Summary: | SAP Security Administration with experience in performing all aspects of SAP Security for SAP R/3 releases 4.6/4.7 C, ECC 5.0 , ECC 6.0 and on BI7 and GRC 5.3 Technical Experience: • Experience as an SAP Security Business analysis with multiple life cycle implementations of various SAP projects from design phase to Go Live. • Administered user permissions, assigned roles to users, performed mass user activities, Role Development, Monitoring & Assisting Audit Team. • Experience collaborating with other team members and business representatives to ensure that security settings meet the requirements of the business and align with the defined controls and standards. • Worked on latest GRC tools like RAR, SPM, and CUP. • Experience with MS Office Suite (Word, Excel, Access, PowerPoint), Visio, MS Project, Outlook, and SAP Modules (FI,MM,BW,BI,SD,CO,GL,SCM, CRM, FICO) on Windows and UNIX Operating Systems. PSEG Newark, NJ SAP Security and GRC Administrator Mar 2011 – Jan 2012 Role Administration • Meet with SME’s to discuss and understand the exact requirement of proposed activity group and users in need of that activity group. • Responsible to implement Role-based security administration, including design, testing and documentation. • Complete overall support includes design and implementation for all Security needs for all user ID admin and Role builds for SOX compliance. • Work with profile generator (PFCG) in creating roles, profiles, composite roles & derived • Redefined authorization scope using SU24 etc. • Created new and edited the existing Activity Groups as per the requirements coming through Help Desk which involves the inclusion of transactions in the menu tree or editing the activities as per SU53 results. • Work with Business specialists to help them understand what SAP authorization objects are causing the conflicts and what all options exist for mitigating the conflicts • Familiar with manual maintained and standard object in the role • Worked with functional team to restrict the object values in the role • Understand the role of organizational values for restricting roles • Created multiple single and composite roles with proper technical name • Extensively used AGR_DEFINE, AGR_1251, AGR_1252 to extract data relevant to roles • Worked with the Business Process Owners to restrict sensitive transactions and security authorizations, and ensured segregation of duties across business areas. Created segregation of duties and single critical transaction policies for IT security. • Created and released the transport (SE09/SE10) Upon creation, modification or deletion of activity groups. Environment: SAP R/3 ECC 5.0, ECC 6.0, GRC 5.3, SD, MM, FICO, CRM, BI7 and Win NT/2000, Oracle 7.X Ranbaxy Labs, New Brunswick, NJ SAP Security Consultant Sept 2009 – Feb 2011 Environment: SAP R/ 3 ECC 6.0, 5.0, 4.6C,BI 7.0, CRM, EP 6.0, HP-UX, AI X, Oracle 9.2.0.6 |
No comments:
Post a Comment