FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

SAP Security Consultant

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 SAP Security Consultant Skills

Below we've compiled a list of the most important skills for a SAP Security Consultant. We ranked the top skills based on the percentage of SAP Security Consultant resumes they appeared on. For example, 5.1% of SAP Security Consultant resumes contained ECC as a skill. Let's find out what skills a SAP Security Consultant actually needs in order to be successful in the workplace.

These are the most important skills for a SAP Security Consultant:

1. ECC

demand arrow
high Demand
Here's how ECC is used in SAP Security Consultant jobs:
  • Performed technical upgrades for (ECC 6.0) to enhancement pack 5 and (CRM 7.0) to enhancement pack 1.
  • Provided expertise in SAP Security across system landscape which included ECC, Portal, BW, BI Solution Manager.
  • Provided comprehensive support for ECC, HR, CRM, BW and new PLM role out systems globally.
  • Assisted with testing and implementation of SAP upgrade to 4.7 and ECC 6.0 for 50,000+ users.
  • Designed, configured and deployed project access to CRM, ECC, and BW HANA systems.
  • Assisted in trouble shooting and resolving issues with ECC roles during ECC functional unit testing.
  • Identified Roles which are going to be impacted using SU25 after upgrade to ECC 6.0.
  • Performed an SOD Remediation for an ECC 6.0 system with 1500 Users and 27000 roles.
  • Worked as SAP Security Consultant on ISTA North America, SAP ECC implementation project.
  • Created RFC connection between ECC and CRM systems and maintained roles in two systems.
  • Worked on multiple Service Pack and Release Upgrades for ECC/BI/CRM/XI/Portals.
  • Lead SAP Security Support for SAP Implementation Project ECC 5.
  • Perform complete ECC Security and BI Security activities for the Client
  • Configured and assigned Portal roles for ECC users.
  • SAP System Landscape included ECC 6.0, BI 7.0, CRM7.0, GTS and SRM 7.0 Environments.
  • Involved in complete End to End up gradation in CRM 7.0 and ECC 6.0.
  • Assisted with upgrade of R/3 to ECC 6.0 running on Net weaver 7.0.
  • Worked with BI, ECC, CRM and GRC v10.1.
  • SAP Security Project Lead SAP Security Lead on an ECC 5.0 to ECC 6.0 Upgrade Project at a major aircraft manufacturer.
  • Implemented a global Labeling System with a Portals 6.0 front-end, ECC5.0 SAP system and a Documentum back end.

Show More

2. GRC

demand arrow
high Demand
Here's how GRC is used in SAP Security Consultant jobs:
  • Configured Owners, Controllers and security setup along with configuration parameters in SAP GRC Emergency Access Management.
  • Redesign GRC Rule-set, Identified new risks, functions and removed false positives in GRC rule set.
  • Provide first-level support for users with GRC related problems or questions about the systems administered.
  • Configured all the four components ARA, ARM, BRM and EAM during GRC implementation.
  • Project Manager for Governance, Risk and Compliance Management (GRC) Access Enforcer project.
  • Implemented all security blueprints for each module using GRC 10.0 with respect to SOX requirements.
  • Provided daily SAP security support for role design and changes required for GRC compliance.
  • Worked on GRC tool in processing the SOX requests figuring out the root cause.
  • Worked on GRC VIRSA Access Enforcer for role authorization and User Creation.
  • Support for GRC 5.3 configuration and training functional analyst on usage.
  • Involved in post installation and Configuration of GRC activities.
  • Configured the GRC Compliance Calibrator 5.2 and Access Enforcer.
  • Provide technical support for any GRC production related issues.
  • Involved in GRC 10.0 end to end implementation.
  • SAP GRC: * Updated Transactions Codes, Functions, Risks, Rules, Rule Matrix in GRC.
  • SAP GRC: * Worked with implantation team in upgrade from GRC 5.3 to GRC 10.
  • Worked on implementation of GRC 10 version of Emergency Access Management component and ARA.
  • Worked along with the KPMG/Protiviti auditors in extracting the reports from GRC.
  • Created RFC connection between GRC and Backend systems.
  • Analyze the mitigations in GRC tool and update / create mitigations based on requirements.

Show More

48 GRC Jobs

No jobs at selected location

3. Compliance Calibrator

demand arrow
high Demand
Here's how Compliance Calibrator is used in SAP Security Consultant jobs:
  • Gained expert-level experience with GRC Access Control Suite tools (Compliance Calibrator, Access Enforcer and Fire Fighter).
  • Used Compliance Calibrator tool to identify the risks and remove them by making changes in the role groups.
  • Set up the batch jobs to import authorization data from SAP to the GRC Compliance Calibrator tool.
  • Used GRC Compliance calibrator for checking any risk involved in role through authorization object level.
  • Used Compliance Calibrator extensively to determine the risks associated with the roles.
  • Risk Management and administration via Compliance Calibrator (CC) tool.
  • Generate SOD reports and mitigation of users via Compliance Calibrator.
  • Worked GRC 5.2 Access Enforcer, Compliance calibrator and Firefighter.
  • Created and modified functions and risks using Compliance Calibrator.
  • Used Compliance Calibrator by VIRSA to define SOD violations.
  • Performed auditing and SOD check using compliance calibrator tools.
  • Experience working on GRC Compliance calibrator and Firefighter.
  • SoD reporting using VIRSA Compliance Calibrator tools.
  • Uploaded Rule sets in compliance calibrator.
  • Used Virsa Compliance Calibrator (Simulation mode and Detail mode), Firefighter to identify SOD's and resolve any issues.
  • Developed, configured, maintained and upgraded Virsa (GRC) Compliance Calibrator.
  • Configured as well as maintained Virsa Compliance Calibrator 4.0 and Risk Terminator.
  • Used GRC Compliance Calibrator to check for SODs on IDs/roles.
  • Implemented GRCCompliance Calibrator and Firefighter catering to the audit needs.
  • Created Connecters for Compliance Calibrator, Access Enforcer & Firefighter to the backend R/3 Landscape.

Show More

4. BI

demand arrow
high Demand
Here's how BI is used in SAP Security Consultant jobs:
  • Performed vulnerabilities audits, penetration tests, security audits, created firewall implementation guidelines.
  • Created a spreadsheet that contained the software packages capabilities along with Pros and Cons for each software package reviewed.
  • Represented SAP Basis Security team in the bi-weekly Change Control Management meetings to review Security changes and defects.
  • Project Name: ABBOTT Labs India Project Role: Security implementation for SOLMAN 7.1 Project Responsibilities:.
  • Run various reports in BizRights to find the violation trend at the user and role level.
  • Project Role: L1 Team Lead and L2 Team member Project Responsibilities:.
  • Prepared a Plan for Role Redesign to stabilize the EFL security roles.
  • Project Name: IHS Project Role: Security Support Project Responsibilities:.
  • Installed & configured SAP BI on Net weaver 2004s.
  • Assist with other tasks such as Billing Receivables.
  • Implemented BI Security for the Client.
  • Tuned Enterprise Portal for BI.
  • Traced the users through RSSM in the BI Environment.
  • Applied to both R/3 and BW/BI 7.0 environments.
  • Generate Access Lists in Bizrights, and perform access remediation on user accounts based on its reports.
  • Allocated them with responsibilities and made sure all the tasks are completed in a timely manner.
  • Configured and defined the access provisioning approval process by combining roles and permissions with workflow.
  • Designed Roles & Responsibilities matrix for restricting NWBC Workcenters of GRC 10.1 front end.
  • Maintained / enforced SOD rules during role redesign project using Approva Bizrights SOD tools.
  • Provided support for upgrade of Approva Bizrights 4.5 to ApprovaOne 6.1 project.

Show More

5 BI Jobs

No jobs at selected location

5. User Administration

demand arrow
high Demand
Here's how User Administration is used in SAP Security Consultant jobs:
  • Performed user administration through development quality and protection environment.
  • Maintain User administration and System administration for Portal systems.
  • Performed user Administration & adding authorization to users.
  • Worked on Portal user administration.
  • Assisted in setting up ALE and configuration of Central User Administration (CUA) system to perform user administration centrally.
  • Used Central User Administration using SCUM and SCUL to set up over 1000 SAP users.
  • Perform user administration (creating, changing, maintaining, deleting and assigning roles).
  • Set up, configured, and maintained Central User Administration (CUA) landscape.
  • Worked on user administration in Development, Quality, Training and Production instances.
  • Worked on Portal user administration and assigning portal roles and groups to users.
  • Assisted in Central User Administration, monitoring and trouble-shooting in SAP environment.
  • Performed User Administration tasks like creating, modifying, deleting the users.
  • Set up Central User Administration (CUA) to manage multiple systems/clients.
  • Performed user administration including Central User Administration (CUA).
  • Worked with Portal security, User administration and UME.
  • Set up and Administration of Central User Administration.
  • Created LSMW scripts for mass user administration.
  • Provided user administration for SAP Enterprise Portal.
  • Performed User Administration in ABAP (SU01) and JAVA (UME) environments Performed User Creation/User Mass Creations.
  • Created LDAP users and role assignment to the Portal users Responsible for user administration, roles and profile generation.

