Santhosh - SAP GRC

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

P.

Santhosh
Email: [email protected]
Ph. (M) +91-9441156191
SAP Security & GRC consultant
-------------------------------------------------------------------------------------------------------------------------
WORK EXPERIENCE

 Offering 3.5 Years of experience across the industry.


 Extensive experience on SAP R/3 Security SAP GRC Access Control & includes Support activities,
Enhancement and Maintenance Projects of SAP.
 Post-Installation Configuration activities of GRC 10.0 Access control components (ARM, AQM, BRM and
EAM).
 HR Security & BI Security

SOFTWARE & TOOLS

• SAP Environment : ERP - SAP R/3 4.7 EE, ECC 5.0, ECC 6.0,
• Operating systems : MS Windows NT/2000/2003/XP
• Compliance tools : GRC AC (ARM, AQM, BRM and EAM)
• Supporting Modules : HR Security and BI Security
• Ticketing Tools : Remedy

ACADEMIC PROFILE: B.Tech from JNTU University, 2010.

PROFESSIONAL EXPERIENCE:

Company : Wipro Technologies


Type : implementation & Support
Technology/Software : ECC6 and BI 7.0, Oracle 10i, Net weaver 4s
Role : SAP Security Consultant
Duration : April 2012 to till date.

Project - 2
Client Philips
Role SAP security consultant
Organization Wipro Technologies
Duration Aug 2013 to till date

Responsibilities:

 As team member worked in Wholesale Reorganization project to centralized role creations and
modifications
 SAP application Security development by taking business requirements and building Security roles using
Profile Generator tool (PFCG).
 Maintain customer specific objects using SU24.
 Customizing authorization object creation
 Master and Derive role concept.
 Value and Transaction role Security approach.
 HR structural authorizations.
 BI analysis authorizations.
 User Administration in the entire landscapes (Prod\Test\Dev)
 Requirement Analysis: Authorization requirements and Design of authorization structure.
 Involved in Role & Profile maintenance and assigning Roles & Authorizations to the Users.
 Troubleshooting user’s authorization failures and day to day issues in all landscapes and resolving all security
related issues.
 Analyzing the authorization issues using SU53 dump and ST01 then providing the solution based on the user
position.

Project – 1
Client Boston Scientific
Role SAP Security, GRC Consultant
Organization Wipro Technologies
Duration May 2012 to July 2013

Roles and Responsibilities:

 Understanding and implementing the Change Control process for any enhancements or operational changes
as required.
 Creating and maintaining template roles, derived roles, and composite roles using Profile Generator (PFCG)
across different landscapes.
 Analyzing and solving missing authorizations (using SU53 and System Trace ST01) and day-to-day security
issues that are being raised by the users using Remedy ticketing tool and common mailbox requests.
 Maintaining organizational values as and when required while creating / modifying single activity groups and
updating the documents.
 Generating reports using SUIM and security tables for Internal Security Audit and other requirements as and
when required.
 Knowledge in BW authorizations.
 Working with the functional support groups for development of new security policies and procedures for
SAP applications.
 Create, up version the System Requirement and Design specification documents with respect to security
changes.

HR Security
 Assign Roles to the position.
 Creating link between personal numbers to user id.
 Assign structural profile to users.
 Extensively used PA20, PA30 Transactions.
 Finding position and assigning role to position in PO13.
BI Security
 Maintain BI authorization objects based on the business requirements.
 Worked on management and maintenance of Authorization object by using (RSECADMIN)
 Worked on Trace the users in BI.
 Handling end user day to day BI security support.
 Expertise in standard and analysis authorization in BI security, RSECADMIN.

GRC AC 10.0
 Post-Installation Configuration activities of Access control components (ARM, AQM, BRM and EAM).
 Activate Applications
 Activate Services
 Activate BC Sets

You might also like