Sap Security Consultant Florida
Summary:
- Experienced technical and functional Principal, Managing Consultant, Sap Security Lead,SAP Security Consultant with 12 years specializing in SAP security and 31 years in IT
- Global design and implementations with the next methodology: ASAP, SAP User - Centered Design (UCD), Centralized and De-Centralize Business Model, 3 Tier Approach Model, Position Based Model, Task Oriented Model, RBAC Model - IDM (SAP and none SAP Systems integrations), BW/HR Structural Authorizations Architectural Model
- SAP security global design and implementations, security strategies and policy for:
- SAP Portal (EP) UME, XI/PI, MDM, Global CUA build, Solution Manager, SRM,CRM 2007 (7.0, 7.1), ACE, Business Role (WEB UI), BI, BOBJ, SAP R3, Enterprise Portal, Global Trade Services, ERP, ECC, ESS/MSS, PSCD, HR, HCM, TREX, SCM, PS, APO, ERP, PLM, SCM, SAP Human Resource Management Systems (HRMS), MDM, MII, LPO, E -Sourcing, Portal (SRM, CRM, BI, MDM)
- ACE-Automatic Controls Environment, Guardian- Manual Controls Environment, Approva BizRights,Virsa, GRC Access control, Process control and Risk control, RAR, ERM, SPM, CUP, Access Risk Analysis (ARA), Emergency Access Management (EAM), Business Role Management (BRM), Access Request Management (ARM), Business Rules Management Systems), MSPM, GRC MSMP CONFIGURATION
- Control documentation, Control evaluation, Certification, Reporting and analysis, Security Concept
- CRM2007, Access Control Engine (ACE), Business Roles (Web UI), Technical Roles (ABAP)
- ACE General Parameters, Ace activation and Super Object Type set, Work Package Definition
- Business Role (Web UI) - Creating Role Configuration Keys,Transaction Launcher, Menu Navigator, Logical Link for Transaction, Actors creation, Rules and Rights creation, ACE Design Report
- Utilities: B2C Call Center and B2B Work Center, Public Sector
- Proposal preparation on client site with security analysis on real systems and real data
- Proficient in use BI, BW Analysis Authorizations tools as ( RSECADMIN, RSD1, RSA1,RSRT)
- Log changes to analysis authorizations and other authorization-related activities:RSUDOLOG, RSECVAL CL, RSECHIE CL, RSECUSERAUTH CL, RSECTXT CL, RSECTXT CL
- NetWeaver SAP Identity Manager, TAM
- Event-driven SAP ERP HCM integration with SAP IDM
- Path work flow based on request type and user attributes
- Position based Security via Indirect Org Assignments (infotype 0001)
- Context Sensitive HR solution, Structural authorization (infotype 0017)
- The HR: Master Data with Context authorization object (P ORGINCON)
- Extended integration with SAP\'s GRC solution (SAP Business Objects Access Control)
- More then 8 years in Segregation of Duties and Audit Compliance Standards, Audit Compliance Standards
- Development of tailored security and controls techniques in conjunction with system upgrade (i.e. ERP) and the design or re-engineering of business processes (i.e. shared services environment)
- SAP framework for SAP Global security upgrade, SAP Global security and authorization support, development and design
- Expert knowledge in standard authorization concept for R3 as FI-CA, FIN-FSCM-CR, AR, AP, GL, CO. ..
