We provide IT Staff Augmentation Services!

Sap Security Resume

Grand Rapids, MI

Summary

  • Having 8 Years of total IT experience which includes in IT and Consulting, including 6 years as SAP Security & GRC Consultant and 2 years as Lotus Notes Developer.
  • SAP Security Administration on various environments; SAP Netweaver 7.0, NW 7.01, NW 7.3, ECC 5.0 / 6.0,
  • BW 3.5, BI 7.0, PI 7.0, HR, SRM 7.0, CRM 7.0, and GRC 5.3 & GRC10.0.
  • Experience with SAP implementation projects.
  • Prepared and maintain documentation as needed.
  • Expertise in Profile Generator (PFCG), User Administration (SU01 & SU10), Maintaining Authorization Objects (SU24), User Reconciliation, Profile maintenance (PFCG), Table administrations (SE16, SM30 & SE54), Program (SA38 & SE38), SUIM and Trace (ST01 & SU53)
  • Experience in creating single, derived and composite roles
  • Created Users. Locking and unlocking users.
  • Transporting Profiles between clients and within R/3 systems
  • Performed transports and mass transport of roles
  • Experience in gathering functional requirements for various SAP modules and creating roles with proper naming convention as per project requirement and maintaining business role matrix
  • Expertise in restricting access to table by using the concept of authorization group to control access to sensitive tables using SE54.
  • Performing security tasks of creating roles, profiles, giving authorizations to users.
  • Setup BW and BI security for End users, administrative users and power users.
  • Built authorizations to grant access to data on various levels of detail.
  • Setup security at the Info object level (field-level security) and key figure level.
  • Created roles restricting access to Info cubes, ODS objects, specific queries and workbooks.
  • Built analysis authorization in RSECADMIN and inserted them in the role using S RS AUTH.
  • Maintained CRM related org structure
  • Worked on changing user to new position
  • Provided an access to Business roles to end users.
  • Configuring components of Access Control like Risk Analysis, Emergency Access Management, Business Role methodology
  • Familiar with GRC Suits like, Complaint User Provisioning, Risk Analysis and Remediation, Enterprise Role Management, and Super user Privilege Management (Firefighter) tools.
  • Analyzing risk analysis through User & Role level.
  • Scheduling background jobs in RAR to find risk analysis.
  • Implemented Risks and Functions.
  • Involved in Post-installation activities of Firefighter.
  • Created FFIDs, FF Owners, and FF Controllers. Assigned FFIDs to FF.
  • Experience in SAP security design, analysis, business blueprint, configuration, realization, go-live, testing, pre and post-production support, and knowledge transfer for multiple full lifecycle implementation projects.
  • Have worked as developer and shared project responsibilities.
  • Strong industry experience in complete project life cycle i.e. requirements gathering, design, development, support, change requests.
  • Self-motivated with strong interpersonal, written/oral communication skills and capable of working independently as well as in a team.
  • Proven history of identifying critical issues related to technical objectives analyzing problems and executing quick resolutions.
  • Provided knowledge transfer for In house security consultants.
  • Excellent written and verbal communication skills
  • Enthusiastic & self-motivated hard working consultant.

Key Skills

  • SAP Products :SAP R/3 4.6C, ECC 6.0 EHP 2,4,6&7, EP 7.0, BI 7.0, NWBC, HR,SRM 7.0, XI/PI, GTS
  • GRC Tools : Compliance calibrator & Virsa Fire Fighter 3.0, 5.2, EAM, BRM, ARA, ARM.
  • Databases :MS-SQL Server, Oracle 10g, 11

