Sap Security Consultant Resume
0/5 (Submit Your Rating)
SUMMARY:
- Enthusiastic SAP consultant/Analyst with over 6 of experience in SAP Security & GRC. Skilled in GRC 10.0 & 10.1, ECC,CRM,HR,BW,Fiori security implementation and support. Effectively Participated in SAP Security internal & external audits (PWC). Implemented and supported ECC modules such as FICO, Sales and Distribution (SD), Material Management (MM), Warehouse Management (WM), CRM, BW/BPC & HR
- Implemented and supported GRC access control module (Access Risk Analysis, Emergency access Management, Access Request Management and Business Role Management)
- Looking to leverage strong SAP security skills as a SAP Security & GRC consultant for Minto.
- Became a trusted resource for clients through delivering projects as planned and high level problem solving skills.
- Possess 6+ Years of diversified experience which includes, ECC (S/4 Hana), SAP R/3 Security and GRC Access Control 10.0 & 10.1
- Experience in various aspects of SAP Security and authorizations including creation of authorization Profile/Roles, master and derived roles
- Involved in gathering end user requirements and implement SAP R/3 security authorizations.
- Experience in coordinating & communicating with customers for requirement gathering
- Experience and Good Knowledge on SOX Compliance & Audit Activities
- Experience in validating the security role design after the system upgrade (SU25)
- Experience in preparing management reports using ST03N, SM20N,SUIM
- Excellent oral and written communication with clients when troubleshooting, gathering requirements and facilitating user acceptance testing (UAT) with key stakeholders
- Work with business areas and project teams to troubleshoot issues with security objects, identify and implement appropriate solutions
- Experience in maintaining roles and profiles in ECC,CRM BW, HR,GRC,Fiori & Portal
- GRC 10.0 - Configuration (CUP, RAR,SPM), Connector Configuration & Post Installation steps and checks
- ARA - Risk Mitigation, Remediation, and Risk Analysis
- EAM - Fire Fighter Management and FF Log review
- ARM - User Provisioning, MSMP Workflow design, BRF+, Customizing end user Access form
- BRM - Define Methodology, Role imports
- Assist/Reports weekly/Monthly/Quarterly SOD’S reports and support for both Internal and External Auditing.
- Administer SAP GRC (Governance Risk & Compliance) Access Controls 10.0 including Access. Request Management (User Access)
- Manage overall Access Control policies across all enterprise level applications ensuring appropriate builds, segregation of duties, etc.
- Design and build security authorizations based on SOD standards and business requirements
- Support on-going audits, providing analysis of reports, finding, etc.
- Assign mitigation control to user.
- Defined critical transactions to be used for Fire Fighter Access.
- Customizing Super User Privilege Management (SPM), creating Fire Fighter User, designing and assigning Fire Fighter roles, Fire Fighter logs activities, Critical operation Alerts and etc.
- Build the new roles as per business process requests
- Customizing SAP Standard roles
- Experience with SAP Portal Security
- Experience in User Administration involves Creation/ Deletion/ Locking/ Modifying Users as per the Approval.
- Create and Maintain User Groups. (Ex: Passwordgrp- exception given from single sign on)
- Experience in Developing, Maintenance, and Assigning Roles, Profiles and Authorizations using Profile Generator (PFCG).
- Creation and Maintenance of Single, Composite, Master and Derived Roles on basis of Specifications Provided.
- Extensively used SU53, ST01& STAUTHTRACE to analyze the issue and assign the missing authorizations to roles.
- Analyzing authorization problems/errors and implementing appropriate solutions.
TECHNICAL SKILLS:
Packages: SAP ECC 6.0.