Companies worked for as SAP Security Consultant and SAP Security Lead for Global projects:
Tampa Electrical Company,SaskPower, Applied Materials, NBC UNIVERSAL, Municipality of Anchorage, Saudi Aramco, General Motors, ConAgra Foods, Becton, Dickinson and Company (BD), Graphic Packaging, ConocoPhillips, Colgate, Confidential US, Allegheny Energy, Inc., NASA, Whirlpool, Eastman, Adobe, CMC, BNSF, Chevron-Philips, Department of Personal State of Washington, FEMSA (Coca Cola Mexico and Latin Americas), JoAnne, CMC, Convergys Corp., State of Florida, Fifth Third Bank, AT&T, Whirlpool, DuPont, Confidential & Confidential (DEMO), Pfizer, Solectron Corporation, Guidant, Lucent, Medtronic, Bridgestone Tires, PWC, CAMECO, KGH, British Columbia Government (PSCD) IBM ISM, IBM Internal Project, SAP America - RM@FS Authorization Lead and SAP AG internal projects as security course P ADM SEC 70 author and others
Professional Experience:
Sub contractor ( Confidential / AJACE )
Confidential, Florida
SAP Security Consultant
HCM, BOBJ, BW, BW-BPS, SRM, ECC, PORTAL“Go life” and after ”Go Life” Support, BOBJ re-design Front End and Back End BOBJ integration
GRC, Access Risk Analysis (ARA), Emergency Access Management (EAM), Business Role Management (BRM), Access Request Management (ARM)
Confidential, Anchorage, AK
Principal Consultant - Sap Security
Municipality of Anchorage
HCM PROJECT
Structural Authorization, Indirect Assignment, Strategy, Policy
SRM, PORTAL, BI, ECC, HCM, ESS/MSS
Confidential
Managing Consultant - Application Architect SAP Security
Confidential,
Lead of HCM Security ( 36 Countries)
ESS/MSS, Portal, Eureka, ECC, HCM, ESS/MSS, XI/PI
Global HCM Project in 36 countries
Confidential, Global Projects
Back Point 1, Back Point 2 ( 170 Countries)
ECC, HCM, SRM, CRM, EWM, WEB UI (Business role), BI, BI-BPS, Portal, ESS/MSS, XI/PI
Confidential, Transition Project
Lead of SAP Security
Global implementation (46 Countries)
HCM, ESS/MSS, R/3, GTS, APO, BW-BPS, BI, CRM, SNC, MDM, MII, LPO, ESourcing, Portal (SRM, CRM, BI, MDM), Solution Manager, GRC, SLD, Business Process Management (BPM), GRC
Confidential, Development
Lead of SAP Security
Global implementation (36 Countries)
R/3, GTS, APO, BW, BI, CRM, SNC, MDM, Portal, HCM, ESS/MSS
Confidential, Total Upgrade, Security Lead (20+ Countries)
ECC, CRM, SRM, BI, GRC upgrade 5.1 to 5.3, GTS, Portal, XI/PI
Confidential,
Projects Description/Scope:
Business Scenario Overview
General Motors will offer leasing in Canada for Cadillac and Buick vehicles. The program will be administered by FLinx. GM will provide risk sharing in the form of a first loss guarantee.
GM is implementing the VIN-by-VIN Revenue Recognition Accounting System in SAP-ECC6. Three GM scenarios will be included in Phase 1:
- Collateralized Borrowing (CB) for GM US
- Limited Risk Leasing (LRL) - specifically Canada Leasing - for GM CA
- Multi-Element Arrangement (ME) for GM US and GM CA
Responsibilities/Deliverable/ Achievements:
- ECC 6, BI,CRM, SolMan, SRM, BI BPS, BOBJ,PORTAL, Ldap, Sun IDM, XI/PI
- Sap Security Approach- high level design
- R3 Security Strategy and Architecture
- Portal Security Strategy
- BI, CRM, SRM Security Strategy, HCM
- Sap Security Integration
- Business processes, data elements, documents and user position assignments
- Portal, BI, CRM, R3 roles and integration
- Testing, Cut Over and "Go life"
Confidential, Project (174 countries))
Project is consolidating its extensive global collection of individual SAP applications and versions into a single global instance that will deliver greater resilience and flexibility to IBM\'s operations in 170 countries around the world
Responsibilities/Deliverable/ Achievements:
- ECC 6, CRM2007, BI - Cognos, Portal
- SAP Security Strategy and Architecture
- BI Cognos Reconciliation
- GRC reports and BI Cognos reconciliation
- Internet Portal and BI Cognos integrations
- Ldap Bi Cognos Groups and Roles
- Integration with ECC6, CRM2007
SAP Security Consultant
Application Development & Sustainment, IT
Confidential,
Sub-Contract with Canada Corp and CSI in Sap Security Field (Clearance)
Montreal, Canada
Project Description/Scope: Extended Warehouse Management (EWM)
Responsibilities/Deliverable/ Achievements:
Solution Manager, Remediation SOD (segregation of duties), Re-design roles, ERP, Approva BizRights