Experience & Accomplishments

SAP Security

Confidential Grand Rapids,MI

Responsibilities

  • Implemented GRC AC 10.0
  • Configured Access Control components ARA, EAM, ARM and BRM
  • Post installation activities of GRC 10.0
  • Created connectors, configured parameters
  • Work on change requests for creation of new roles or changing existing roles
    Create and maintain Firefighter ID’s.
  • Research and resolve authorizations issues, resolving tickets within our SLA’s.
  • Createand move transports for security changes/additions.
    Guide business areas through the new user set up process, while adhering to security standards and procedures.
  • Work closely with the Identity management team on SAP access requests and security changes.
    Voluntarily training an Identity management team member on SAP navigation and user maintenance.
  • Scheduling background jobs in RAR to find risk analysis.
  • Implemented Risks and Functions.
  • Involved in Post-installation activities of Firefighter.
  • Created FFIDs, FF Owners, and FF Controllers. Assigned FFIDs to FF.
  • Extracted log reports of FF ID s and sent to Controllers.
  • Practical experience in mitigating and using compensating controls to ensure the appropriate level of protection and adherence to the goals of the overall SAP security strategy.
  • Experience in running and simulating risk analysis at user and role Level and applying mitigation controls to users and roles.
  • Worked on Risk analysis and Remediation.
  • Created BRF plus flat rules like Initiator rule, Agent rule, Routing rule etc.
  • Configured MSMP workflows for access request management and role methodology.
  • Activating the BC sets using transaction SCPR20
  • Performed Risk Analysis, Generating Functions, and Rule sets.
  • Experience in creating single, derived and composite roles.
  • Created Users. Locking and unlocking users.
  • Transporting Profiles between clients and within R/3 systems.
  • Performed transports and mass transport of roles.

SAP Security & GRC Consultant

Confidential

Responsibilities

  • Worked on Business Process, Rule Architect and Mitigation control. Extracted Virsa Report to identify Conflicting Transaction and SOD violation.
  • Worked on Fire Fighter tool and assigned Firefighters to Firefighters IDs.
  • SPM Report viewing.
  • Sending a message to Firefighters.
  • Having knowledge on GRC ROLE EXPERT TOOL.
  • Reviewing audit reports after Fire Fighter access.
  • Creating Users and assigning roles to Users through logging in with Firefighter IDs.
  • Viewing log reports in backend System and sending to Controllers.
  • Worked on Risk analysis and Remediation.
  • Finding risk analysis through User level, Role level and through HR Objects.
  • Scheduling Risk analysis background job.
  • Created users, lock and unlock users from access management.
  • Created single, composite, master and derived roles using PFCG.
  • Worked on transaction SU24 to maintain Check Indicators for the Transaction Codes.
  • Worked on critical authorization Objects like S TABU DIS, S DEVELOP, S RZL ADM, S ADMI FCD and S TRANSPRT.
  • Effectively analyzed trace files and tracked missed authorizations for user’s access problems and inserted missing authorizations manually.
  • Extensively used SU53 and ST01 for analyzing the authorization errors.
  • Experience in User maintenance using transaction SU01, User creation, deletion, lock, unlock, password management.
  • Built Analysis Authorizations using transaction RSECADMIN.
  • Setup security at the Info objects level (field-level security).
  • Created Custom Reporting Authorization Objects using transaction RSSM.
  • Linked the Custom Authorization Object to the Info provider.
  • Created roles restricting access to Info cubes, ODS objects, specific queries and workbooks.
  • Assigned the Analysis Authorizations to the role using the object S RS AUTH
  • Troubleshoot authorizations related problems using transaction RSECADMIN
  • Made the info objects 0TCAACTVT, 0TCAIPROV, 0TCAVALID “authorization-relevant” in the info object maintenance tool RSD1
  • Troubleshoot analysis authorizations related problems using transaction RSECADMIN.
  • Setup security at the Info object level (field-level security) and key figure level.
  • Created roles restricting access to Info cubes, ODS objects, specific queries and workbooks.
  • Built analysis authorization in RSECADMIN and inserted them in the role using S RS AUTH.
  • Used RSD1 extensively to change Info Object authorization characteristics in BI 7.0.
  • Troubleshoot analysis authorization related problems using RSECADMIN and correcting the error for BI System.
  • Provided authorizations for reporting users.
  • Provided an access to execute queries by users.
  • Restricted INFOAREA button to BI Users.
  • Setup BW and BI security for End users, administrative users and power users.
  • Finding the Position number.
  • Creating Communication Info type for new User ID creation.
  • Designing roles according to HR consultant’s requirement.
  • Assign Structural authorizations profile to User ID manually.
  • Running RHRPROFL0 report n daily basis
  • Worked with Infotype0105 and 1017.
  • Linked user to PERNR using PA30 via infotype 0105 and STY0001.
  • Used PA20, PA30, PA40, PO13, OOSP, OOSB and PFCG transaction codes.

