We provide IT Staff Augmentation Services!

Sap Security Consultant Resume Profile

4.00/5 (Submit Your Rating)

NJ

SUMMARY

As SAP Security Consultant, Christian has extensive years experience in an Enterprise Resource Planning environment. Managed complex IT projects which has substantial financial impact on businesses. Has hands-on experience with Installation, configuration and Implementation of ECC, NetWeaver, GRC 10.x/ Access Control SOX/SOD . Wide ranging understanding of core R/3 system, SAP Basis Administration, SAP NetWeaver components XI, BI/BW, EP, HCM , Administration of J2EE engine, Applying Kernel patches, Support Packs and Java patches, worked on CUA , BI/BW 7.X, ECC 6.0 with Unicode conversion, Integrating R/3 with BW. As a GRC consultant, I have applied the acquired business process experience along with technical experiences to deliver the overall design and approach to SAP security. Interfaced extensively with clients to gain insight and develop solutions to meet customer business needs across the entire SAP landscape.

PROFESSIONAL EXPERIENCE

SAP Security Consultant

Confidential

  • Perform SAP Security monitoring and support in SAP environment to provide continuous service.
  • Very strong in SAP authorization and security administration.
  • Collaborates with client to perform audit and compliance to ensure that SAP system environment is up to pair with their expectation.
  • Work with other team members Functional and Technical team to establish required roles and authorization that accordance with the SOD guideline.
  • Have strong project management SAP project using structure approach and best practices.
  • Participate as team member in SAP security analysis, role design, prepare authorization assigning, and implementation.
  • Provide other SAP authorization and security support as diem fit.
  • Ability to apply knowledge of multidisciplinary business principles and practices to achieve successful outcomes in cross-functional projects and activities.
  • Perform security monitoring, health check and maintenance control checklists.
  • Assist in mapping technical security roles to users in GRC, BW/BI, HCM and ECC environment.
  • User administration: creation, locking, unlocking, and password reset.
  • Assignment of roles and authorization to users.
  • Developing SAP Security Roles, Profiles and Authorizations using the SAP Authorization Concept using Profile Generator tool PFCG .
  • Role maintenance and role transportation.
  • Sound knowledge in business process control, for instance, Segregation of Duties SOD with Access control.
  • Documents SAP security design and administration processes, creates operational guides, and monitors existing operational guides for consistency and completeness.
  • Experience with using Audit Information Systems AIS logs SM19, SM20 and SM18

SAP Security Administration

Confidential

  • Linked the Custom Authorization Object to the Info provider
  • Created Custom Reporting Authorization Objects using transaction RSSM.
  • Setup security at the Info objects level field-level security .
  • Build and tested BPC roles and provide Security appropriate authorizations to the team.
  • Built Analysis Authorizations using the transaction RSECADMIN.
  • Worked on critical authorization Objects like S TABU DIS, S DEVELOP, S RZL ADM, S ADMI FCD
  • Resolved issues using SU53, ST01 and Debug mode.
  • Analyze and troubleshoot security issues using SU53 , ST01 and SUIM
  • Worked on SU10 to perform mass operations.
  • Created User Groups by using transaction code SUGR.
  • Transported the generated roles and profiles using SCC1 and SE09/SE10.
  • Created roles restricting access to Info cubes, ODS objects, specific queries and workbooks.
  • Assigned the Analysis Authorizations to the role using the object S RS AUTH.
  • Troubleshoot authorizations related problems using RSECADMIN
  • Made the info objects 0TCAACTVT, 0TCAIPROV, 0TCAVALID authorization-relevant in the info object maintenance tool RSD1.
  • Troubleshoot analysis authorizations related problems using RSECADMIN.
  • Build security and successful testing of various objects related to Dashboard.
  • Worked with Dynamic actions and info type's tables.
  • Worked on Authorization Objects P ORGIN, P ABAP, P PERNR, P ORGXX etc.
  • Assigned structural profiles to users using the program RHPROFL0
  • Maintained authorization profiles using OOSP.
  • Experience on NWBC and fixing Security related issues.
  • Setup and maintained Organizational Structure including Organizational Units, Jobs, Positions, Cost Center assignments etc.
  • Assigned tasks to positions and integrated all these into the enterprise organizational plan.
  • Assigned the various organization units and positions to cost centers.