Confidential
Lead SAP SECURITY Consultant
Subcontractor from Confidential,
- ECC 6, BI,CRM, Sol Man, SRM, PORTAL, Tivoli IDM
- HCM Remediation Project
- Roles and Infrastructure re-design
- Migration from ECC 5 to ECC 6
- BW 3.5 migration to BI 7.0
- XI/PI, Virsa
Responsibilities/Deliverable/ Achievements:
- Integration TIVOLI Identity Manager, UME and corporate LDAP
- RBAC - Role Based Access Control Model development
- Overview Role Based Access Control, Consideration of Role Based Access Control, The Role modeling challenge, Role Based Access Models Overview, Statement of the Problem
- Access Control Principles, The Implementation and Conversion Program, Migration Plan
- Implementing the Pilot Program, Role Based Access Control security AIX management overview,
- RBAC in Oracle (RDMS), Role Based Access Model for SAP, Policy-Based Authorization
- Business Processes, Business Policies, The RBAC pattern as an extension of the Authorization pattern,
- Role-Based Access Control (RBAC) Pattern, Implementing and Modeling Roles in ITIM
- Separation of Duty in Role Based Access Control System Pattern
Confidential
SAP SECURITY Consultant
Permanent
Industry: Multiple
Projects Description/Scope: Multiple/Security
Role: Team Lead (Security)
Competency Areas:
- SSO-Concepts (Certificates, SAP Logon Tickets)
- Kerberos and Public-Key Cryptography
- Business Continuity Planning
- Security Management Practice
- Security Infrastructure Architecture
- Compliance
- Enterprise SOA Security in SAP Systems
- Authorization groups functional tables, custom development authorization solutions
- Implementing and reviewing SAP Authorization Concept
- Integrating ABAP User-Management with Organizational Management
- Central User Storage Techniques
- Build Framework: Security Audit tools & Change Documents (SCDO)
- Maxware, IDM and LDAP in a company environment
- GRC Suite: Compliance Calibraitor.5.X, Role Expert, Virsa, Fire F, Maxware
- SAP UME administration and J2EE roles
- Handling PFCG (check indicators, SU24, transport & upload roles)
- Configure and implement cryptographic technologies in SAP System
- Responsibilities/Deliverables/ Achievements:
- Upgrade ECC 5.0 to ECC 6.0
- Security Policy and Strategy
- BI 7.0 Strategy and Tactics, Analysis Authorization, BI-BPS, BOBJ
- HLD for HR - BI Dynamic Authorization Model
- Conversion from Structural Authorization to BI analysis authorization.
- New GL (Security), ESS, MSS
- CUA Landscape and Presentation
- CUA creation, review, and recommendation
- P ADM SEC 70 Security Course Development (Author)
- GRC configuration and review
- Authorization Concept Lead Consultant (SAP Resource Management @ Field Services) New SAP development
- Security GTS 7.1 design and implementation (Global Trade Services)
- Analysis Authorizations (BI) creation and implementation
- PD profiles and BI structure security and authorization design
- Structural authorization BI analysis and BI structure conversation
- Upgrade to SAP R/3 Enterprise Release 4.70
- Integration Analysis: IBM Tivoli Identity Manager, LDAP, SAML, SAP UME, Internet Portal, Biller Direct
- IBM Tivoli Access Management Integration
- CRM2007 security and design
- Dynamic CRM Authorization Model, ACE and business roles set up and IMG (SPRO) configuration
- ACE, Web UI and ABAP roles integration from complete UCD (User Centered design SAP Methodology)
- An Architectural View of SAP\'s Analytical CRM Capability
- CRM integration with ERP, BI
- SAP CRM module, SAP Biller Direct, SAP Exchange Interface ("PI/XI")
- Flexible security framework that can be adapted to specific customer (business partners) needs
Confidential, Jacksonville, FL
Sr. SAP HR Security Consultant Duration: 13 months
Industry: Software Consulting Company, Government, Banking, Chemical, Retail, Pharmaceutical, Telecommunications, Manufacture
Project Description/Scope: SAP Global security and authorization support, development and design for
Share service (multiple projects).
Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SRM, BW, BI 7.0, Portal, XI, ESS/MSS, HCM
Operation System: Windows XP
Responsibilities/Deliverables: •
Security based on industry standards
- SAP framework for SAP HR Global security and authorization support and implementations.