Show More

4 User Administration Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. SAP R/3

demand arrow
high Demand
Here's how SAP R/3 is used in SAP Security Consultant jobs:
  • SAP R/3 Security for User Master Records Maintenance, maintaining authorizations group/profiles/roles and assigning roles/profiles to users.
  • Complete user administration in SAP R/3 (creating, modifying, and deleting, locking, unlocking and resetting passwords).
  • Supported the implementation of SAP R/3 3.1G running on RS6000 using Oracle, having one database and five application servers.
  • Handled Security designing roles for modules of SAP R/3 such as FI, MM and PP.
  • Implemented SAP R/3 Logical Security in compliance with Sarbanes-Oxley (SOX) sections 404 and 302.
  • Worked closely with Audit team for user-role conflict removal in SAP R/3 and SAP BW.
  • Worked on maintaining derived roles, single roles and composite roles in SAP R/3 systems.
  • Defined SAP R/3 authorization profiles Build and tested SAP User roles and authorizations.
  • Defined and documented the standards to be used in SAP R/3 and BW.
  • Provided SAP Security recommendations in redesigning the SAP R/3 roles using composite roles.
  • Created and maintained user authorization, roles and profiles for SAP R/3.
  • Designed several utilities to support SAP R/3 security reporting needs.
  • SAP R/3 6.40 - Sarbanes-Oxley Audit and Corrections Project.
  • Provide authorizations between web-based applications and SAP R/3.
  • SAP R/3 was already implemented at this client.
  • Performed knowledge transfer on SAP R/3 security environment.
  • Provided knowledge transfer for SAP R/3 security environment.
  • Designed Enterprise Portal, SAP R/3 and BW roles.
  • Installed SAP R/3 System on Windows NT.
  • SAP R/3 4.7 SAP Security assessment project on R/3, BW and APO to better support 20 locations worldwide.

Show More

7. Pfcg

demand arrow
high Demand
Here's how Pfcg is used in SAP Security Consultant jobs:
  • Create single role, composite role and derived role as per organization structure in both ECC and BI systems using PFCG.
  • Created single roles, Composite roles, and parent & derived roles as per company requirement using PFCG.
  • Created single roles, composite roles and derived roles as per organizational structure in R/3systems using PFCG.
  • SAP Role administration and enhancements of single, master/derived, composite roles via PFCG transaction.
  • Performed audits on existing roles and authorizations using t-code PFCG role maintenance.
  • Worked with PFCG for Role and profile management and additions.
  • Converted some authorization fields into Org values using report PFCG_ORGFIELD_CREATE.
  • Worked on PFCG role menu creation using the programs.
  • Executed PFCG_TIME_DEPENDENCY report in background to perform cleanup.
  • Create roles via PFCG and generate Authorization Profiles.
  • Developed roles from approved design using PFCG.
  • Performed User comparison in PFCG.
  • Managed mass transport with PFCG, STMS, SE01, SE09 and SE10.
  • Performed User master reconciliation using PFUD and by scheduling background job pfcg_time_dependency.
  • Performed role modifications based on projects requirement using PFCG.
  • Designed E- Recruting Roles by Using Role Maintenance transaction PFCG to generate profiles for your SAP E-Recruiting users.
  • Updated, created, and redesigned single and composite roles using PFCG in various SAP ERP's systems.
  • created roles by using PFCG and maintain role on a daily basis.
  • Maintain and configure Multi-Stage-Multi-Path (MSMP) workflows and have assigned the proper PFCG roles pertain to workflows.
  • Single/Composite/Master/Derived) Managing mass transport with PFCG and STMS, SE01, SE09, SE10 Understanding of Authorization groups.

Show More

8. HR

demand arrow
high Demand
Here's how HR is used in SAP Security Consultant jobs:
  • Involved in using UME groups and SNC, Integrated and synchronized Enterprise Active Directory with the Enterprise Portal.
  • Tested the new task based roles along with the functional teams and transported through the landscape.
  • Perform system copies/ refreshes, HR support package updates, Tub and Regulatory bulletins as needed.
  • Installed & configured multiple System Landscape Directories (SLD) with replication & synchronization.
  • Designed, created and modified roles, profiles and assignment to users through PFCG.
  • Implemented Structural Authorization to limit access to HR objects in the organization structure.
  • Contracted through SAP America for Project leads Larry Justice & Ted Patrick.
  • Created modified, locked users through ARM component and performed risk analysis.
  • Created authorizations for HR transactions that do not have their own authorization.
  • Managed BI source systems from initial setup through post system-copy adjustments.
  • Implemented SAP HR Structural Authorization on the basis of PD objects.
  • Worked on HCM security and provided production support on HR issues.
  • Assisted HR security implementation & support and Auto-Provisioning from GRC.
  • Support through Access DB (Incident Management-IM).
  • Monitored Locked Objects, Thread Overview.
  • Created, modified roles for SAP (MM, PP, FI, CO, HR, SD, BW).
  • Maintained HR organizational structure to administer and control user access including time delimited access.
  • Designed and Implemented structural authorizations to cover HR requirements and Possesses good understanding of the various HR Infotypes in the system.
  • Provide support services for SAP Security, HR and workflow.
  • Synchronize HR actions to organizational data via RHINTE30 Documentum account set up.

Show More

9. Su53

demand arrow
high Demand
Here's how Su53 is used in SAP Security Consultant jobs:
  • Analyzed authorization errors using authority checks (SU53), system trace (ST01) and STAUTHTRACE transactions.
  • Fixed authorization issues encountered during the Unit and Integration testing using the help of SU53 and ST01.
  • Trouble-shoot authorization problems using Repository Information System and tracing authorizations using SU53, SU24 and ST01.
  • Provided Level-3 security expertise in resolving complex authorization issues using ST01, SU53, and SUIM.
  • SAP trouble-shooting tools (transactions SU53, ST01, SUIM) were used in determining problems.
  • Analyzed authorization problems using system trace (ST01) and authorization data (SU53).
  • Analyzed SU53 error checks during testing and to find missing authorizations and transaction codes.
  • Analyzed user's outputs and corrected security deficiencies (SU53 & SU56).
  • Utilize Security authorization analyzing tools (SU53 & ST01) for error review.
  • Trained SAP Security staff on SAP Security Administration troubleshooting, beyond SU53.
  • Identify missing authorizations by using SU53 and maintain them manually in PFCG.
  • Assisted users with access problems and questions using SUIM and SU53.
  • Analyzed and resolved authorization issues using SU53, SU56 & ST01.
  • Find out last failed Authorizations using SU53 report from the user.
  • Used transactions such as SUIM, SU53 to troubleshoot problems.
  • Used ST01 & SU53 to analyze failed authorizations.
  • Used several transactions (SU10, SU53, SU24, SUIM etc.)
  • Created training materials and trained business team and support teams involved Investigated and solved complex security issues using SU53 and ST01.
  • Resolved approximately 45 support tickets Find out missing Authorizations using SU53 report from the user.
  • Analysed various type of authorization object problems using SU53 screenshot and assigned missing authorization to the users.

Show More

10. Authorization Objects

demand arrow
high Demand
Here's how Authorization Objects is used in SAP Security Consultant jobs:
  • Implemented Info Object Security (field-level security) for reporting users and also created custom reporting authorization objects.
  • Traced the SAP-provided objects and custom reporting authorization objects to debug an authorization error.
  • Regulated access to critical authorization objects by maintaining the right authorization groups.
  • Developed and maintained all SAP authorization object classes and authorization objects.
  • Configured roles and authorization objects to secure reporting users.
  • Developed custom Authorization Objects based on BW developer requests.
  • Identified new transactions and authorization objects for 4.6d environment.
  • Implement standards for custom authorization objects.
  • Configure and implement SAP security, applying roles and custom authorization objects for eight R/3 systems.
  • Used the roles as the medium to assign the analysis authorization objects rather than direct assignment.
  • Maintained GRC Rules update by uploading the new changes required for Transactions and Authorization objects.
  • Maintained key CRM 7.0 security authorization objects (UIU_COMP, C_LL_TGT, etc.)
  • Involved with creation and maintenance of activity groups and custom authorization objects.
  • Created custom Authorization Classes and Authorization Objects (SU21).
  • Worked on S_RS_*, S_RSEC and S_RS_AUTH authorization objects.
  • Resolved issues related to authorization objects using t-code RSSM.
  • Worked on critical authorization Objects like S_TABU_DIS, S_TABU_NAM, S_DEVELOP, S_PROGRAM and S_TRANSPRT.
  • Worked with BI/BW Authorization objects, S_RS_COMP, S_RS_COMP, S_RS_ICUBE, S_RS_FOLD etc.
  • Monitor various ticketing Queues for timely resolution Securing tables with critical authorization objects.
  • Monitored access to key authorization objects such as S_BTCH_ADM, S_ADMI_FCD, S_TABU_DIS, S_DEVELOP for debug access and etc.

Show More

2 Authorization Objects Jobs

No jobs at selected location

11. Fighter

demand arrow
high Demand
Here's how Fighter is used in SAP Security Consultant jobs:
  • Configured Owners, Controllers and security setup along with various configuration parameters in Firefighter.
  • Participated in GRC upgrade assisting in verification of Firefighter use.
  • Documented and trained business teams in using firefighter.
  • Managed the day to day clean-up of EAM (Firefighter) logs and Work flow error logs.
  • Worked with SAP GRC Super user Privilege management and Emergency Access Management tool (Firefighter).
  • Supported and tested GRC 10.1 roll out of Fire Fighter for handling exceptional access requests.
  • Provide Firefighter access, after receiving approval, to team members to resolve issues immediately.
  • Installed predefined VIRSA firefighter roles over the R/3 landscape and used Security for SOX compliance.
  • Experience in creating and assigning FF ID's and extracting Fire Fighter logs.
  • Created RFC connection by using SM59, assign fire fighter id.
  • Scheduled firefighter background jobs to read firefighter logs.
  • Created Fire Fighter user and Fire fighter role.
  • Completed project to build new Fire Fighter roles.
  • Perform Firefighter ID Provisioning Tasks.
  • Installed & implemented Virsa Systems Risk Management and Firefighter software.
  • Supported Emergency access management, created Firefighter monitors and approvers.
  • Initial Configuration of Fire Fighter and Compliance Calibrator Handling different work centers in SAP PI system.
  • Worked with IT & Business liaisons to identify new Controllers, Owners & FIreFighters.
  • Updated Fire Fighter log thru SM37 Develop and created SOD matrix with the help of Sod matrix development team.
  • Involved in the GRC tools implementation like Compliance calibrator , Access enforcer, Role Expert and Virsa fire fighter.

