Quantcast

Sap Security United States Resume Louisv...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Sap Security United States
Target Location US-KY-Louisville
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Supply Chain National Security Louisville, KY

Software Engineer United States Louisville, KY

Security Analyst Heavy Equipment Louisville, KY

Truck Driver United States Elizabethtown, KY

United States General Labor and Clerical clerk Louisville, KY

Security Officer Customer Service Louisville, KY

United States High School Louisville, KY

Click here or scroll down to respond to this candidate
Candidate's Name
Home: Louisville, KYMobile: PHONE NUMBER AVAILABLEEMAIL AVAILABLEI am a United States CitizenSummary: Stan is a talented consultant with 20+ years of SAP Security implementation, conversion/upgrade audit, and GRC expertise. He specializes in the implementation and conversion/upgrade of legacy SAP installations to SAP NetWeaver Scenarios. Stan has designed and managed SAP security, supervising client resources from blueprint through role development, testing, and production. He has led numerous global SAP Security implementations and upgrades where he designed and implemented the security strategy. Stan has successfully managed multiple projects simultaneously while delivering excellence to clients. Most recently, Stan has concentrated in SAP Fioi Security, ABAC security, BI 7.0 and BI Portal Broadcast Security, BI-BOBJ integration security, and a GRC version 10-10.1 EAM (Firefighter), ARA, and ARM projects.Technology Summary:Proficient in: SAP R/3 3.1i, 4.0B, 4.6c 47 ECC5.0, 6.0, BW 3.0b BI 3.5, BI 7.0, 7.2, 7.3, BOBJ 3.1, 4.0, GRC 4.0, 5.2,10.0, 10.1 GTS, PLM, EWM, TM, EP 6.0, EP 7.0, eCATT, LSMW, SAPScript, Virsa/GRC 4.0, 5.2, 5.3 Firefighter/SPM/EAM, Compliance Calibrator, GRC AC 10.0, 10.1, NetWeaver 2004s, Portal Admin CUA, WAS, SSO, UME, NextLabs EM, DAMExperience Summary:SAP Security Senior ConsultantUnited States DoD Defense Logistics Agency (DLA)New Cumberland, PA 09/2021 to 03/2023Lead SAP resource for international warehouse solution legacy system replacement S/4 HANA implementation : EWM, Fiori, ECC, TM, PI/PO,Trained Existing staff and interns on SAP Security Role development, best practice for authorization maintenance, SU24, Troubleshooting, CTS processMigrated NWBC prototype authorizations to Fiori Scenarios, developed custom Catalogs and Groups, and maintained S_SERVICE authorizations for Web Dynpros to ensure end to end functionalityPromoted authorization fields to org levels, maintained derived role concept to authorize multiple DoD warehouse operationsCoordinated system authorization feed for GRC 10.1 SoD remidiation prototypeSupplied trusted system authorizations to BASIS teams accross multi-tenant mall landscapeSAP Security Senior AnalystUS Army Logistics Modernization Program (LMP)Picatinny Arsenal, NJ 09/2020 to 07/2021Applied SAP Notes to resolve authorization relevant status for BW Characteristics per SAP BW 7.5 upgrade documentation using Eclipse workspace designerPerformed BW 7.5 Upgrade security tasks, USOBT* table comparisons, SU25 steps, SU24 adjustments to TCodes, Role updates, documentation, transport to ProductionReconfigured and regenerated Business Objects Roles, Folder permissions, Access Levels, User and Composite to redistribute rights to over 75 Army Commands via BOBJ Administration ConsoleRespond to Splunk alerts on behalf of Security team, perform ECC and BW Defects resolution, Service Now documentationModified RFC destinations, Modified BW Workspace security, SAP EP SecurityParticipated as security resource for HANA Native modeling POC, On-Call rotationSAP Security Design LeadCoty, Inc. __New York, NY 08/2019 to 07/2020SAP PLM Security design architect for Greenfield Recipe Design (RD) formerly Recipe Management SAP HEC hosted solution at Fortune 500 Beauty Company Project AlchemyDesigned and built SAP PLM, Fiori, S/4 HANA 1809 security roles for COA, R&D, customer support, end user, SAP HEC, RegulatoryAdvised and configured SBX, DEV, QA and PRD systems with security parametersLeveraged custom catalogs to authorized SAP standard and custom Fiori security tilesCreated strategy for multi instance architecture with Security build to seamlessly