- Development of tailored security and controls techniques in conjunction with system implementations (i.e. ERP) and the design or re-engineering of business processes (i.e. shared services environment
Achievements:
- Completed SAP Global security and authorization (HR) support for 11 Global companies
- Completed SAP Global implementation for leading global provider of electronics • manufacturing services (EMS) and integrated supply chain solutions
- Virsa and Upgrade to GRC 5.0
Confidential, Victoria, BC
Senior Security Consultant
Industry: Software Consulting Company, Public Sector, and Government
Project Description/Scope: SAP framework for security and authorization design for Public Sector.
Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, SAP CRM, SAP Biller Direct BW, Portal, XI, SAP FI, CO, MM, PP, SM, PSCD and others
Operation System: Windows XP
Project Development: ASAP/Value SAP, Security and Authorization
Responsibilities/Deliverables:
ASAP methodology/User Centered Designed
- Role definition depends on HR positions
- Conversion from "as is" to "to be" business processes
- Assignment of Authorization Groups to Tables (TDDATA, VD DATA)
- Authorization groups and tables trace from applications
- Access Control- Authorization Groups (SM30, TBRG table)
- Role design "ABAP and JAVA" sites for XI
- Security Strategy for web Methods Integration Platform
- Role design, development and assignment (PFCG, SU01)
- Authorization Groups-Report-types programs (SA38, SE38, AUTHORITY CHECK)
- Document Types in design and configuration processes (T003)
- Check indicators (SU24, SU25, SE93, and SE97)
- Authorization checks by assigning reports to authorization classes (RSCSAUTH)
- Tables for relationship for Tcode, Roles and users (Agr Users, Agr Texts, Agr Tcodes, and TSCT)
- Developed CUA for all systems from XI
- Sensitive Transactions Analysis (objects level matrix)
- Segregation of Duty matrix (objects level matrix)
- Role design and security policy strategy
Achievements: Completed Security and authorization design for Public Sector project.
Senior SAP Security Consultant
Confidential, Ottawa, ON
Ottawa, Ontario, Canada
Industry: Government (Security Clearance)
Project Description/Scope: Re-Design SAP security and authorizations
Role: Senior SAP Security Consultant
Responsibilities/Deliverables:
- Re-Design SAP security and authorization
- Analyze current situation
- Role selection multidimensional matrix
- Role definition depends on HR position
- Re-designed and re-built security roles (PFCG)
Confidential, PwC
SAP SECURITY ADVISOR
Industry: Financial, Chemical (Security Clearance)
Project Description/Scope: • SAP audit (Automatic Control Environment)
• Application and Software: SAP R3 4.7 Enterprise, Visio, Microsoft Project, ACE-Automatic Controls
Environment:, Guardian- Manual Controls Environment
• Operation System: Windows 2000, Unix, and Oracle
• Project Development:
ASAP/Value SAP, Security and Authorization, SOX, SOD- Segregation of Duties
Test, STA-Sensitive Transaction Analysis
Responsibilities/Deliverables:
SOX, SOD Analysis and advice
- Assessment of the SAP control environment to identify internal control deficiencies and recommend improvements
- SAP Audit (ACE)
- Business Processes- "As is"-Transactions -objects-authorizations field\'s Analysis, best practice and recommendations
- Sensitive Transaction Analysis (objects level matrix)
- Segregation of Duty matrix (objects level matrix)
- Operational Control and Computer Operations Analysis
- Physical Security and Security Polices
- Completed assessment of the SAP control environment to identify internal control deficiencies and recommended improvements.
- Completed SOD and SOX analysis and recommended improvements
Confidential, Saudi Arabia
Project Lead of Medical Designated Facilities
Industry: Oil, Health Care, and Hospitals
Project Description/Scope: • Medical Designated Facilities System involved 105 hospitals, clinics, and remote area designated facilities across the country
Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal
6.0, SRM, APO, SRM, HR
Operation System: Windows XP
Project Development: ASAP/Value SAP, IS-H and IS-H* Med, Security and Authorization, Documentum
Role: Project Technical Lead of Medical Designated Facilities
System (105 hospitals, clinics, and remote area designated facilities Monitoring Quality of Healthcare), Kingdom of Saudi Arabia (50+ international
Consultants\' global team)
Responsibilities/Deliverables:
- SAP User - Centered Design
- Gave guidance and control to the project and project organization
- Flexible framework, which can be adapted to specific customer needs
- Increase productivity by provision of templates, tools, and examples
- Completed Business Blueprinting
- Industry-Specific Components for Hospitals (IS-H, IS-H*MED)
Roles and security strategy design for: • SAP R3
- Customer Relationship Management (CRM) includes the methodologies, strategies, software, and web-based capabilities that help an enterprise organize and manage customer relationships.