Show More

12. SOX

demand arrow
high Demand
Here's how SOX is used in SAP Security Consultant jobs:
  • Worked with respective functional heads for segregation of duties and security changes based on SOX requirements.
  • Trained Business Process Owners, SAP Security Staff, JSOX and SOX compliance teams on.
  • Created new roles as per the new business processes, in accordance with SOX compliance.
  • Provided SAP security audit clean up tasks for SOX compliance and JSOX compliance.
  • Worked closely with the SAP Security team to define the processes for SOX.
  • Educated testing team about how to test security profiles and SOX specific testing.
  • Modified the SOX rule on the basis of the recommendation by Auditors.
  • Define the business areas which needed to be compliance with SOX.
  • Developed processes and procedures in compliance with the SOX act certification.
  • Coordinated and managed monitoring, compliance and reporting activities for SOX.
  • Participated with the team for SOX compliance processes and best-practices.
  • Pulled monthly reports using security weaver for SOX compliance.
  • Utilize SOX tools to review role for compliance.
  • Implemented security changes based on SOX Act requirements.
  • Redesigned roles for SOX compliance.
  • Define the procedure for the Roles and Users to be compliance with SOX.
  • Prepared the roadmap for design of SOX IT controls, drafted the testing steps and quarterly assessments.
  • Tested the new and existing roles with Approva BizRights to find the exact SOX/SOD violation.
  • Created Rules, Rulebooks, and Templates for BizRights for both SOX and Access Lists.
  • Uploaded the SOX Rule (.zip and .xml format) in to Approva BizRights.

Show More

13. CUA

demand arrow
high Demand
Here's how CUA is used in SAP Security Consultant jobs:
  • Managed user provisioning activities utilizing CUA with Solution Manager 7.1.
  • Administered entire CUA landscape monitoring & improving performance.
  • Worked with maintaining CUA in Production/Non-Production.
  • Worked on Real Tech Transport Manager tool and mass transports in CUA system through STMS.
  • Integrated CUA with Microsoft Active Directory Portal Administration of users, UME Groups and roles.
  • Used CUA to maintain users(Creation, deletion, locking etc).
  • Involved In the implementation of CUA and maintenance of the same.
  • Worked to integrate CUA, and on solution manager system.
  • Installed and deployed Central User Administration (CUA).
  • Design central systems CUA to extract from LDAP.
  • Experience in CUA administration and maintenance.
  • Helped setup CUA for the enterprise.
  • Worked on CUA administration and maintenance.
  • Utilized CUA for User deployment.
  • Review logs in CUA using SCUL.
  • Define Authorization relevant characteristics; InfoObject Maintenance (RSD1) Designed & administered entire CUA landscape monitoring & improving performance.
  • Maintain SAP CUA 4.7 Connect new SAP clients to CUA boxes on an as needed basis by using RFC connections.
  • Integrated Active directory Identities with SAP and CUA Used CATT Scripts for complex User Administration activities like Employee termination.
  • Coordinated with BASIS team on CUA issues such as delinking clients and setting them up during refreshes.
  • Worked with CUA -User Maintenance and Adding/Deletion of the child systems and extensively with tcodes SCUL/SCUG/SCUM/SCUA.

Show More

4 CUA Jobs

No jobs at selected location

14. ST

demand arrow
high Demand
Here's how ST is used in SAP Security Consultant jobs:
  • Designed and implemented Security strategies, methods and procedures in compliance with corporate policy.
  • Analyzed business processes and assisted with security related design decisions.
  • Project: Roll Out/Implementation/Development/Testing/Go live/Post Go live/Hyper care.
  • Project: Re-Design/Development/Testing/Go live/Post Go live/Hyper care.
  • Involved in analyzing the requests coming to the Security mailbox, validating the users, and initializing the change management tickets.
  • Play a key role in the change management and security testing processes ensuring that all security changes are tested and valid.
  • General Electric is one of the world's largest American multinational conglomerate corporation incorporated in New York.
  • Developed roles and profiles for developers, basis, Security, regional user administrators and other teams.
  • Mitigate the user id against a particular risk to reduce or minimize the SOD violations.
  • Make sure all the data is accurate in SAP in term of system set up.
  • Worked extensively on Security Weaver for customizing and adding custom transactions to the SOD matrix.
  • Used Transport Management System (STMS) for Transporting the generated roles and profiles.
  • Performed reconciliation of User Master record & roles using PFUD and SUPC.
  • Administer user accounts within SAP, Portal and Active Directory.
  • Conduct ongoing license audits of users within the system.
  • Tested the activity roles to ensure correct results.
  • Perform Routine SAP System checks and logs.
  • Perform UNIT testing on created roles.
  • Worked on giving custom BI authorizations S_RFC, S_RS_AUTH, S_RS_COMP, S_RS_COMP1.
  • Project: Walmart Stores, Inc.

Show More

15. Business Requirements

demand arrow
average Demand
Here's how Business Requirements is used in SAP Security Consultant jobs:
  • Collaborate with team and business representatives to ensure security settings meet business requirements and align with defined controls and standards.
  • Maintained/updated custom USOBT and USOBX table as per business requirements by activating and deactivating authorization checks.
  • Gathered business requirements by facilitating sessions with process/module owners.
  • Use trace and analysis tools to resolve daily error messages as well as research new possibilities to meet business requirements.
  • Documented business requirements, worked on business design, and worked with ABAP team in implementing SAP customized logic.
  • Designed security roles on BW, GTC, APO, CRM and HR areas according to business requirements.
  • Schedule & troubleshooting of various background jobs (synchronous, daily and weekly) as per business requirements.
  • Work with functional teams to understand the business requirements to build roles based on those requirements.
  • Create or Modify Composite roles, Simple roles and Derived roles according to the business requirements.
  • Created new roles as well as maintained old roles & profiles as per business requirements.
  • Configured various BRF+ rule kinds and rule types based on the custom business requirements.
  • Created and maintained security access profiles and roles to meet business requirements.
  • Managed and maintained SAP users and/or roles to support of business requirements.
  • Created Composite, Master - Derived roles to meet the business requirements.
  • Created and modified CRM & GTS roles as per business requirements.
  • Design and deploy custom GRC reporting based on business requirements.
  • Redesigned existing AE workflows to accommodate new business requirements and approval process.
  • Support implementation and production sustainment of SAP technical solution, with a clear emphasis on business requirements.
  • Fire Fighter assignments as per the business requirements Generation of FF daily log audit reports.
  • Designed SAP security using best practices and standards after gathering business requirements from end users.

Show More

1 Business Requirements Jobs

No jobs at selected location

16. CRM

demand arrow
average Demand
Here's how CRM is used in SAP Security Consultant jobs:
  • Defined Business roles and implemented position based security assigning users to configured positions using PPOMA_CRM.
  • Populated external services based on the end-user access requirements for CRM functionality from Mobile devices.
  • Designed security roles for CRM Marketing implementation.
  • Set up CRM security for Marketing, Business Partner Security, E-commerce (Internet Sales) and Product Security.
  • Led the security team contractors on the CRM 7.0 project and received status updates daily from the team.
  • Created business roles and maintained the navigation profiles based on the requirement in the SAP CRM environment.
  • Support non production user community in the ECC parallel landscape and newly created GTS and CRM landscapes.
  • Created roles for CRM; created role-based test scripts to ensure individual roles work independently.
  • Experienced in troubleshooting and support of the CRM systems for security and authorization issues.
  • Created CRM Display roles for business users to familiarize themselves with CRM HANA system.
  • Recognized by CIO for a successful Go Live of the CRM 7.0 project.
  • Create PGCG Roles for CRM and mapping with Business Roles.
  • Used standard report CRMD_UI_ROLE_PREPARE to start the initial role build.
  • Created and maintained Business Partners in the CRM system.
  • Involved in gathering reporting requirements from CRM Web Interface.
  • Maintain Users and authorizations in CRM system.
  • Worked on ECC, CRM and BI Security.
  • Provided Authorizations for Middleware Developer, Administrator, Consultants in CRM.
  • SAP CRM Service Implementation * Designed/Created new single and composite roles based on job function and job title for Europe.
  • Designed roles for CRM enterprise sales and services by restricting users on Sales, Presales and Billing transactions.

Show More

1 CRM Jobs

No jobs at selected location

17. Profile Generator

demand arrow
average Demand
Here's how Profile Generator is used in SAP Security Consultant jobs:
  • Implemented security using Structural authorization, evaluation path and profile generator.
  • Set up Profile Generator, activity groups/authorizations/profiles.
  • Configured Profile Generator and performed transports and mass transports of roles and used CATT scripts for mass users and assigning roles.
  • Work with profile generator (PFCG) in creating single, composite and derived roles as per US Army's standards.
  • Single roles, profiles and authorization objects using profile generator are created for requirements related to Company code and Reporting.
  • Worked with process team leads to determine roles and responsibilities for multiple functional areas, using profile generator.
  • Created roles by using Profile Generator and assigned them to users and organizational units (PFCG).
  • Work with profile generator (PFCG) in creating roles, profiles, composite roles & derived.
  • Upgraded over 200 profiles using the Profile Generator after running the SAP upgrade program (SU25).
  • Used Profile Generator to create, modify and customize User Authorizations, and Authorization Profiles in ECC.
  • Designed, created and modified single composite, derived roles, and profiles with Profile Generator.
  • Configured Profile Generator and transported settings to all clients, setup security for the developers.
  • Updated old authorizations and created new using Profile Generator, and organization structure in EBP.
  • Upgraded and redesigned 70 Roles using the Profile Generator in under two weeks.
  • Upgraded and redesigned over 720 Roles using the Profile Generator (PFCG).
  • Set up the Profile Generator to create authorization profiles (PFCG).
  • Used profile generator in Composite roles and Single roles build.
  • Created roles for various modules such as SD, MM, FI-CO and PP using Profile Generator (PFCG).
  • Design, implementation, creation and modification of Security roles using Profile Generator (PFCG) Role Remediation.
  • Trained new security team members Proficient with Profile Generator Lead SAP Security production maintenance for over 10,000 users.