SAP SecurityConsultant& GRC Consultant,

Confidential Texas

Responsibilities:

  • Familiar with GRC Suits like, Complaint User Provisioning, Risk Analysis and Remediation, Enterprise Role Management, and Super user Privilege Management (Firefighter) tools.
  • Experience in configuring CUP, RAR & SPM as per business need.
  • Analyzing risk analysis through User & Role level.
  • Scheduling background jobs in RAR to find risk analysis.
  • Implemented Risks and Functions.
  • Involved in Post-installation activities of Firefighter.
  • Created FFIDs, FF Owners, FF Controllers and assigned FFIDs to FF.
  • Extracted log reports of FF ID s and sent to Controllers.
  • User & Role administration
  • Creating custom authorization objects &object classes.
  • Converting Authorization profiles to roles.
  • Creating reference users & assigning to dialog users.
  • Worked on Derived role/Inheritance relationship.
  • Built authorizations to grant access to data on various levels of detail.
  • Maintained services of business roles to PFCG roles.
  • Worked on both position based business roles and general roles.
  • Maintained CRM related org structure.
  • Worked on changing user to new position.
  • Maintained the relation of PFCG roles with business roles.
  • Prepare business roles using program CRMD UI ROLE PREPARE.
  • Enabled the services in business roles and updated the PFCG role.
  • Maintained the business roles with validly to position through PO13.
  • Maintained the position or users to the organization using USERS GEN.
  • Experience in providing access for creating shopper cart, manager and vendors roles.
  • Experience in maintaining the authorization object to end-users to do shopping cart.
  • Experience in providing the limitation to continue for shopping cart.
  • Worked on maintaining the attributes to an organization.
  • Change the user from old to new position using PPOMA BBP.
  • Assigning Users to Organizational unit.
  • Checking the user attributes.
  • Debugging SRM User authorizations and checking authorizations for approvers.
  • Worked on SRM authorizations object related to BBP users like BBP PD *, BBP VEND, BBP SUS PD.
  • Performed User Administration activities like creating, copying, and modifying, locking, unlocking and deleting users. Also Performed Mass user activates like creating users, updating e-mail address, assigning roles and groups and resetting passwords.
  • Used BP, PPOMA CRM, PPOSA CRM, PO10 and PO13 extensively in CRM system.
  • Created roles, Authorizations, object classes, objects, and assigned roles to user master.

SAP Security Admin

Confidential Texas

Responsibilities

  • Collecting and analyzing business requirements.
  • Create Low level and high level design documents.
  • Support technical security architecture, compliance requirements/solutions, security incidents and access support.
  • Develop system according to functional and technical requirements.
  • Arrange regular status meetings with clients to describe the current status of project and taking further actions.
  • Experience in creating single, derived and composite roles
  • Created Users Locking and unlocking users.
  • Transporting Profiles between clients and within R/3 systems
  • R/3 Security user/Role administration, role redesign.
  • Prepare and maintain documentation as needed.