Applications: SAP R/3 Security, S/4 Hana
Tools: SAP GRC Access Control 10.0 & 10.1CSI
PROFESSIONAL EXPERIENCE:
Confidential
SAP Security Consultant
Responsibilities:
- Role design for SD,MM,FICO,CRM,HCM and BW, (BPC)
- Demonstrated experience in SAP security role administration in ECC 6.0
- Design IT support roles, FF roles & FIORI gateway & Backend security
- Roles designed for Access to privileged technical functionalities (Ex: SM35,SM37, DEBUG, Release transport restrictions)
- Perform Unit testing, regression testing and support functional testing and UAT
- Trouble shooting and resolve all the functional Authorization, NWBC, Layout and single sign on issues
- Create cross module access (SD & MM)
- Develops security objects that meet business requirements while adhering to the principle of least privilege.
- Implemented central user administration (CUA)
- Resolve Z tcode SOD conflicts by identifying call transactions (using third party tool - CSI)
- Prepare SOD conflicts reports and resolve the issues with business and functional team. Establish compensating controls/ mitigations for identified SOD.
- Partnering with Finance, SD&MM Business to gather, define and document business processes and user requirements.
- PWC ACE SAP security audit analysis and prepared management response report
- Create and release transports to other environments (QAS, UAT, Pre Prod & Prod)
- SAP Licensing Audit- Prepared SAP licensing audit report, measurement run - USMM & SLAW2.0
- Mass user creation and role assignments using script
- Prepare user/ role related reports to client - Ex:ST03N,SUIM
- Provide ongoing production support
Confidential
Sap Security Analyst
Responsibilities:
- Perform daily security investigations to determine core issues, provide corrective action, and implement preventive controls to avoid similar issues going forward.
- Providing process methodology, analysis and documentation skills. Ensure documentation is complete and accurate.
- Firefighter User id assignment.
- Testing of security roles to ensure proper implementation and accuracy of roles
- Under Risk Analysis and Remediation (RAR) performed User & Role based Risk analysis to identify existing SOD violations.
- Identifying SOD conflicts through risk-analysis and analyzing the risk analysis reports.
- Performing User Administration, Assigning Roles to users (Mass)
- Managed user login parameters and password parameters through System Profiles.
- Customizing the roles (single, composite, and derived) Maintaining existing Roles like Adding Transaction codes.
- SAP ECC6.0 SAP Security role testing, requirement gathering
- Maintaining roles and profiles in ECC,CRM BW, HR,GRC, Fiori
- SAP GRC 10 connectivity testing, performance testing Find out missing Authorizations from the user.
- Worked on Portal security
- Worked with critical authorization objects restricted and monitored.
- Comprehensive use of Profile Generator to generate roles through Profile Configuration.
- Provided Detailed Report of Users, User Status, Roles, Activities, Groups, T-Codes and Objects when required.
- Prepared reports using User Information System.
- Participating in an on-call rotation
- Creation of Fire Fighter Ids and assigning Fire Fighter ID to Fire Fighters.
- Analysis of risks from Risk Analysis Reports.
Confidential
Sap Security Analyst
Responsibilities:
- Ensure enforcement of segregation of duties through role development and assignment
- Perform system-monitoring tasks such as displaying all locked users, user change history, invalid logon attempts, user locks, system logs, password history, and active users across clients
- User Administration
- Role Administration
- Leading improvement sub-projects and being an influencer of change.
- Tracing user Auth issues
- Customizing Authorizations
- GRC 10 - Configuration and Support (CUP,RAR,SPM)
- Connector Configuration
- Post Installation steps and checks
Confidential
Sap Security Administrator
Responsibilities:
- Worked with business owners to define the authorizations needed for users.
- Systems ECC,GRC 10.0
- Customizing/Modifying the roles as per the business request.
- Maintaining authorization objects for roles.
- Experience in maintaining roles and profiles in ECC,CRM, HR
- Addition/Deletion of Transaction codes from the roles.
- Working on missing authorizations for the IT & Business users.
- Working on Mass lock activities on week end supports.
- Mass maintenance of users/user groups.
- Password resetting, Validity date extensions upon approvals.
- Working with Critical authorization objects restricted and monitored.
- Restricting table access and assigning the corresponding authorization group.
- Working with security related tables.
- Working with functional team co-coordinating in creating and adjusting the roles.
- Inform client personnel in R/3 Security and general Basis knowledge.