Linux System Administration / SAP

Confidential

  • Installed and configured Red Hat Enterprise Linux 5.x on front and back-end hardware. Resolve and troubleshoot installation problems on Network communication IP, DNS, FTP, ISDN, etc . Installed third-party software packages with Linux tool RPM on the Servers and desktops environment. Create users account, and disk space in Linux environment. Maintain user access to the server. Automate and schedule Linux processing using script, and Perl.
  • Performance tuning and systems health check. Month end job monitoring and checklist preparation. User Account / Profiles Management, Creation, Modification and deletion of the user per the process defined. Creation and modification of Roles and profiles per the requirement using PFCG. Converting 4.6C Profiles to 4.7 Roles using Profile Generator.
  • Security upgrade using SU25 and profile generator PFCG . Assisting Functional consultants to arrive at the exact requirement for different Roles and Jobs in the organization. Modification of the User access based on company's requirements specification. Usage of SUIM transaction code to monitor user activities. Daily performance checking and system uptime. System monitoring and checking for system locks, database locks, update records, system log, and ABAP dumps.

Senior Consultant Predictive Systems

Confidential

  • Developed an in-depth knowledge and background in areas of installation, implementation and configuration of Tivoli Framework, ITM, Tivoli Configuration Management, and TEC in NT and UNIX. Created Endpoints, Policy Region, Profiles Managers, Managed Nodes, Gateways, and Profiles. Develop standards and criteria for assessing TMR performance, availability, capacity, or configuration problems. Coordinate with other Tivoli Administrators at various different sites to troubleshoot and resolve any Tivoli problems that might arise in the Enterprise. Resolve any installation problems that might arise due to Network communication issues. Installed and configured of Tivoli Endpoints on various computers in different locations.
  • Senior Consultant with Predictive Systems at Compaq site in Sweden January 2002 - March 2002 where I helped in the development of IDD Admin user/training document. Created IDD Scanner that Compaq IT group used to scan Ericsson 100,000 desktops and servers. Wrote maintenance documentation, trained and answered technical questions on IDD/Connect-IT.
  • Senior Consultant with Predictive Systems at Manulife Financial in Toronto, Canada where I helped in creating and implementation of IDD scanner on 10,000 desktops from January 2001 - May 2001. Worked with Manulife various departments in an effort to provide valuable information.

Consultant Computer Sciences Corporation

Confidential

  • Managed a project, which included training and managing variable staff to upgrade 2300 Desktops to MS Office 97 for various Delaware Dupont Agricultural Global Technology business sites.
  • Managed a project that involved desktop leasing and migration of clients from All in One to Lotus Notes and MS Office97 for the DuPont White Pigment Mineral Products business. Participated as a supplemental project team member in Chicago to help complete the project for another CSC account while managing current projects. Migrated various DuPont businesses from different platforms to NT 4.0 environment and trained end-users. Worked closely with the client to ensure their needs were met.

System Administrator

Confidential

  • Managed IT departments. Recommended an NT environment and trained all the users in the new environment. Customized and enhanced the existing Pick/Sequel software to generate reports for the company's financial and forecasting decisions. Worked with third party vendors to purchase computer supplies and schedule maintenance for all communications equipment. Documented procedures for installation, use, and troubleshooting of the hardware and software for the client.

TECHNICAL PROFILE

  • Operating Systems: Red Hat Enterprise Linux, Windows NT 4.0 Server,Windows 2000, Windows 2003 08, Netware 3.X, SUN Solaris 2.X, MS-DOS 6.2, XP, Windows 7, ECC 5.0 / 6.00, AIX 4.1.5, 6.5 Server.
  • Management/Tools: SAP R/3 4.5, 4.6e, ECC 5.0,ECC6.0, CRM 5.0, version 7.0, EP 7.0, NetWeaver 04s/ 7x, XI/ PI 3.5 7.0, BI/BW 3.5 7.00.
  • CERTIFICATIONS
  • Linux Certified Administrator
  • CompTia Security
  • Tivoli Certified Consultant TCC
  • Microsoft Certified Systems Engineer MCSE
  • Certified Network Engineer CNE

We'd love your feedback!