supporting planned corporate brand divestitureAssisted customer testing of all security role testing cyclesDocumented role design, access matrix, user creation and audit capability, advised customer on GRC 10.1 integration planSAP OTC Security lead, Export Control SMEThe Dow Chemical Company Midland, MI 07/2017 to 04/2019Lead security implementation consultant at Fortune 500 chemical companys M&A projectImplemented Attribute Based Access Control (ABAC) security supplementing with SAP BW 7.1 role based (RBAC) and SAP Business Objects (BO) CMC securityEstablished US Export Control EAR and ITAR compliance with in SAP BW and Business Objects applicationsConfigured NextLabs Dynamic Authorization Management suite (D.A.M  formerly Entitlement Management) to enforce policy based decisions in SAP BW 7.0, Business Objects, PLM, and APORestricted export controlled materials via assigned ECCN Number by users attribute data in repository in SAP BW Hana Enterprise Cloud (HEC) and APO on-prem repositoryMaintained Export Controlled Classification (ECCN) master tables in SAP HEC BW, on-prem PLM and APO instancesSecured 30+ BW reports by, InfoObject using Combination of BW 7.0 Security roles and NextLabs solutionSecured 20+ APO TCodes with NextLabs tool to restrict Export controlled technologyProvided Integration for Export Control access requests to GRC 10.1 installationSAP Security ConsultantAmerican Honda Motors Marysville, OH/Torrance CA 01/2017 to 06/2017Independent SAP Security upgrade consultant to Global 500 Automobile manufacturer undergoing SAP ECC Support Pack remediation exerciseAnalyzed SU24 and underlying tables, ran SU25 and provide independent review of SAP upgrade proposalsDelivered recommendations to management as to estimate of effort to remediate roles and proceed with Support Pack implementationsSAP NS2 Security AdvisorUS Army GFEBS Alexandria/Arlington, VA 07/2015 to 11/2016SAP NS2 Security and GRC Lead consultant to the Army GFEBS Program Management Office (PMO)Strategic advisor to Army leadership on security roadmaps and technologiesEvaluated status of GFEBS-SA implementationAdvised Army leadership of lessons learned and corrective actions, including risk mitigation, implementation strategy, and ABAC authorization concept offerings from SAP and Dynamic Authorization Management (formerly Entitlement Management) solution from NextLabsAdvised Army leadership on effective implementation tools and strategies, including use of SAP standard security authorizations, SAP security customization options, and third party toolsProvided strategic guidance to GFEBS program security including GRC provisioning, program documentation, change control, interface design security, Risk Management Framework objectives, migrating existing security to S/4 HANA, and creating a lab environment to test and validate new technologies.Performed successful 12 week POC of NextLabs D.A.M. software solution on SAP Standard and Army GFEBS ECC custom transactions on GFEBS system copySecurity ArchitectUS Government CDC Information Management Service Atlanta, GA 2/2015 to 5/2015Security Architect on a team of consultants for Federal awarded Healthcare IT projectPerformed O&M study aimed at automating awardee and provider interface operations with national vaccine tracking databaseStudied middleware solution options from a security perspective, evaluating and score carding available scenarios to deliver functionality between 64 awardees systems, multiple providers systems and national CDC vaccine databaseConsiderations included Internet security, PKI encryption, HL-7 messaging standards, SAP ECC/CRM/PI components and database securitySAP Senior Security ConsultantMSA, The Safety Company INC Cranberry PA 8/2014 to 2/2015Consultant to Global manufacturing client offering role redesign strategy and optimization to support Europe 2.0X projectPerformed offline Excel SAP Access analysis, realignment and re-engineering for the clients European business to standardize on SAP Best PracticesPrimary focus in defining new SAP ECC security access involved designing and implementing a role strategy to support implementation of a principal trading company in Switzerland, to optimize taxation and legal entity structureIn ECC system, transitioned existing