We provide IT Staff Augmentation Services!

Sap Security Consultant Resume

0/5 (Submit Your Rating)

SUMMARY

  • As SAP Security Consultant, Christia has extensive years experience in an Enterprise Resource Planning environment. Managed complex IT projects which has substantial financial impact on businesses.
  • Has hands - on experience wif Installation, configuration and Implementation of ECC, NetWeaver, & GRC 10.x/ Access Control (SOX/SOD).
  • Wide ranging understanding of core R/3 system, SAP Basis Administration, SAP NetWeaver components (XI, BI/BW, EP, HCM), Administration of J2EE engine, Applying Kernel patches, Support Packs and Java patches, worked on CUA, BI/BW 7.X, ECC 6.0 wif Unicode conversion, Integrating R/3 wif BW.
  • As a GRC consultant, me have applied teh acquired business process experience along wif technical experiences to deliver teh overall design and approach to SAP security. Interfaced extensively wif clients to gain insight and develop solutions to meet customer business needs across teh entire SAP landscape.

CORE COMPETENCES:

  • Designing and implementing GRC Tool,
  • HCM/HR Structural Authorizations,
  • BI/BW Analysis Authorizations,
  • ECC General Authorizations
  • Security Strategy/Vulnerability,
  • Creation/Management (Profiles & Roles),
  • Authorizations management,
  • Serve as an integrator to teh functional and business teams
  • Utilize GRC MSMP/BRF+
  • Configured ARM
  • Understand PKI/CA
  • GRC Post Installation activities,
  • Support packages,
  • Configuring EUP
  • Configured BRM,
  • Transport Management system
  • Single Sign On (SSO)
  • Intrusion Prevention/Detection (IDS/IPS)
  • Understand Central User Administration (CUA)
  • Configured EAM
  • Configure ARA
  • Create customize Business Rule Set

PROFESSIONAL EXPERIENCE

SAP Security Consultant

Confidential

Responsibilities:

  • Perform SAP Security monitoring and support in SAP environment to provide continuous services.
  • Configured steps to create End User Personalization template
  • Maintain and customize Notification Template in Workflow process
  • Help Business to standardize role compliance into terms their end users will understand it
  • Very strong in SAP authorization and security administration.
  • Collaborates wif client to perform audit and compliance to ensure that SAP system environment is up to pair wif their expectation.
  • Work wif other team members (Functional and Technical team) to establish required roles and authorization that accordance wif teh SOD guideline.
  • Have strong project management SAP project using structure approach and best practices.
  • Participate as team member in SAP security analysis, role design, prepare authorization assigning, and implementation.
  • Provide other SAP authorization and security support as diem fit.
  • Ability to apply noledge of multidisciplinary business principals and practices to achieve successful outcomes in cross-functional projects and activities.
  • Perform security monitoring, health check and maintenance control checklists.
  • Assist in mapping technical security roles to users in (GRC, BW/BI, HCM and ECC) environment.
  • User administration: creation, locking, unlocking, and password reset.
  • Assignment of roles and authorization to users.
  • Developing SAP Security Roles, Profiles and Authorizations using teh SAP Authorization Concept using Profile Generator tool ( Confidential ).
  • Generate Mass Profile using SUPC transaction code
  • Role maintenance and role transportation.
  • Sound noledge in business process control, for instance, Segregation of Duties (SOD) wif Access control.
  • Documents SAP security design and administration processes, creates operational guides, and monitors existing operational guides for consistency and completeness.
  • Experience wif using Audit Information Systems (AIS) logs (SM19, SM20 and SM18)

SAP Security Administration

Confidential, Maryland

Responsibilities:

  • Transported teh generated roles and profiles using SCC1 and SE09/SE10.
  • Created User Groups by using transaction code SUGR.
  • Worked on SU10 to perform mass operations.
  • Analyze and troubleshoot security issues using SU53, ST01 and SUIM
  • Resolved issues using SU53, ST01 and Debug mode.
  • Worked on critical authorization Objects like S TABU DIS, S DEVELOP, S RZL ADM, S ADMI FCD
  • Built Analysis Authorizations using teh transaction RSECADMIN.
  • Build and tested BPC roles and provide Security appropriate authorizations to teh team.
  • Setup security at teh Info objects level (field-level security).
  • Created Custom Reporting Authorization Objects using transactionRSSM.
  • Linked teh Custom Authorization Object to teh Info provider
  • Created roles restricting access toInfo cubes,ODS objects, specificqueriesandworkbooks.
  • Assigned teh Analysis Authorizations to teh role using teh object S RS AUTH.
  • Troubleshoot authorizations related problems using RSECADMIN
  • Made teh info objects 0TCAACTVT, 0TCAIPROV, 0TCAVALID “authorization-relevant” in teh info object maintenance tool RSD1.
  • Troubleshoot analysis authorizations related problems usingRSECADMIN.
  • Build security and successful testing of various objects related to Dashboard.
  • Worked wif Dynamic actions and info type’s tables.
  • Worked on Authorization Objects P ORGIN, P ABAP, P PERNR, P ORGXX etc.
  • Assigned structural profiles to users using teh program RHPROFL0
  • Maintained authorization profiles using OOSP.
  • Experience on NWBC and fixing Security related issues.
  • Setup and maintained Organizational Structure including Organizational Units, Jobs, Positions, Cost Center assignments etc.
  • Assigned tasks to positions and integrated all these into teh enterprise organizational plan.
  • Assigned teh various organization units and positions to cost centers.