- Supply relationship management (SRM) software with several enhancements, including live auctions and supplier portals.
- Advanced Planner & Optimizer (APO) provides up-to-date information about a company\'s current inventory and triggers orders for more supplies when a certain quantity of customer orders have been placed and processed. Authorization of APO users has to specify in the BW system
- Different scenarios for Single Sign-On to SAP Systems
- Defined on high level design which method of Single Sign-On (SSO) you use with a SAP System
- Application and Software: SAP R3 4.7, Visio, Microsoft Project Manager, BW 3.5, and Internet Portal 6.0, SRM, APO, SRM
- Operation System: Windows XP
- Project Development: ASAP/Value SAP, IS-H and IS-H* Med, Security and Authorization, Documentum
- Defined quality assurance checkpoints and formats of deliverables
- Guided customer staff in implementation tasks with clearly defined rules and responsibilities
- Supported consultants in the various functional areas to work in a similar way within a project team
- Detailed design phase of the project
- Captured the detailed scope and requirements for:
- Business processes
- Master data
- Organization structures, Hospitals structures
- Development work
- Produced a blueprint to describe how the business intends to run its business using the SAP R/3 system:
- Established the development system:
- Provided Team Training, Business Process Master List, Development Master List (DML)
- Business Blueprint Document, Configuration Approach Document
- Landscape Strategy, Rollout Strategy, Change Management Document Strategy
- Development System Environment, BB Management Summary
- Confidential t Management, Eligibility Check, Contract Management
- Basic Data flow modeling, Data selection matrix
Confidential, Kingston, ON
Senior SAP Analyst/SAP Security Analyst
Industry: Health Care, Hospitals
Project Description/Scope: SAP-Security and Authorization. IS H* prototype
Role: Senior SAP Analyst/SAP Security Analyst
Responsibilities/Deliverables:
ASAP/Value SAP
- Evaluation of business processes
- Design high-level strategy for SAP Security (Architecture)
- SAP-Security and Authorization
- SAP profile Generator (PFCG)
- SAP module concept
- SAP Hierarchy Concept
- SAP Technical Structure and promote to Production Strategy
- Security Control Tools
- Organizational Management
- Structural Authorization
- Business conception (model) of structural authorization
- Security upgrades using SU25 and Profile Generator (PFCG)
- Review and correction of sensitive authorizations (s tabu dis, s rfc, etc.), including creation and assignment of custom authorization groups for sensitive tables
- Evaluation and recommendation of SAP menu vs. user menus
- Resolve issues arising from testing using system traces and dumps
- PD and PA Switches (OOPS, OOAC)
- Conversion of manual profiles and implementation of role based security, including IM department
- Evaluated and used SAP standard roles as templates for custom roles
- Review critical and sensitive authorizations, implement improvements to meet audit requirements
- Post Go Live support to resolve all security-related issues
- Evaluation of Central User Administration (CUA)
- Maintenance of HR organizational structure to administer and control user access, including timedelimited access (e.g. temporary assignments to positions)
- Basic HR configuration (e.g. create Evaluation Paths for reporting purposes)
- Comprehensive knowledge exchange and documentation of Security and HR functions, including use of PPOMW, Expert functions (PO10, PO13, etc.)
- Profile Generator (PFCG) and related functions
- IS H* prototype
- Established detailed security upgrade plan, strategy and dual maintenance procedures
- Created of new 4.6C authorization objects and values
- Evaluated customized matrix of Authorization groups - tables, users - groups
- Used of HR structural transactions (e.g. PPSC) to maintain workflow position to position assignments
- Customized HR to allow activity group assignment in PPOMW
- Created of HR security authorization objects for structural authorizations based on Info Type and allowed functions / activities (e.g. Help Desk staff were only allowed to display structural assignments, not change users assigned to positions, etc.)