roles to 5 new company codes and 12 new plants, 1 new Sales company as LRD (limited risk distributor), and 2 new manufacturing entities as toll manufacturersRestricted current access roles to support configuring group costing, cross company process and toll manufacturing (MM and PP).Configured roles to support inventory in the ownership of a newly established European principal operating concern based in ECC systemConfigured roles to support VAT reporting and plants abroad functionality. Managed SAP Org element updates, role assignment and transport of over 9,000 derived and composite security roles using SymSoft Control Panel and eCATTSAP GRC Principal ConsultantKrypt INC San Jose, CA 6/2014 to 9/2014Consultant to Premier SAP partner offering high value solutions in SAP GRC; GTS, AC, PC, RM and SCM, APO, TM, and EWMResponsible for RFP/project scoping, presales, and consulting in the GRC 10.x space in GRC 10 and 10.1 AC, PC and RMSAP Security Upgrade consultantPepsiCo International Chicago, IL 4/2014-6/2014Strategy consultant to global customer with 150+ SAP instances worldwide, measuring effort required for the upgrade of ECC, BI, CRM, XI systemsProvide independent review of SAP upgrade proposals and coordinate impacted security objects, affected roles, SU24 maintenance and affected TcodesVerified pre and post upgrade status with shadow system copiesReport findings and estimates to management, assist in creating staffing estimate for role adjustment and testing within current project year timelineSAP Security GRC LeadHead & Engquist Equipment Services INC Baton Rouge, LA__ __4/2012-3/2014Independent consultant, Project Lead of GRC 10 Implementation for EAM, ARA, ARM, BRM, GRC automated provisioning, Password Self Service.Installed and configured NWBC client front end for GRC reports/Access risk analysis administration functionsReview of current security roles, policies and procedures across ECC 6.0 landscape, APO, PILead customer workshops to determine rule set validation and risk level classification, usage history based role redesign from GRC action usage collector, risk remediation strategyRule set customization for custom/composite transactions, SAP bolt on functionsCreate Technical roles to meet audit specifications for IS (Basis, Security, Development), Internal Audit Credit, AR, AP, Accounting, Unit Sales, Tax, Compliance and Financial Reporting, addressing all SOD risks in GRC rule set with the exception of previously addressed Basis and HCM risksRemediation of 6M+ SOD conflicts in collaboration with customers Security, Compliance and Process teamsConverted customer to position based security model (indirect provisioning) from direct SU01 user assignmentImplemented EAM with workflow automated notification and EAM session reviewLead workshops with HR, Helpdesk, Security, and compliance teams, to drive automated provisioning strategy and design.Co-developed BRF+ rules for GRC provisioning workflows with client resourcesCaptured HR hire, change and termination events, included in BRF+ decision tableAdapted BRF+ rule changes to meet the needs of onboarding/termination scenarios for HR OM/PA event and non event-driven provisioning workflowsUpdated security roles across the landscape with P_PERNR, P_ORGIN values, InfoTypes 0105, 0001, 0002, 0006Co-developed MSMP workflows for: HCM Trigger based provisioning workflows, Non HR event-driven provisioning, HR event and non event-driven termination with client resourcesDocumentation development and knowledge transfer with customer to configuration, standard administration procedures and exception based processesSAP Security Design LeadBristol-Meyers Squibb INC North Brunswick, NJ 11/2011-3/2012Independent consultant, SAP Security Design Lead for global pharmaceutical manufacturing companyDesigned security for Visibility to Profitability (V2P) Project for BI 7.3, BOBJ 4.0 reports for GM, IR, ICP, PRC installation, including sensitive consolidated cost (CC) dataDeveloped Analysis Authorizations to secure by custom Authorization object tied to profit center hierarchyProvided best practices recommendations to complement existing BI security modelFurnished and communicated design to clients dedicated SAP consulting partner team, validated the buildSupport testing