Lotus Notes Developer

Confidential

Responsibilities

  • Arrange regular status meetings with clients to describe the current status of project and taking further actions.
  • EHRMS (Online Human Resources Management System) is used by WTTIL employees to enter their information. This system will contain employee’s previous, current experience and HR can track and maintain whole data of the Employees.
  • The Critical part of this application depends on Reports.
  • Have alone successfully done different kind of reports used by the HR’s and Manager’s to track employee’s data.
  • HRIS, My Compensation, Leave Request, Transfer Request are other parts of WTTIL.
  • Where employees have an option to declare the compensation details (where food coupons, LTA, P.F, Gratuity, Medical Insurance etc….are all declared).
  • Leave Request is used to enter Casual, Sick leaves for the employees.

Lotus Notes Developer and Admin Chrysler

Confidential Bangalore

Responsibilities

  • Dealer Operations projects consist of various notes applications like Five Star, Network action Request, Dealer Information database, Business Centre Billing ,Vehicle Donation Database and many more.
  • All involves interaction with customers, estimation of effort, coding, testing and deploying to production environment.
  • Have totally handled and successfully delivered nearly 8 projects. Many of these have been notes applications.
  • Testing is a phase in all these projects executed and has been involved in preparation of test plan, execution of test cases, support UAT observations and changes requested and deploying the application to production.
  • Once an application is moved to production it is verified and regression testing conducted if required.
  • Five star is a program for dealerships within the Chrysler network. The program is designed to provide certification for dealerships that meet a certain set of performance parameters. The Five Star certification is a symbol of excellence for dealerships selling Chrysler, Dodge or Jeep vehicles.
  • Creation of Documents (Data Feed from DB2), Validation and Tracking of Five Star Status and Data Feed to Inside Five Star Application.
  • The purpose of NAR application is to track the activities associated with the Dealer Network and provide them the necessary information or monetary help if needed.
  • This application currently supports the Dealership actions such as Buying, Selling, Relocation, and Termination of the Dealerships.
  • Earlier all these activities were carried out manually and the status cannot be tracked. Mainly this application is a tool to govern the activities associated to the Dealer Network.
  • A Network Action Request is created by the BusinessCenter on behalf of field personnel and it follows a Review & Approval Cycle. At each stage the relevant department is communicated and they review the request and provide the required information.
  • Once all the approvals are completed for NAR the B.C user can create a Budget Request based on the amount associated in the NAR.
  • Budget Request can be created only for an Approved NAR.
  • All these information about the dealers has been fetched from Dealer Information Database.
  • A Business Centre user creates billing a request and populates information about the B.C and then selects the program type.
  • Vehicle Donation Database: The donation program provides vehicle and component donations to non-profit organizations for education al and public safety purposes.
  • Request for donation is made by an organization in need of a specific asset. Donation requests are made via public website (www.schooldonations.daimlerchrysler.com).
  • Vehicle/Component made available to Chrysler donation system for assignment to done organization.
  • NAR application will create a Payment Request automatically once the first Corporate Approver approves the request. If the BR request is deleted in the next level the associated PR’s will also be deleted. Will allow the authorized persons to perform the above operation.
  • For 5* application Data need to be fetched from an excel once in a quarter.
  • Data is fetched from db2 database with the help of a Lotus Script agent “PRODLMSDB2 “that runs every morning at 4 AM and fetches the data from DB2 table named “SFVSLMS”.

Lotus Notes Developer

Confidential

Responsibilities

  • Analyze functional requirements
  • Coding and preparation of Test cases.
  • Handle application for UAT and support UAT observations.
  • Deploying application to production environment and post implementation verification.
  • Weekly Client Status meeting
  • Weekly status reporting to onsite Manager.
  • Raising tickets with the administrators for design release, data backed up and server issues
  • Creating and managing documents. Whenever a user creates a new document and wants to send to higher management an email will be submitted automatically.
  • This document is for information purposes only and is automatically deleted after 90days
  • Distributed Communications (DC)
  • The DC application is designed to share the work in multiple offices and will keep track of status and retrieve information by task assigned.
  • Legal Tracking System
  • With the likely occurrence of multiple users editing the same document concurrently and causing replication/save conflicts, it was designed with document locking functionality.

Hire Now