- Created Organizational Plan (PPOM OLD), Personal Master Record (PA40), User I.D (SU01, SU10),
- Info type 105(PA30), Structural Authorization Profiles (OOSP), Info type 1017 (PO10), Assigned Info type 1017 (PO13), Assigned Structural Authorization Profiles to User I.D (SE38), Setup Regular security (PFCG)
- Cleaned up and optimized security Roles
- Established security testing procedures and tools
- Worked on procedures and applications of dual-maintenance of security changes
- Worked to build strategy and implemented structural authorization
- Built and evaluated up to 5 different IS H* prototypes
Senior Systems Analyst
Confidential, Foster City, CA
Technical Lead
- Conversion (migration) from Assembler 370 (3, 5 millions lines of cod) to C/C++ (mainframe and PC) environment was using Visual Age C++ for TPF. My responsibilities involve directing the Process and Technology Deployment (PTD). PTD supports the Shared Services Organization in the evaluation, acquisition, and roll out of software tools and development methodologies.
- Responsibilities also involve object oriented (OO) mentoring the teams (Over 500 people) engaged in OO development using UML based tools for analysis and design. Advising development teams on how to effectively utilize tools for OO structuring team oriented development. Also need to participate in the development of guidelines and other forms of support documentation such as guides in setting up their environment and instruction manuals.
- Designed a critical Visa International application for TPF (CVV-Card Verification Value, Functional Messages, and Address Verification Value) Carried out initial system study and design and involved in full phase of development. The project contains over 3 million lines of code. Worked as software architect and consultant for project VISA NEW GENERATION
Application and software: Rational Rose, Visual Age C/C++, Extra For TPF, NFS Maestro Solo, MS
Exchange/MS Outlook, MS Internet Mail, MS Office and MS Excel
Operation System: Window NT4.0, AIX UNIX 4.2, MVS, VM, TPF (VPARS)
Hardware: IBM mainframe, PC workstation
Project Development: Large system, locking critical Visa applications
Member of Boeing
Confidential, Carleton Place, ON
Senior Embedded Programmer Analyst
- Designed air traffic Control System for Cuba (drivers for fire wire backup of air traffic system, radar simulator), Air traffic Control Simulator (client and telecommunication server), TCP/IP, SMTP, Voice Communication Systems, DSP\'s SIEMENC, MOTOROLA (MPC7450), i960, INTEL, EMULEX, (PEB 2 0 ), drivers, these entailing the development of deferent models to forecast the effects of alternative sector and route geometry\'s, the establishment of a lab to house simulation models and the reams of data they employ and the development of a internationally recognized process for airspace
- Designed Small Computer Systems Interface (SCSI), back up systems for Air traffic Control SCSI-3 technologies disk array applications, Hot-Swap support. Worked as software architect for low level software and hardware development
- Designed 3 functional areas: Interfacing, Switching and Conferencing, Supervision and Control
- Designed the program for main component of architecture a Peripheral Component Interconnect adapter card
- It performs the Switching/Conferencing, Supervision and Control. It communicates with the Interface Shelf for reception of Signaling and Supervisory signal, voice, and data
Application and Software: C/C++ compiler for Linux, Hardware and Software Configuration, Assembler, C/C++, and, Java 2.0, Vi editor
Operation System: Linux (Caldera, Slack ware, Red Hat 4.1-6.1, Turbo Linux), UNIX, Windows NT, Windows 98, Qunix
Hardware: PC server/workstation, oscilloscopes
Project Development: Air traffic control systems, Air traffic control simulator, backup systems, firewire drivers, Linux drivers (PCI, ISA, Firewire), touch screen drivers
Senior Programmer Analyst
Confidential, Toronto, ON
- Designed, programmed, tested, and documented set of batch applications to check information in the database
- Designed, programmed, tested, and documented the interface application between two warehouse systems.
Environment: Application and software: Oracle 7, C, Pro*C/C++, PL/SQL, OOP methods, MS Exchange/ MS Outlook, MS Internet Mail, MS Office 98 and MS Excel. Operation System: AIX UNIX 4.2, Window NT4.0 server/workstation, Windows 95. Hardware: PC server/workstation