through FUT, SIT, and UATCreate and Provide updates to traceability matrices for project issues and security gaps, ensure adherence to design strategy and compliance with documentation, traceability, transparency requirements for internal auditSAP BI Security Project LeadKindred Healthcare INC Louisville, KY 5/2011- 11/2011Independent consultant, lead BI Security resource in a $1B acquisition to Fortune 500 healthcare companyIntegrated 2500 acquired facilities into existing BI 7.0 environment from COGNOS legacy environment Created BI Security roles, Portal repositories and authorizations for reports distributed via BEx BroadcastingCreated 2500 BI 70 RSECADMIN authorizations with SAP RSEC_MIGRATION toolAutomated creation and population of new BI 7.0 security Roles with RSECADMIN authorizations, assignment to users via eCATT scriptsTroubleshooting BI 7.0 authorization issues with RSUDO trace logging functionalityBI 7.0 Security and operational procedure knowledge transfer to existing staffSAP Security LeadNew York Power Authority White Plains, NY 6/2010  2/2011Independent consultant to Public Sector IS-Utilities customer in hydroelectric power generation and transmission industryDesigned and created Security roles for BI 70 with New Analysis Authorization security concept,Secured all reporting on MM cubes, published reports to BEx, Business Objects XI (WEBI, Crystal, and Xcelsius)Created BI Report restrictions following HR Position based security modelDesigned report level security with SAP Authentication to reports through Business Objects CentralManagement Console (CMC)Additional reports warehoused outside of SAP BW secured by Microsoft Active Directory (AD)Designed and created Security roles and user accounts for FI Budgeting Forecasting application - SAP BPCLead Security Role Redesign initiative for IS-U, FI, PS, CO, and HR roles with structural authorizationsAssisted client in SOD issues, SAP_ALL removal from technical users in non- productive environmentsRemoved TCode duplicate assignment in Production rolesAdditional cleanup of Manual and severed Org value relationships in all rolesPerformed ESS/MSS access validation and issue troubleshootingMigrated customers security strategy from single to derived role concept leveraging multiple org valuesSAP Security LeadSAP AMERICA INCClient: BOBs Discount Furniture Hartford, CT 4/2010- 6/2010Security Consultant, Security design lead for SAP America led IS-Retail project, covering FI, SD, MM, and BICreated Store, Warehouse, and Management template security strategyCreated test accounts, users, and roles with eCATTSecured Custom WebDynpro portal solution, restricted end users to store level authorizations Processed integration testing scripts defect resolutions throughout the landscape in a timely manner to make Go-Live targetSAP Security Lead Business Objects, BW ConsultantRPF Consulting Atlanta, GA 3/2010 to 4/2010Independent SAP Security consultant, assisted SAP Business Objects Value Added Reseller at several presales clients with setup of SAP Business Objects suite in existing SAP BI implementationsAssist personnel with creating SAP Roles and authorizations to create a new Universe, refresh existing BI queries into Business Objects reportsSetup user and service accounts in SAP to configure Business Objects proof of concept to leverage customer's existing BI 7.0 reporting Analysis authorizationsSAP Security ConsultantLockheed Martin Aeronautics Arlington, TX 4/2009 to 3/2010Remote Support for initial Go-live for A&D Customer with ECC, SNC, BI and EP 7.0Performed Role/Defect Updates in development during Realization phaseValidated ECC/BI critical Objects and transaction pre Go-LiveAssisted developing GRC 5.3 ruleset for above modules with Functional and Controls teamsGRC 5.3 AE, CC configuration setup and validationConfigured new GRC 5.3 client installationPerform SOD checks for all SAP BI production users with Compliance Calibrator 4.0/5.3 toolsetCreated SAP BI roles for GRC Firefighter users in Compliance Calibrator for process teamsSetup Users, Controllers and Owners of SAP BI GRC Firefighter ID's and provisioned accounts, setup logging and rulesetCreated SAP BI Training system users and roles, assisted in data loads and client copies following training