Show More

1 Profile Generator Jobs

No jobs at selected location

18. Su24

demand arrow
average Demand
Here's how Su24 is used in SAP Security Consultant jobs:
  • Worked on SAP check indicator defaults and field values using transactions SU24 and maintained user authorizations using PFUD.
  • Used SU24 to find out the Authorization objects related to the transaction code.
  • Redesigned the BW landscape Roles for improved maintainability and corrected the SU24 settings.
  • Worked with SU24 for identifying and maintaining required objects using transaction code.
  • Experience managing and maintaining USOBT_C and USOBX_C tables by using SU24 /SU25.
  • Worked on SU24 to add or remove check maintain on authorization objects.
  • Identified and fixed the manual changes in SU24 for specific transactions.
  • Completed SU24 changes for 58 transactions in GTS system.
  • Designed and implemented enterprise security using PFCG and SU24.
  • Maintained SU24 and reduced the scope of Authorization checks.
  • Updated SU24 for authorization default values as needed.
  • Traced custom transactions and added authorization via SU24.
  • Maintained Assignment of Authorization Objects (SU24).
  • Enabled / disabled authorization objects using SU24.
  • Maintain check indicators using SU24, SU25, SE93, and SE97.
  • Maintained USOBT_C and USOBX_C (Customer tables)by using SU24.
  • Specified the Auth Objects that are to be Maintained and modified for Various Custom Transactions using SU24 in R/3 Environment.
  • Used Transport Management for roles, custom transactions-objects& SU24 settings.
  • Updated SU24 for Tcode authorization defaults.
  • Maintain transactions code and authorization object table thru SU24 (USOBX_C and USOBT_C).

Show More

19. Suim

demand arrow
average Demand
Here's how Suim is used in SAP Security Consultant jobs:
  • Generated security reports using the transaction SUIM for user access, roles, profiles and authorizations, lock/unlock user in client.
  • Administered training to controls team regarding SAP security process and security tools including SUIM, SU24, and running GRC reports.
  • Generated various reports using SUIM to provide customers with detailed list of users in their controls.
  • Used report tree tool SUIM to analyze the users, transactions, roles and profiles.
  • Investigated and troubleshooted complex security authorization issues using transaction codes ST01, SU53 and SUIM.
  • Assess analyzing and fixing missing authorizations related problems using SU53, ST01 and SUIM.
  • Performed the SOD Remediation without an SOD tool using SAP Supplied tools in SUIM.
  • Pulled daily, weekly, and monthly reports using various tables and SUIM.
  • Analyze user related information including roles and profiles, by utilizing transaction SUIM.
  • Generate reports through the use of SUIM and security tables.
  • Executed SM53 and SUIM to diagnose end user problems.
  • Used transactions such as SUIM, SU53to troubleshoot problems.
  • Worked on generating reports using SUIM.
  • Gained extensive experience on SUIM.
  • Used SUIM and security related tables such as AGR_TCODES, AGR_USERS, AGR_1251, AGR_1250, AGR_DEFINE etc to generate Reports.
  • Involved in the Audit of the R/3 system using SUIM, Audit Logs etc.
  • Instructed members of the client's internal audit department on how to use SUIM SAP Environment: SAP R/3 4.7
  • Analyze and troubleshoot security issues using SU53 , ST01 and SUIM Resolved issues using SU53, ST01 and Debug mode.
  • Analyze and troubleshoot security issues using SU53 , ST01 and SUIM Supported other teams by providing requested information.
  • Worked on Virsa Firefighter tool User Trace using ST01 and analysis Troubleshoot security/authorization related problems using SU53, ST01 and SUIM.

Show More

20. Security Roles

demand arrow
average Demand
Here's how Security Roles is used in SAP Security Consultant jobs:
  • Completed all audit remediation requirements which included redesigning security roles and processes as needed.
  • Provided help in developing and maintaining security roles as per business requirements.
  • Performed extensive testing of the Security roles and authorizations.
  • Facilitated test sessions for new/updated Security roles.
  • Completed project build of new SAP security roles for business unit sold to third party but being maintained on NuStar landscape.
  • Designed and developed BW security roles assisting functional teams in creation of info objects, info cubes, queries etc.
  • Supported the unit and integration testing of the CRM 7 security roles and the ECC 6.0 security roles.
  • Worked on SOD & SOX issues and cleaning up security roles to make all production boxes SOX complaint.
  • Set up security roles and user accounts for over 1000 End Users for primary Go Live.
  • Created and maintained security roles for development landscape using the SAP profile generator.
  • Used SECATT and created & maintained security roles/objects in ECC and business warehouse.
  • Worked with Functional Area leads to validate accuracy of new/change security roles.
  • Set up security roles and user accounts for over 10000 End Users.
  • Designed and Tested ERP security roles in preparation for production.
  • Recommended of security roles updates and transport process.
  • SAP 4.6c - Security Roles and profiles Administration.
  • Associated new/changed security roles to test accounts.
  • Updated Security Roles as approved and required.
  • Designed and Developed Security Roles for FI, CO, MM, SD, PS modules.
  • Documented Security Architecture for Blueprint Phase Designed and Tested ERP security roles in preparation for production go live.

Show More

25 Security Roles Jobs

No jobs at selected location

21. IDS

demand arrow
average Demand
Here's how IDS is used in SAP Security Consultant jobs:
  • Defined Firefighter IDs and required escalated access.
  • Developed Naming convention for Test User ids, Batch User id and procedures for handling OSS User requests.
  • Created Structural Authorization Profiles and assign the profiles to positions and User IDs as per the organizational structure.
  • Designed the Job Aids for the Controls and Executed the SOX Controls for Yearly, Quarterly and Monthly.
  • Experience with the EAM (Emergency Access Management) module for creating/setting up and assigning Firefighter ids.
  • Managed access of 200K User IDs in IBM's largest and most complex SAP internal full-cycle implementation.
  • Assigned user roles to user ids, setup security for the developers according to business requirements.
  • Performed security administration by setting up new user IDs and changing existing user ID security access.
  • Enabled GRC self-service by migrating legacy users to 8-character IDs, further minimizing security support requests.
  • Identified missing authorizations via trace to use system ids to run custom program as background job.
  • Identified all the valid risks and created risk IDs within GRC pertaining to the company.
  • Lock user ids upon the direction of management or in certain other established situations.
  • Created test ids and test roles for the data team members for testing.
  • Opened OSS connections and created OSS ids for functional and technical users.
  • Create, setup and Configure Firefighter ids for the Production systems.
  • Utilized CATT Scripts to establish 12k+ user IDs on SAP systems.
  • Requested and maintained OSS ids for project team members.
  • Create mitigation approvers and monitors and created mitigating ids.
  • Create and allocate Function based FFIDs and reason codes along with assignment of Owners and Controllers.
  • Created and maintained User IDs Wrote and maintenance production roles as approved by data owners.

Show More

22. MM

demand arrow
average Demand
Here's how MM is used in SAP Security Consultant jobs:
  • Identified Segregation of Duty conflicts and propose recommendations that lead to implementation of mitigating controls and elimination of risks.
  • Communicated internally/externally and processed access and security functions determining profile requirements for 1000+ SAP users.
  • Implemented and maintained secure network communication between different SAP components.
  • Tested and implemented security recommendations given by SAP audit team.
  • Provided architecture recommendations and client/instance strategies for system/landscape optimization.
  • Conceptualized and executed training for the finance user community, reducing the number of failed security requests by 20%.
  • Have a good planning experience, working with the compliance committee for implementing business mitigating controls.
  • Performed all day-to-day SAP security activities for a user community exceeding 6K in a Global environment.
  • Recommended a matrix with role definitions that relate to the company functional roles and responsibilities.
  • Used JCORFC provider service & established communication with sap R3 systems and PI systems.
  • Worked with business, functional leads and Basis to identify critical & immediate roles.
  • Utilized technical programming skills to handle system updates, debugging, and database encryption.
  • Handle security development for various Modules FI, MM, HR, BI etc.
  • Created roles based on BW/BI reporting environment like common role, folder role.
  • Communicated with Business Process Owner's to obtain approvals for security changes.
  • Recommended and enforced the usage of Authority Check statement for custom programs.
  • Recommended changes to GRC rule set and standard SAP settings.
  • Register developer keys for all new ABAP programmers.
  • Recommend and Implement SAP Security Best practices.
  • SAP BW/BI Security Summary Set up security by INFOAREA, INFOCUBE, ODS, PSA, INFOOBJECT, QUERY and WORKBOOKS.

Show More

23. SRM

demand arrow
average Demand
Here's how SRM is used in SAP Security Consultant jobs:
  • Created and maintained users in SU01 in sync with the Organization structure in SRM 7.0.
  • Design and development of SRM roles, Portal roles, HCM roles including structural authorizations.
  • Created roles and restricted for respective purchase organizations in SRM 7.0.
  • Worked on SRM - EBP Authorizations with attribute management.
  • Supported beginning phase of PLM, SRM project.
  • Designed security solution for SRM, GRC.
  • Work with GRC10, ECC6, SRM, CRM, BPC, HANA, BOBJ, IDM 7.3 and BW
  • SAP Security Administrator Environment: ECC 4.7, BW 3.5, BI 7.0, Enterprise Portal 4.0, SRM.
  • Designed security roles in R3 (FI, PTP, OTC modules), SRM and XI systems.
  • Experience with ECC6, SRM, PI security ABAP and UME (J2EE) roles.
  • Lead SAP SRM Consultant for the SRM upgrade project from SRM 4.0 to SRM 7.0.
  • Supported beginning phase of PI, NWGW, XI, SRM, GRC project.
  • Worked on ECC, HR, SRM and portal Security.
  • Created roles in SAP Portal 7.0 for SRM Users.
  • SAP SRM Upgrade: SRM 4.0 to SRM 7.0.
  • Created roles in BI and SRM systems.
  • Configured principal propagation between SRM 7.0, PI 7.1, R/3 systems Administrated SLD instances for both Non-PROD and PROD systems.
  • Implemented security for major SAP modules and components (ECC 6.0, SRM 7.0.
  • Involved in Projects, part of implementation& up gradation (CRM 7.0 & SRM 5.0) projects.
  • Upgraded the SRM/EBP, APO, xMII, and BW Portal systems.

Show More

24. Composite Roles

demand arrow
average Demand
Here's how Composite Roles is used in SAP Security Consultant jobs:
  • Designed/Created new single and composite roles based on job function and job title for new company that was acquired by Philips.
  • Created new users and maintained users on day to-day basis (Single roles, Composite roles and Derived roles).
  • Mapped composite roles to the end user positions and derived roles for various business units in the company.
  • Designed/Created new single and composite roles based on job function and job title for the 36 new entities.
  • Used Profile Generator for creating, modifying roles, composite roles, global roles & derived roles.
  • Designed and created new menu roles, authorization roles, and composite roles based on new design.
  • Create and modify Single roles, Composite roles and Derived roles by using Profile Generator PFCG.
  • Used Profile Generator for creation, modifying roles, composite roles, and derived roles.
  • Worked in a role based authorization strategy based on single, derived and composite roles.
  • Created Template, Derived roles, Single and Composite roles as per the requirement.
  • Worked with VIRSA systems VRAT tool in identifying conflicts single roles and composite roles.
  • Established new naming convention for BI single roles, composite roles and analysis authorizations.
  • Create and modify Single roles, Composite roles and Derived roles.
  • Created Single, Derived and Composite Roles in R/3.
  • Created job based composite roles based on user requirements.
  • Created/Assigned new composite roles to the 300 new users.
  • Worked with single, derived and composite roles.
  • Implemented Master, Derived and Composite Roles.
  • Created Composite roles based upon request.
  • Created Base Roles and Company Specific Roles based upon request Created Composite roles based upon request.

Show More

25. Transaction Codes

demand arrow
average Demand
Here's how Transaction Codes is used in SAP Security Consultant jobs:
  • Restricted open authorizations to sensitive Transaction codes.
  • Changed existing roles, removed and added Transaction Codes and Authorization to resolve critical access and SOD conflicts in the system.
  • Worked on SAP Check Indicator Defaults and Field values using transaction SU24 and maintained check indicators for Transaction codes during testing.
  • Used Derived activity groups to create new activity groups and to transfer transaction codes from old ones to new ones.
  • Identify roles for use in the EEC6 environment with new transaction codes and make ready for EEC6 specification.
  • Use of transaction codes SU02 and SU03 for the maintenance of profiles and also use of PFCG.
  • Updated the security role after the SU25 run to incorporate new authorization objects and transaction codes.
  • Create new transaction codes based on SM30 and SE16 tables to secure tables properly.
  • Check Roles for Missing Objects, Maintained the display changed transaction codes using SU25.
  • Implemented Line Authorizations on transaction codes like OB52 to restrict access to specific records.
  • Worked on SU24 to maintain Check Indicators for the Transaction Codes.
  • Identified Transaction Codes which will be replacing the existing Transaction Codes.
  • Used SU24 to maintain authorization checks for various transaction codes.
  • Maintain SU24 changes to link authorization objects to transaction codes.
  • Analyzed all custom programs and transaction codes for authority check.
  • Performed audit monitoring activities using SM19, SM20 transaction codes.
  • Assign authorization objects to transaction codes as per requirement.
  • Secured Tables and Programs by creating custom Transaction codes.
  • Maintained SU24 values for standard and custom transaction codes.
  • Updated custom transaction codes using SU24.

Show More

26. User Access

demand arrow
average Demand
Here's how User Access is used in SAP Security Consultant jobs:
  • Provided SAP security supports to daily user access management services and production support across multiple sap environments.
  • Created profiles to effectively restrict user access to specific business areas.
  • SAP User Access Management and Auditing for Sarbanes-Oxley Compliance requirements and remediation of security roles for SOD conflicts.
  • Served as primary contact for SAP testing related to user access, elevated access, and change control.
  • Streamlined the user access request process by clearly defining the appropriate access for each functional team.
  • Assisted in the roll out of VIRSA CCXT user access provisional and compliance collaborator tool.
  • Provide technical information on the user access to role owners for doing the review.
  • Developed and analyzed periodic Audit steps & quarterly User Access Review for the same.
  • Based on the Feedback from the Audit Team User Access to be modified accordingly.
  • Experience creating Authorization Objects and restricting user access using standard objects in SAP.
  • Monitor and protect user access, transactions, tables, and programs.
  • Administer and develops user access rights on computer systems running SAP software.
  • Mapped Business roles to PFCG roles in PP01 to establish user access.
  • Enabled regulated super user access control via GRC's firefighter.
  • Conducted User Access Reviews for semiannual audit.
  • Worked on User Access Reviews.
  • Run the UAR workflow for triggering emails to the role owners for User Access review for all systems.
  • Run the UAR workflow for the User Access Review request generation for all systems.
  • Help ensure SOX compliance with respect to user access permissions (i.e.
  • SoD Analysis/Critical access review Utilize Virsa's Compliance Calibrator 4.0 Tool to validate end user access with company standards.

Show More

1 User Access Jobs

No jobs at selected location

27. Risk Analysis

demand arrow
average Demand
Here's how Risk Analysis is used in SAP Security Consultant jobs:
  • Uploaded SAP B1 authorization listings into ControlPanel Risk analyzer to execute risk analysis.
  • Generated Risk analysis and Remediation Reports on Critical/ Conflict Action Level.
  • Trained the business teams in creating Functions Risks, Mitigation controls etc and running risk analysis in VIRSA 5.1.
  • Performed a detailed risk analysis and SOD check of all business processes and identified areas in need of controls.
  • Worked with compliance calibrator (Access Risk Analysis) while creating new users and modifying users as well.
  • Worked extensively on GRC ARM to run extensive Risk Analysis to identify risks associated with users/roles.
  • Performed Role and User Analysis, Risk Analysis and Mitigating risks and roles as required.
  • Performed the Risk analysis at user level, role level and org level using RAR.
  • Schedule the various background jobs to perform the risk analysis based on business unit.
  • Worked extensively with SAP GRC Risk Analysis and Remediation tool (Compliance Calibrator).
  • Used VIRSA Tool to check SOD risk analysis for remediation of the roles.
  • Assisted in explanation to the SAP B1 team of the SOD/SA risk analysis.
  • Automated the Risk Analysis and Remediation process using the SAP GRC RAR tool.
  • Used Access Enforcer for Risk Analysis and provisioning of the roles.
  • Used VIRSA Compliance Calibrator Tool for SOD risk analysis and remediation.
  • Performed Risk analysis for role level and user level.
  • Prepare the operational guides for Access Risk Analysis.
  • Managed custom transaction codes in Functions in Ruleset for Access Risk Analysis team and generated Risks for the same.
  • Led effort to obtain Securinfo and SAP Virsa products for security management and risk analysis of Separation of Duties issues.
  • CUP - CUP configuration, Workflow configurations, Administration of requests RAR- Risk analysis and configuration.

Show More

28. Troubleshoot

demand arrow
average Demand
Here's how Troubleshoot is used in SAP Security Consultant jobs:
  • Experience in troubleshooting missing access and assigning Analysis authorization directly to user or through roles.
  • Provided security support for all advanced security troubleshooting and solutions.
  • Transport Administration - Troubleshooting and Monitoring issues related to Transports.
  • Spool Administration including configuring printers and troubleshooting spool request.
  • Perform traces to troubleshoot authorizations.
  • Performed Database Administration, Table space and Data file administration, monitoring trace files and log files for troubleshooting.
  • Designed and configured roles, testing, troubleshoot and implement security solutions for the regular SAP security system.
  • Provide end user support such as troubleshooting and fixing authorization errors using SU53 reports and ST01 traces.
  • Monitor SAP GRC systems and troubleshoot the issues and report to the management on a timely basis.
  • Provide daily EP security production support such as ID requests, access requirements and troubleshooting problems.
  • Worked on SAP Security and Authorizations, User Tracing, and Troubleshooting.
  • Worked on Customized Security Programs and tables for troubleshooting the user issues.
  • Performed troubleshoot of Authorization Errors using Transaction Code SU53 and ST01.
  • Research and troubleshoot SAP issues.
  • Monitored batch jobs and troubleshooting.
  • Performed varied aspects of Security Authorizations, User Traceability and Troubleshooting.
  • Audit logging of changes for compliance Troubleshooting the user and role administration issues in HANA.
  • Resolved issues (tickets) for clients Troubleshoot Incidents L2 and L3.
  • Worked on CRM Business roles creation, assignment and troubleshooting.
  • Validated & troubleshoot all workflow related issues.

Show More

29. Production System

demand arrow
average Demand
Here's how Production System is used in SAP Security Consultant jobs:
  • Modified already live production system roles to remove indirect procurement Org values and authorizations.
  • Created Transports in Development and imported into Quality and Production Systems.
  • Added the reports to area menus and assigned the area menu to activity groups and transported to Testing and Production system.
  • Supported Internal and External security audits in the production system every 3 month Environment: SAP 4.6c, SAP ECC 5.0.
  • Implemented an automated program to capture the RFC calls made by the users in Production systems.
  • Worked with SoX manager to identify existing SoD in production system and remove or mitigate them.
  • Created roles for security administrator so they cannot change roles in Quality and production systems.
  • Customized the rule set and made it as default rule set for the production systems.
  • Completed redesign of HR security in Development, Quality, Test and Production systems,.
  • Used Profile Generator (PFCG) and coordinated transports from development to production systems.
  • Used scripting and In house tool to create mass users in non-production systems.
  • Profile Maintenance: Maintained all the instance profiles in development and Production systems.
  • Supported Internal and External security audits in the production system every month.
  • Created lots of user ID's in QA and Production systems.
  • Mass transported roles from Development to Production System (PFCG).
  • Use of CUA to administer users in non-production systems.
  • Work on Role Mapping via JRM(Job Role Mapping) to users in Test environment and In production systems.
  • Created User Id's for the technical and functional consultants and provided the required access in non-production and production systems.
  • Handled GRC for analysing role severity before transporting role to production system.
  • Support Dev, Staging and Production systems in R/34.7 environment.

Show More

30. FI

demand arrow
low Demand
Here's how FI is used in SAP Security Consultant jobs:
  • Created users and assigned appropriate authorizations /profiles to them.
  • Administered Users, Authorization Data and Authorization Profiles.
  • Implemented and configured security weaver 2.4.
  • Created and generated roles, profiles, authorization objects, object classes and assigned to user master record.
  • Create new security profiles, monitor configuration changes, and ensure users have proper authorization to perform tasks.
  • Used SU24 to maintain Check Indicator Defaults and Field values, reduced the scope of Authorization checks.
  • Restricted access to SE16/SM30 by creating table specific custom transaction codes to the table using SE93.
  • Work with Central Audit team and Global Finance to create global rule set for GRC.
  • Worked closely with the Business Process teams and resolved the deficiencies in the production system.
  • Maintained and created roles (Master and Composite) using Profile Generator (PFCG).
  • Mitigate or Remediation post discussion and confirmation with Role Owners and Functional Team members.
  • Created new Teams, Member access profiles and Task profiles for SAP BPC.
  • Provide FFID access to End Users in need of emergency access.
  • Assign FireFighter roles to users (Role bases FF reporting).
  • Transported Profiles to Test environment and carried out Level-Zero testing.
  • Map FireFighter ID's to owners and fire fighters.
  • Provide support to Finance Department for costing purposes.
  • Worked with the SAP Consultants in defining the roles for CRM 7.0.
  • Included the custom critical transactions in the rule set and modified the risk id's based on requirement.
  • SAP HANA Security, ECC, GRC, BW/BI, BOBJ, Cognos, Analysis for Office

Show More

31. Virsa

demand arrow
low Demand
Here's how Virsa is used in SAP Security Consultant jobs:
  • Worked in Compliance Calibrator (VIRSA) tool for SOD Analysis @ User level, Role level, Authorization object level.
  • Utilized New VIRSA VRAT 4.0 release to build special rule matrix to increase the efficiency of producing quarterly SOX compliance reports.
  • Used VIRSA Tool to check SOD at role/activity group level as well as User level using simulation tool.
  • Used GRC 5.3 for identifying and resolving critical SOD conflicts before assigning roles using transaction (/N/VIRSA/ZVRAT).
  • Simulated User based, Role based background jobs in VIRSA Risk Assessment Tool to Identify Any SOD issues.
  • Established JAVA Connectors (JCO) in VIRSA 5.1 to connect to multiple systems.
  • Well versed with VIRSA Access Enforcer, Compliance Calibrator, Role Expert and Firefighter.
  • Involved in the Installation and configuration of VIRSA CC & FF.
  • Provided training on VIRSA VRAT compliance tool to IT support staff.
  • Assign Firefighters, Owners and Controllers using transaction code /N/VIRSA/VFAT.
  • Review Virsa FireFighter logs for appropriateness of transactions used.
  • Used Virsa Compliance Calibrator (VRAT) tool extensively for handling SOD conflicts for each user.
  • Directed the install of VIRSA software and work extensively on loading the RULES in the software.
  • Used Virsa Compliance Calibrator to make sure that all new users were SOD/GRC compliant.
  • Reviewed VIRSA reports to verify only appropriate levels of access were allowed to users.
  • SAP Partner Software used: Virsa Systems Software (now called GRC).
  • Handled Virsa, SOD and Fire Fighter IDs and requests.
  • Provided VIRSA VRAT tool trainings.
  • Identified and analyzed the critical transactions that are involved for resolving the Sarbanes Oxley act 404 using VIRSA.
  • Performed Sarbanes Oxley - SAP Security Audit and documentation of Significant Processes and controls using Virsa tool.

Show More

32. Access Control

demand arrow
low Demand
Here's how Access Control is used in SAP Security Consultant jobs:
  • Supported implementation of Access Control, Super user Privilege Management, Risk Analysis and Remediation.
  • Created over 100 customized end user roles and menus, plus hundreds of mini-roles to allow for low-level modular access control.
  • Sound knowledge in business process control, for instance, Segregation of Duties (SOD) with Access control.
  • Established access control in the system-Worked with business owners to streamline sensitive access assigned to the user.
  • Performed Segregation of Duties in access controls within the SAP systems environment and related applications.
  • Design, develop, test the GRC Access Controls security roles using Role Maintenance tool.
  • Enabled and maintained PFCG roles and authorizations specific to GRC Access Controls 10.0 components.
  • Designed the Standard operating procedures for new roles, GRC 5.3 access controls.
  • Perform GRC Analysis to manage access control issues and Segregation of Duties concerns.
  • Create and execute validation procedures for SAP Security and SAP GRC Access Controls
  • Maintained SAP GRC Access Control v.5.3 master data and update configuration changes.
  • Involved in the installation and Configuration SAP GRC Access Control 10.0.
  • Implemented and Supported SAP GRC 10.1 Access Control.
  • Configure and implement GRC Access Control Suite 10.0.
  • Worked with GRC Access Controls all modules.
  • Implemented SAP GRC Access Controls (v. 5.3) as technical lead.
  • Redesigned GRC 5.3 Access controls SPM, RAR and CUP.
  • Involved in the installation and Configuration of SAP GRC Access Control 10.0.Creating and maintaining the user IDs in CUA.
  • Single, Derived and Composite) Carried Full life cycle implementation of GRC 10.0 Access Controls.
  • Configure the access control owners, role owners in assignment approver, role concept approver.

Show More

21 Access Control Jobs

No jobs at selected location

33. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in SAP Security Consultant jobs:
  • Conducted comprehensive analysis of existing Security environment and Identified Security issues, recommended and implemented solutions to problems.
  • Provided timely support and solutions to complicated security issues in all business areas.
  • Identified Security issues, recommended and implemented solutions to problems.
  • Provided technical support in resolving Security issues.
  • Assisted the testing group users in their security issues, at various stages of the project.
  • Advised/trained the BNSF SAP user community on the best ways to resolve SAP Security issues.
  • Supported testing phase for two new business units and resolved all reported security issues.
  • Researched and resolved hundreds of SAP Security issues for the upgrade to ECC 6.0.
  • Communicated with process teams to identify security issues, complexity, and priority.
  • Worked under SOD and assisted all team members in their security issues.
  • Continued to improve my custom Audit Tools to help with Security issues.
  • SAP Security support activities and trouble shooting of Security Issues.
  • Provided the inputs to the team in emergency security issues.
  • Worked on Portal (ESS/MSS) related Security issues.
  • Involved in post upgrade testing for security issues.
  • Analyze and solve security issues in SAP.
  • Helped with day-to-day support on Security issues.
  • Applied OSS notes regarding Security issues and created and Updated Oss Messages to SAP, Created Developer Keys for Users.
  • Support: Responsible for day to day technical support and resolution of security issues, troubleshooting R/3 security problems.
  • Collaborated with BPOs, SAP configurators, and ABAP developers on resolving security issues.

Show More

34. Authorization Issues

demand arrow
low Demand
Here's how Authorization Issues is used in SAP Security Consultant jobs:
  • Worked with default characteristics in BI Analysis Authorization, planning authorizations, troubleshooting authorization issues.
  • Worked tickets for day-to-day authorization issues.
  • Traced Authorization issues in Analysis Authorizations.
  • Traced and researched authorization issues.
  • Worked with Reporting Users, Power Users and Administration Users in Identifying And Resolving Authorization Issues in BI System.
  • Worked on the authorization issues of end users, creating roles and assigning roles to the users.
  • Worked closely with Testing Teams to test, troubleshoot, correct authorization issues for the Roles.
  • Provided level 2 & 3 support in troubleshooting and resolving security and authorization issues.
  • Fixed the Structural Authorization issues for the HR Users in PA & OM Environment.
  • Worked on issues related to Missing Authorization issues for users, Moving Transports.
  • Perform system trace (ST01) for authorization issues to resolve authorization issues.
  • Provided first level support for Authorization issues from Disney's Help Desk.
  • Trouble shooting Authorization issues on Queries Reported by the End User.
  • Handled authorization issues and access related issues based upon request.
  • Resolved authorization issues by analyzing the SU53 screen shots.
  • Solved the portal related authorization issues.
  • Researched authorization issues using SUIM, SU53, RSSM, ST01, SE16, SM30, etc.
  • Resolved tickets on authorization issues, logon failures, and password reset using SU01 and SU53.
  • Resolved day-to-day user authorization issues assigned from Helpdesk -Lotus Notes dB.
  • Supported day to day authorization issues on SAP Netweaver 2004s platform.

Show More

35. SCM

demand arrow
low Demand
Here's how SCM is used in SAP Security Consultant jobs:
  • Created Parent/Child role for Mexico/Bermuda from the Global role template for ECC, SCM, GTS in the initial implementation phase.
  • Worked on SCM APO security, promoted authorization fields like planning book to the organizational levels.
  • Implemented Cost Center Security in FBM and PI Sheet Authorizations in SCM.
  • Verify and validate master data entry between SAP and SCM system.
  • Implemented security blueprints for ECC 6.0, SEM, SCM and BW 7.3 through GRC 10.0 with respect to SOX compliance.
  • Experienced in trouble shooting issues in R/3, ECC, BI, HR, CRM, SCM, SRM systems.
  • SAP environment Production support ECC 6.0 -Structural HR, BO, BW, BI.7, CRM, IDM and SCM.
  • Supported production issues on ECC, BI & Portal, GTS, SCM modules which were the part of RELEASE-1.
  • Provision accounts in SAP modules APO/SCM, CRM, ECC, GTS, SRM, BI, and Solution Manager.
  • Worked on Job role user switch for more than 400 users for BI, SCM, ECC all gold clients.
  • Performed daily SAP Security administration tasks for SAP CRM, CUA, ECC, GTS, HCM and SCM systems.
  • Analyze and rectify SAP security issues in R/3, BW, CRM, SCM, XI and Solution Manager.
  • Created User ID's in ERP 6.0, SAP R/3, BW, HR, SEM and SCM.
  • Experience in SAP Security in ECC, HCM (HR), BI, SRM and SCM.
  • Created roles in PM, GTS, SRM, MM SCM and assigned to users.
  • SAP security administrator on platforms SAP ECC 6.0, BW 7.0, SCM 5.0.
  • Executed end to end upgrade of APO to SCM 5.0.
  • Worked on CRM, SCM.
  • Key Contributions Designed Security for FI, SCM, HR and BW modules.
  • SAP Security Analyst for solution including ECC, SCM, HANA, BO, GTS & Hybris.

