx- Meridian 11c
- Microsoft Certified Professional - Microsoft Windows 2000 Server (Installing, Configuring & Administering Win2000 Server).