Linux System Administration / SAP

Confidential, Largo Maryland

Responsibilities:

  • Installed and configured Red Hat Enterprise Linux 5.x on front and back-end hardware. Resolve and troubleshoot installation problems on Network communication (IP, DNS, FTP, ISDN, etc). Installed third-party software packages wif Linux tool (RPM) on teh Servers and desktops environment. Create users account, and disk space in Linux environment. Maintain user access to teh server. Automate and schedule Linux processing using script, and Perl.
  • Performance tuning and systems health check. Month end job monitoring and checklist preparation. User Account / Profiles Management, Creation, Modification and deletion of teh user per teh process defined. Creation and modification of Roles and profiles per teh requirement using Confidential . Converting 4.6C Profiles to 4.7 Roles using Profile Generator.
  • Security upgrade using SU25 and profile generator ( Confidential ). Assisting Functional consultants to arrive at teh exact requirement for different Roles and Jobs in teh organization. Modification of teh User access based on company’s requirements specification. Usage of SUIM transaction code to monitor user activities. Daily performance checking and system uptime. System monitoring and checking for system locks, database locks, update records, system log, and ABAP dumps.

Senior Consultant

Confidential, Minneapolis, Minnesota

Responsibilities:

  • Developed an in-depth noledge and background in areas of installation, implementation and configuration of Tivoli Framework, ITM, Tivoli Configuration Management, and TEC in NT and UNIX. Created Endpoints, Policy Region, Profiles Managers, Managed Nodes, Gateways, and Profiles. Develop standards and criteria for assessing TMR performance, availability, capacity, or configuration problems. Coordinate wif other Tivoli Administrators at various different sites to troubleshoot and resolve any Tivoli problems that might arise in teh Enterprise. Resolve any installation problems that might arise due to Network communication issues. Installed and configured of Tivoli Endpoints on various computers in different locations.
  • Swhere me helped in teh development of IDD Admin user/training document. Created IDD Scanner that Compaq IT group used to scan Ericsson 100,000 desktops and servers. Wrote maintenance documentation, trained and answered technical questions on IDD/Connect-IT.
  • Senior Consultant wif Confidential at Manulife Financial in Toronto, Canada where me helped in creating and implementation of IDD scanner on 10,000 desktops from January 2001 - May 2001. Worked wif Manulife various departments in an effort to provide valuable information.
  • Managed a project, which included training and managing variable staff to upgrade 2300 Desktops to MS Office 97 for various Delaware Dupont Agricultural Global Technology business sites.
  • Managed a project that involved desktop leasing and migration of clients from All in One to Lotus Notes and MS Office97 for teh DuPont White Pigment & Mineral Products business. Participated as a supplemental project team member in Chicago to help complete teh project for another CSC account while managing current projects. Migrated various DuPont businesses from different platforms to NT 4.0 environment and trained end-users. Worked closely wif teh client to ensure their needs were met.
  • Managed IT departments. Recommended an NT environment and trained all teh users in teh new environment. Customized and enhanced teh existing Pick/Sequel software to generate reports for teh company’s financial and forecasting decisions. Worked wif third party vendors to purchase computer supplies and schedule maintenance for all communications equipment. Documented procedures for installation, use, and troubleshooting of teh hardware and software for teh client.

TECHNICAL SKILLS

Operating Systems: Red Hat Enterprise Linux, Windows NT 4.0 Server,Windows 2000, Windows 2003 & 08, Netware 3.X, SUN Solaris 2.X, MS-DOS 6.2, XP, Windows 7, ECC 5.0 / 6.00, AIX 4.1.5, 6.5 Server.

Management/Tools: SAP R/3 4.5, 4.6e, ECC 5.0,ECC6.0, CRM 5.0, version 7.0, EP 7.0, NetWeaver 04s/ 7x, XI/ PI 3.5 & 7.0, BI/BW 3.5 & 7.00.

We'd love your feedback!