Show More

36. Su01

demand arrow
low Demand
Here's how Su01 is used in SAP Security Consultant jobs:
  • Performed security analysis, security administration and role creation and testing using SU01.
  • Maintained and controlled the access of the users in all environments using CUA environment and SUIM, SU01, SU10 t-codes.
  • Initiated the creation, making user copies, Lock/Unlock and password resets by utilizing SU01, SU10, and SU01C.
  • Experience in User maintenance using transaction SU01, User creation, deletion, lock, unlock, password management.
  • Created roles with PFCG and assigned permissions with various security transactions such as SU01 and SU10.
  • Assigned business roles to the users through direct (SU01 parameters) and indirect assignment method.
  • SAP SU01 functions; able to create & administer accounts (including role assignments).
  • Maintained user parameter for CRM users in SU01 to access BSP in IC WebClient UI.
  • Created users using SU01 and maintained user master and established security policies and procedures.
  • Perform user administration (Addition and removal of roles) using SU01, SU10.
  • Maintained and created all users using SU01, SU10 and SUIM.
  • Defined and managed user profiles for 500+ employees (SU01).
  • Used BI Security transaction RSU01 to assign authorizations to users.
  • Direct assignment of roles to users using PFCG and SU01.
  • Used SU01 and SUIM for role assessment and management.
  • Created and modified new user accounts using SU01.
  • Extended, reset, created, & deleted new users in ECC (SU01).
  • Used day-to-day transactions SU01, SU24, SECATT, SUIM, SE16 and PFCG.
  • Reviewed and established CUA settings on field level for SU01 Implement and establish standards for custom authorization objects
  • Worked with SU01, PFCG, SU24, ST01, SU53, SU10, SE10, STMS_IMPORTetc.

Show More

37. Go-Live

demand arrow
low Demand
Here's how Go-Live is used in SAP Security Consultant jobs:
  • Involved in post Go-live production support and created production support documentation.
  • Developed procedures for resolving access requests for Integration testing, Pilot User Testing, Go-Live and post Go-Live PRD access.
  • Provided support during the Go-live and after Go-live of project and analyzed & resolved the issues with appropriate approvals.
  • Involved in Complete full life cycle implementation of Redesigning the Security from requirements gathering to after Go-live support.
  • Created BW Roles and Authorizations for Japan Project and supported testing and go-live activities.
  • Supported cut-over activities, go-live and post go-live stabilization period activities for Walmart client.
  • Involved in post Go-Live activities like Production support, Documentation and Knowledge transfer.
  • Managed all BI Basis tasks from initial scoping to post go-live support.
  • Enhanced Existing roles during Go-Live to accommodate a seamless process.
  • Designed and implemented roles for three go-Live projects.
  • Involved in Go-live and Post Go-live support.
  • Performed the system health-check for go-live.
  • Assisted with Go-Lives/Roll-outs to new locations.
  • Participated in 4 or more Go-Live.
  • Handled security rollouts for multiple applications involving large user base and go-live support for different Implementations.
  • Identified issues during GO-LIVE, provided solutions and got the changes thoroughly tested and signed off and updated applicable deliverables.
  • Created eCATT scripts for Go-Live user load and role assignment and maintenance.
  • Supported Pre and Post Go-live security authorization issues faced by users.
  • Collaborate with Basis team for pre and post Go-Live activities.
  • Involved in Cutover/preparation for Greely Plant Go-Live by creating the roles /Initial user setup.

Show More

38. Information System

demand arrow
low Demand
Here's how Information System is used in SAP Security Consultant jobs:
  • Experienced extensively in User Information System, analyzing EWA reports, providing security related recommendations as per EWA.
  • Reviewed critical and sensitive authorizations, implemented improvements to meet audit requirements and used Audit Information System.
  • Trouble shooting authorization problems using Repository Information System and tracing authorizations during security roll outs.
  • Provided training and assistance to Information System personnel and end users on efficient use of the SAP system and system resources.
  • Experienced in Coordination with Audit team for SAP Security Audit and generated Audit Information Systems logs as per Audit team requirement.
  • Trouble shooting authorization problems using Repository Information System, Profile Generator using PFCG and Tracing authorizations using (ST01).
  • Handled troubleshooting user issues by using SU53, tracing (ST01) and User Information System (SUIM).
  • Generated Audit Information Systems (AIS) logs (SM19, SM20) for external auditors.
  • Worked with User Information System, creating and changing users and assigning users to roles.
  • Monitored user ID through User Information System (SUIM) and created monthly audit reports.
  • Worked closely with Audit team for SAP Security Audit and generated Audit Information System logs.
  • Work with User Information System (SUIM) for reporting and trouble shooting.
  • Worked extensively on User Information System (SUIM) for audit purposes.
  • Assigned roles and user groups using user information system.
  • Worked extensively with user information system (SUIM).
  • Used Audit Information System to perform the audit.
  • Implemented AIS (Audit Information System).
  • Experience with using Audit Information Systems (AIS) logs (SM19, SM20 and SM18)
  • Generated Audit Information Systems (AIS), logs (SM19, SM20, SM18).
  • Experienced extensively in User Information System (SUIM) Used GRC for mitigation of risks involved for the users.

Show More

39. RAR

demand arrow
low Demand
Here's how RAR is used in SAP Security Consultant jobs:
  • Developed custom authorization objects to support complex BW hierarchical structure with compounded number (organizational level) ranges.
  • Participated in defining the implementation strategy for RAR.
  • Configured and Customized RAR/CUP/SPM as per business requirements.
  • Train Compliance and Business Leads how to interpret RAR SoD reports and work with Security how to resolve SoD conflicts.
  • Updated the rules by creating new risk id for conflicting functions and transported through the landscape of GRC RAR.
  • Created analysis authorizations to provide security on Hierarchies and Info Objects, made the info objects authorization relevant.
  • Analyzed users and roles through GRC v5.3 RAR tool by running SOD reports in Transaction and Authorization level.
  • Used BRBACKUP and BRARCHIVE utilities, system monitoring, created another R/3 system from existing R/3 system.
  • Supported both Internal and External audit review by running SOD reports through GRC RAR tool.
  • Performed Users analysis, Role Analysis and maintained Rules Library for Compliance calibrator.
  • Add custom authorization objects for hierarchies used for reporting purpose.
  • Created and maintained BW authorizations on hierarchies (RSSM).
  • Secured the data presented in queries by hierarchy node.
  • Initial Configuration of GRC SUP & RAR.
  • Worked on Monitoring Background jobs in RAR.
  • Implemented GRC including CUP, RAR, SPM, ERM suite.
  • Worked on CUP, RAR, BRM, and SPM.
  • Created new analysis authorizations for giving access to the existing hierarchies, info objects by replacing the old customized auth objects.
  • Performed SOD checks for all PRD users with Compliance Calibrator 4.0/5.3 toolset (RAR).
  • Involved in transportation of Custom Objects and hierarchy auth definitions.

Show More

40. Abap

demand arrow
low Demand
Here's how Abap is used in SAP Security Consultant jobs:
  • Worked with Functional analysts and ABAP Developers in Defining and implementing security requirements including testing standards, procedures and best practices.
  • Designed and developed various security utilities including user management and profile comparison ABAP/4 programs and CATT scripts.
  • Created Support Roles to help with the normal day-to-day security requests with custom transactions, ABAP reports and SQL queries.
  • Project provides SAP Basis, Security, functional and ABAP support to the Abbott labs client, USA.
  • Checked CPU utilization and Volume space utilization, monitored the system logs and ABAP dumps (SM21).
  • Monitored System Logs (SM12) and ABAP dump (SM21) and fixed errors occurred.
  • Monitored the system logs and ABAP dumps (SM21) and fixed the problems occurred.
  • Installed and configured WEB AS JAVA as an add-on to existing ABAP system.
  • Created JCO RFC Connections between EP and other ABAP based SAP Systems.
  • Debug the ABAP Programs to ensure the authority-check statement is implemented.
  • Worked with functional and ABAP resources to resolve transport import errors.
  • Created various custom security objects for PA and ABAP programs.
  • Edited ABAP code for user single sign on access.
  • Created custom ABAP, CATTS and QUERYS to support the upgrade and support tasks.
  • Worked on Authorization Objects P_ORGIN, P_ABAP, P_PERNR, P_ORGXX etc.
  • Apply OSS notes to support ABAP Programs.
  • Configured the Business roles and the related ABAP security role to address the Web UI view and the backend SAP access.
  • Configured Kerberos, NTLM-SSP and Portal based Single-Sign-On to ABAP systems running on Windows & AIX.
  • Mass user creation and roles assignment through Z transactions in ABAP backend system.
  • SOD checks with SOX Compliance User Administration in ABAP / portal.

Show More

41. APO

demand arrow
low Demand
Here's how APO is used in SAP Security Consultant jobs:
  • Implemented 4.6d APO security for the development system and assisted in daily security activities for 3.1I and 4.6c systems.
  • Complete redesign and revamp of security for 16 SAP modules and new dimension products (BW, APO).
  • Designed and configured security roles to support corporate business processes for R/3, CRM, BW and APO.
  • Assisted the basis team in Going Live checks during the implementation of the APO and BW systems.
  • Have provided support to APO systems by creating new roles, changing roles and provisioning user access.
  • Worked with SAP by creating OSS Messages in fixing APO Security issues.
  • Work on implementation project for SAP APO role design.
  • Installed and configured APO 3.10 and live cache 7.40.
  • Created SAP Accounts in BW, Prod, CRM and APO Maintained SAP employee accounts updated in the system.
  • Worked on Sap Portals 6.0, Sap R/3 Security, BW, APO and SM (Solution Manager).
  • Modified and assigned roles for CRM, APO, SEM, SRM components in DEV and QA systems.
  • Handle Security Related Incidents for various SAP systems, R/3, APO, XI, BW etc.
  • Worked extensively on all three landscapes in transporting roles (ECC, APO, and BW).
  • Designed SAP authorization roles in ECC, BI, APO, XI, HR and SNC.
  • Used Cat scripts for testing, and Modules: MM, FI, SD, APO.
  • Gathered requirements for the end users for BW, APO, SEM and R/3 Systems.
  • SAP SECURITY CONSULTANT with total 3 years 4 months experience R/3, APO systems.
  • Design, Develop, Test and Implementation of APO Roles Troubleshot problems that occurred with e-portal authentication/authorization.
  • Worked on high priority vantive tickets in R/3, BW and APO security that needs specialized security expertise.
  • Reviewed SAP R/3 security Design for SOX Issues in BW and HR, APO Modules on SAP R/3 Created/maintained BW.

Show More

42. PP

demand arrow
low Demand
Here's how PP is used in SAP Security Consultant jobs:
  • Participated in several go-lives of various projects and also provided post-implementation production support to end users.
  • Proposed & implemented Master-derived role approach as security redesign.
  • Provide support to the following departments: Planning, Procurement, Manufacturing, Quality, Customer Service, Warehouse and Shipping.
  • Provided System admin support or SAP Identity Management - Currently being phased out in preference to GRC - CUP.
  • Created Roles and Authorization Profiles for the Functional consultants including FI/CO, MM, SD, PP and QM.
  • SAP Security Team member in GE Power Grid division, supporting all of Power Grid's internal SAP implementations.
  • Project Planning for SAP system authorization, Compliance & Production support including individual task allocation and dependencies.
  • Worked with process experts for SOD conflicts and assigned appropriate roles to the users.
  • Provided support for SAP NetWeaver systems running BI 7.0 (NetWeaver 2004s).
  • Analyzed each role and mapped them to transaction codes according to business process.
  • Worked as SAP Security Support Consultant in Bendix SAP ERP support team.
  • Led the Knowledge Transfer sessions and effectively trained the production support team.
  • Monitor performance of SAP, both at the application and OS level.
  • Involved in researching and applying OSS notes related to security authorization profiles.
  • Provided On Call support on a rotational basis.
  • Evaluated approximately 20,000 profiles to be replaced.
  • Assisted in determining the scope of the IT Applications from SOX perspective and negotiated with external auditors for their concurrence.
  • Develop team members by ensuring cross-training and support flexibility Supporting all testing like Integration, stress and UAT.
  • Remediated the wide access roles in to appropriate validated roles that are SOX compliant keeping FDA validation requirements.
  • Mass Assignment and Re-assignment of Roles/ Users Mapping of Missed Authorization Object in T-codes.

Show More

43. Rsecadmin

demand arrow
low Demand
Here's how Rsecadmin is used in SAP Security Consultant jobs:
  • Implemented BI Security with management of Analysis Authorizations at Characteristics, Key Figure and Hierarchy Node Level using Transaction RSECADMIN.
  • Created analysis authorization RSECADMIN to implement field level security for financial report by company code and sales organization.
  • Created Analysis Authorization Objects using transaction RSECADMIN.
  • Used transaction RSECADMIN for creating custom authorization objects and S_RS_AUTH for assigning authorization objects for BI query end user roles.
  • Experience with the BI Analysis Authorization (RSECADMIN) to maintain security for reporting users and troubleshooting the reporting problems.
  • Used RSECADMIN extensively to simulate users running queries in BEX and used the Error logs to determine missing authorizations.
  • Worked extensively in RSECADMIN for creating, maintaining and assigning custom authorizations and tracing user errors in BI.
  • Restricted Analysis Authorizations (Using RSECADMIN Tool) at Characteristic Values, Attribute Values and Key Figure level.
  • Implemented security for BW reporting users using analysis authorizations in BI7.0 using the new security tool RSECADMIN.
  • Have worked extensively on BI Security creating, maintaining Analysis Authorizations using RSECADMIN tool.
  • Used RSECADMIN in BI for creating, maintaining and assigning of Analysis authorizations.
  • Trouble shooting of Authorization issues to Queries Using Transaction RSECADMIN via RSRT.
  • Utilized RSECADMIN analysis tools to debug authorization errors Audit and Compliance.
  • Assigned groups & individual authorizations and BI maintenance through RSECADMIN.
  • Created roles using PFCG and Analysis Authorization using RSECADMIN.
  • Complete Knowledge in BW authorizations (RSECADMIN).
  • Assigned groups & individual authorizations through RSECADMIN.
  • Traced user authorization errors (ST01, SU53, and RSECADMIN).
  • Worked on critical authorization Objects like S_TABU_DIS, S_DEVELOP, S_RZL_ADM, S_ADMI_FCD Built Analysis Authorizations using the transaction RSECADMIN.
  • Worked on BI Analysis Authorizations using RSECADMIN Tcode.

Show More

44. OSS

demand arrow
low Demand
Here's how OSS is used in SAP Security Consultant jobs:
  • Analyzed existing security landscape to build a consolidated Business Process Master List across various projects within Cardinal.
  • Created CUA user in CUA system as well in child system and assign a password which is common across all systems.
  • Coordinated With Users and Business Owners across the Globe in Fixing and Solving Authorization Issues at Transaction And Authorization Object Level.
  • Led and cross-trained employees on various SAP Security aspects and performed demonstrations to train end users.
  • Create Client Copy requests with SCC1 and Transport Requests across the landscape till Production using CPGRC.
  • Lead the security team and consultants in successfully implementing multiple SAP projects cross all SAP systems.
  • Provide technical support to change management team & Transport of changes across servers.
  • Transported Activity Groups, User profiles and Authorizations across Integration and Production Systems.
  • Trouble shooting of Authorization issues across all systems in the Landscape.
  • Defined standards and reusable approaches which benefits cross-functional groups.
  • Researched OSS notes for security problems they were having.
  • Implemented SAP CUA for user management across SAP enterprise.
  • Transported Custom and Workbench Requests across the landscape.
  • Create Transports and move across the landscape.
  • Transport management across the landscape using STMS.
  • Worked cross-functionally with others on product launches.
  • Download and Apply OSS notes and PATCHES required for Profile Generator as a pre- and post-up-gradation maintenance using SPAM and SAINT.
  • Managed roles and privileges for SAP NetWeaver IDM across the landscape Integrated UME and corporate LDAP and managed through IDM.
  • Register developer keys and provide authority for OSS logins.
  • single and mass) between clients on a specific system and across systems from Development, Q/A to Production.

Show More

45. User Roles

demand arrow
low Demand
Here's how User Roles is used in SAP Security Consultant jobs:
  • Designed, developed and administered user roles, profiles and authorizations.
  • Recommended Solutions for Commonality in User Roles.
  • Re-designed user roles and classification according to system usage to improve maintenance during SAP annual license audit using the IDM environment.
  • Interfaced with user community to understand their security needs and worked with functional teams to define user roles and requirements.
  • Worked with the t-code for creating custom authorization objects & S_RS_AUTH for assigning authorization objects for BW query end user roles
  • Analyzed Business scope, user roles, and developed role matrices for the better understanding of Security plan.
  • Worked on User Roles, Profiles and Authorizations for various modules using Profile Generator (PFCG).
  • Assigned super user roles to the users for emergency access & monitored & audited their activities.
  • Created customized end user roles and menus to allow for low level modular access control.
  • Performed the unit testing for all BW Admin roles and BW query end user roles.
  • Briefed all Process Teams on SAP Security for the information needed for end user Roles.
  • Define User Roles and role Management Procedures (Role Owners, etc.)
  • Created customized end user roles to allow for low-level modular access control.
  • Identified and corrected major security breaches within the end user roles.
  • Worked with Functional team members to set up end user roles.
  • Led effort to incorporate end user roles into validated testing.
  • Developed EBP developer's & prod user roles.
  • Helped Bloomberg with the initial specification and testing of both project access roles and end user roles for SAP 4.7.

Show More

46. Authorization Profiles

demand arrow
low Demand
Here's how Authorization Profiles is used in SAP Security Consultant jobs:
  • Modify /create various authorization profiles related to various system operations for restricting / facilitating users for smooth and secure system operations.
  • Generated authorizations using Profile Generator and assigned to authorization profiles and assigned to activity groups.
  • Performed Audit for the Authorization Profiles and Activity Groups created by Authorization Profile Administrators.
  • Generated and maintained authorizations and authorization profiles based on existing roles.
  • Tested Authorization objects, fields, authorizations, authorization profiles.
  • Implemented Context Sensitive Structural authorization profiles.
  • Maintained authorization profiles using OOSP.
  • Used Profile Generator to create, modify and customize Activity Groups, Authorizations, Transactions, Roles, and Authorization Profiles
  • Developed and maintained SAP authorization profiles, operating system policies, end user master records and active group profiles.
  • Created/reviewed and Traced HR authorization profiles and related issues using OOSP and PO13 to the best extent feasible.
  • Developed authorization profiles for FI, CO, SD, MM in Development, Test and Production environments.
  • Controlled the access of end users in the CRM system by assigning them appropriate authorization profiles.
  • Created and maintained simple roles and derived roles and generate authorization profiles to roles.
  • Used Profile Generator to create, generate and assign authorization profiles to users.
  • Used Profile Generator to maintain roles, generate and assign authorization profiles.
  • Well versed in using transaction OOSP for maintaining authorization profiles.
  • