Key Responsibilities

2
Key Responsibilities & Accomplishments: Design and Build SAP Security solution for a Fortune 500 client for many projects. Defined the role naming standards, Testing standards and Access provisioning policies/templates. Interacted with end users to gather the transaction required to perform their job duties. Handling Production Support issues and training end users on SAP Security. Subject matter expertise and advise on the functionality, usage and process in the field of Security and GRC Access Control Provided technical leadership for strategic design of the security implementation Involved in Blueprint, realization, testing and Go-Live Design and build GRC Access Control 10 and 10.1 solution Configured MSMP and BRF+ for GRC Access Controls triggers Prepare and load the BRM sheets for Business Role, Composite role and Single role Configure SPRO for GRC Access Control Align process controls, mitigation controls as per the restructure Defined and enabled process of requesting user access through GRC Update Rule Set with new changes Work with SOX Team for SOD remediation and mitigate the identified risks Assessment of piracy and trade secret compositions and recipes classified as Highly Sensitive data. Provided an efficient solutions to secure and govern access. Worked with Internal Control team for Role Remediation and User Remediation Worked in all risk control processes including IT general controls, testing plans, testing execution in an integration testing environment and control remediation.

Transcript of Key Responsibilities

Page 1: Key Responsibilities

Key Responsibilities & Accomplishments:

Design and Build SAP Security solution for a Fortune 500 client for many projects.

Defined the role naming standards, Testing standards and Access provisioning policies/templates.

Interacted with end users to gather the transaction required to perform their job duties. Handling Production Support issues and training end users on SAP Security. Subject matter expertise and advise on the functionality, usage and process in the field of

Security and GRC Access Control Provided technical leadership for strategic design of the security implementation

Involved in Blueprint, realization, testing and Go-Live

Design and build GRC Access Control 10 and 10.1 solution

Configured MSMP and BRF+ for GRC Access Controls triggers

Prepare and load the BRM sheets for Business Role, Composite role and Single role

Configure SPRO for GRC Access Control

Align process controls, mitigation controls as per the restructure

Defined and enabled process of requesting user access through GRC

Update Rule Set with new changes

Work with SOX Team for SOD remediation and mitigate the identified risks

Assessment of piracy and trade secret compositions and recipes classified as Highly Sensitive data. Provided an efficient solutions to secure and govern access.

Worked with Internal Control team for Role Remediation and User Remediation Worked in all risk control processes including IT general controls, testing plans, testing

execution in an integration testing environment and control remediation. Created many Script like LSMW, SHDB, CATT and GUI to automate mass user provisioning and

preparation of Test ids for project testing phase. Implemented BW/BI Security

Authorization levels based on Info-provider, characteristic, characteristic value, key figure

Used RSECADMIN for authorizing characteristic values, attribute values, hierarchies Used special authorization values like *, :, + and #. Create custom Report Authorizations

Designed and implemented Project role security for R3, BI, MDG, EWM etc Solution Manager security Implementation (Charm Role Design), Performed Security Upgrade

for Solution manager Worked on SAP HANA Security, SAP BOBJ Security Developed, managed and tracked project deliverables, resources, milestones