refreshesCreated eCATT scripts for SAP BI Go-Live user load and role assignment and maintenanceResponsible for War Room support, issue remediation post Go-live with critical resolution times Documentation of lessons learned and coaching opportunities for successive delivery launches Designed retrofit of BI 3.x roles to BI 7 authorization concept using Analysis authorizationsConfigured UME access with Delegated SAP BI team Security administration by companySAP Security Lead ConsultantCentral Michigan University Midland, MI 3/2009 to 4/2009Independent consultant, created BI 7.0 and EP 7.0 Security Model post installation for new BI reporting requirement for Public Sector CM/SLCM customerCreated System Administrator, Security, and developer roles in BI 7.0 and EP 7.0Troubleshot EP 7.0 and BI reporting issues including setup and landscape connectivity, BI-EP 7.0 integrationKnowledge transfer to existing staff for BI and EP Security methodologyDeveloped testing and case scenarios for future development and future portal integrationDocumented Role design and reporting strategy across Info providers and business users with BI 7.0Analysis Authorizations using RSECADMIN security toolProvide production support and development to BI 7.0 module of SAP for the Campus Management/SLCM (CM/SLCM) implementationMaintain high level of support by meeting with clients to discuss and determine system issues or areas for improvementDevelop and implement custom security and enhancements to SAP reporting with no interruption to the business Present recommendations to client management concerning systems upgrades and development opportunitiesTrain users on new systems, upgrades, and enhancements to existing systemsResearch problems, determination of problem origins and corrective actions needed; implementation and testing of solutions; development and testing of new programs; training customers technical teamSAP Security Lead ConsultantKindred Healthcare INC Louisville, KY 3/2008 to 02/2009Independent SAP Security Consultant to Fortune 500 healthcare companys SAP security teamBI Security Lead present from initial planning and design phase through go-live for BI 3.5 to 7.0 UpgradeBI 7.0 Upgrade for custom objects securing 1300 profit center nodes restricted via hierarchyMigrated 1200+ SU02 profiles to BI 7.0 RSECADMIN authorizations with SAP RSEC_MIGRATION toolAutomated creation and population of new security Roles with BI70 RSECADMIN authorizationsRolled out new BI security to 5,000+ users via eCATT scriptsTroubleshooting Authorization issues with RSUDO trace logging functionalityDesigned and created broadcast folders and links in NetWeaver 7.0 Portal for reports to 5400 users Secured BI Broadcasts by Role assignment, limited by authorizations rollup for 1200 nodes in the profit center hierarchyCreated XML document and uploaded to 2004s Portal to update Broadcast link permissions for the aboveLead work group to define security production processes and provided support post go-liveAssisted with documentation and knowledge transfer to existing staff in above areasDeveloped and maintained crosswalk mapping of ABAP authorizations to BI Web templates to rollout new iView structure, utilizing merged worksets under Business navigational tabsCreated XML Documents that automated Portal role assignment by setting up portal role to ABAP group assignment to satisfy end user's portal BI Web template presentation needsResearched and Setup Kerberos Authentication upgrade from NTLM to NetWeaver 7.0 Portal to accommodate new BI 7.0 SSO functionalityMaintained NW 2004s Portal Security Zone assignments and PCD authorization settingsCo-presenter, ASUG 2009Developed and delivered SAP BI Broadcasting functionality presentation at ASUG conference in session UsingNetWeaver Knowledge Management for efficient and secure information distribution"Setup and maintenance of users and personnel records on HR Structural authorizations on ECC 6.0Table Maintenance for User authorizations, updates to HRP1000, HEP1001, PA0008, and PA0105Restricted access to data working with InfoTypes and Authorization objects P_ORGINCON, P_PERNR, PLOG, P_ABAP, P_APPL in HRCreated info type 105 and subtypes 0001, 9010 for the new hires and adding the PD profiles using PO13Modified personnel records/structural authorizations, PA20Structural Authorization assignment maintenance, RHPROFL0, OOAC, OOAP, HRAUTH, PO13, PO10SAP Security Lead ConsultantSteel Technologies INC Louisville, KY 10/2008 to 1/2009Security Lead for BI 7.0 Implementation to secure queries in Integrated Planning, CO/PA, SalesForecastingCreate Functional and, Basis, Security Developer, Technical Team roles in BI systemCreate Analysis Authorizations to restrict queries on characteristics and navigational attributes with RSECADMINTesting and resolution of query functionality in 7.0 BEx AnalyzerTroubleshooting Authorization issues with RSUDO trace loggingProvide staff training and documentation to the customers internal security and development teamsServe as customers quality advocate with the external SAP integration partners final product Provide best practice advice in BI 70 Security and BI Query design using 7.0 Query DesignerSAP GRC Lead ConsultantPharMerica INC Louisville, KY 11/2007 to 3/2008Performed GRC compliance Calibrator 5.2 Installation and configuration, for existing Virsa 4.0 CustomerLoaded Global ruleset and configured reporting and alertsAudited and documented existing SOD conflicts within roles and assigned to users Created and ran eCATT scripts to update security roles with re mediated access Assisted with documentation and knowledge transfer to existing staff in above areasPerformed BI 7.0 and ECC 6.0 Authorization updates for profit center Hierarchy consolidation projectSAP Security ConsultantJim Beam Global Spirits Bardstown, KY 10/2007-11/2007Independent SAP Security consultant in SAP R/3 4.7, BW 3.5 Global ImplementationAssisted customers transition of Security management from project team to support teamValidated and granted new user access requests, maintained SOD matrix with Business process Owner approvalCreated and tracked requests and approvals for access deltas in customers internal repository Prepared team for ECC 6.0 Upgrade, Documented roles and Access Matrix using Excel Assisted with knowledge transfer to existing staffSap Security Design LeadSAP America INCClient: PepsiCo International Brands Chicago, IL 2/2007 to 10/2007Design Lead in a Global implementation from project preparation phase through 2 go-lives in China, Egypt, Netherlands, and MexicoDelivered Blueprint Security Design from PepsiCo domestic implementation and adapted to international project for FI, MM, PP, CO, AM, PSRepresented SAP America Presence for Security team in establishing PepsiCo Center of Excellence (COE) with PepsiCo Team lead and integration partnerPromoted best practice, leveraging domestic implementation documentation and procedures Developed strategy and supported multiple cycle Integration and User Acceptance testing Staffed post go-live support with customers personnelSap Security Senior ConsultantSAP America INC Newtown Square, PAClient: PepsiCo INC Chicago, IL 12/2004 to 2/2007SAP America Security Consultant on Global implementation project at a Fortune 500 Food and Beverage Company, 3,000 initial and 65,000 named usersSAP Security SME staffed from Project preparation through 7 phased go-livesDesigned and created Security in BW 3.5, BI 7.0 ECC 5.0, Solution Manager 3.2, CRM 4.0, 5.0 XI, MDM, SCM/APO 4.1, SRM 4.0, NetWeaver 2004s and Supplier Self Service (SUS) PortalsPerformed Security Upgrade of roles and authorizations ECC 5.0 to ECC 6.0 and, BW 3.5 to BI 7.0 NetWeaver 2004sCreated Security roles using Profile Generator (PFCG) in an SAP NW 2004s environmentDesigned and Tested role assignments in NW2004s Portal for WebGUI/ WinGUICreated CRM Security design mapping internal and external customers to Business PartnersConfigured Security in CRM ACE tool by Business Partner (BP) Pilot program for SAP Enterprise Portal PCUI project for bottlersAutomated CUA Security Tasks by creating SAP eCATT scripts and LSMW batch input sessions including: user mass creation, role assignment, and Organizational Hierarchy assignmentCreated users and assigned roles manually and in mass through upload in NW2004s PortalSetup and Maintained users in CUA system, setup connection and synchronized to customers Sun IDM LDAP through SAP delivered function Module RS_LDAPSYNCDeveloped Job role matrix for access request/provisioning through IDMRan Custom batch script regularly to replicate new CUA/IDM users to NW2004s PortalScheduled common Security jobs in SM37 with SCOT email output reporting to PepsiCo SAP Security TeamInitially created Developer, Configurator, Tools, Basis, Security and functional roles from IMG menuMaintained SRM Org Hierarchy through PPOMA_BBPAdjusted SU24 Table updates found in unit and system testing and transported throughout the landscapeWorked with Basis team to develop Solution manager roles for project team Administrators, Configurators, Change Managers, and Support DeskPerformed initial system security inspection and setup of newly created CUA clients Maintained dual development landscape security supporting clients multiple release strategyCreated and maintained OSS user accounts to enter the customer system for analysis and correctionSetup CUA distribution landscape and attached newly built clients to CUA system, assigned ParametersCreated and Applied security for interfacing applications Tibco, Control-M Performed ST01\RSECADMIN Trace for Authorization error analysis Created and maintained RFC user accounts to PepsiCo standardsCreated and assigned tables to Custom table authorization groupsCreated Documentation of all procedures for PepsiCo security Team membersSAP Security ConsultantSAP America INC Newtown Square, PAClient: Avaya INC Basking Ridge, NJ 10/2004 to 12/2004SAP America Security Consultant at a Fortune 500 communications vendors SAP Security redesign project to bring authorizations within Sarbanes-Oxley complianceTeam member in a group of 4 consultants that designed, implemented, and tested solution to internal audit finding of 66,000 SOD conflicts identified by Internal Audit partnersPerformed 3.1h profile and 4.6c role cleanup to mitigate Segregation of Duties conflicts in preparation for external audit and Sarbanes-Oxley for Q4 2004 compliance and SEC reporting requirementsCreated SAP Test User Accounts and modified roles using SAP CATT, performed unit testing and validationStaffed post Go-live support with existing SAP Security teamSAP Security/VIRSA consultantVirsa Systems Freemont, CAClient: Brown-Forman INC Louisville, KY 8/2004 to 10/2004SAP Security Consultant and Virsa SME on SAP Sarbanes-Oxley redesign project for a major US based spirits distiller and consumer goods manufacturerUtilize Virsa Systems VRAT and VRMT tools (Currently GRC Access Controls Suite) to identify, track and eliminate Segregation of Duties (SOD) conflicts within FI, PP, MM, SD, WM, and QM modulesBuilt and maintained user history Microsoft Access database from SAP RBE tool, imported user execution history, proposed role mappings, Virsa VRAT SOD rule set, and SOD Deltas throughout the testing phasesMapped 650 production users TCode execution history, SOD Execution History, and Proposed role assignments, identified SODs through Access queriesCreated Microsoft Access Report signoff documents for user SOD mitigationAssisted Internal Audit with Key and Compensating Control developmentCreated 300 new roles using Virsa Systems VRMT tool, analyzed SODs and documented secured objectsSetup and mapping of 650 users in Test bed environment using SAP CATT scriptsSAP Security ConsultantPricewaterhouseCoopers LLP Tampa, Florida 2/2004 to 8/2004Independent SAP Security Consultant at a global consulting firms new SAP 4.7e internal implementationNew/Refresh Client setup and Security Administration and Authorization assignment in CUA systemCreation and assignment of Configurator, Developer, end user and security rolesCreated roles for ALE, Background Job, and custom TCode accessSAP Security role and authorization changes in DEV and QA instances using the Profile GeneratorTransport of roles throughout four SAP instances using SE09, STMS, SCC1Created SAP Roles, and users in standalone training environment for 19,000 named user base covering R/3, BW, CFM, and EBPMonitoring CUA logs daily using SCUL, monitoring and reprocessing failed IDOCsPerformed routine maintenance and mass creation following system refresh using CATT scriptsDefect resolution from testing team using Mercury Interactive Test Director 80SAP Security ConsultantNike, INC Portland, Oregon 11/2003 to 2/2004SAP Security

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise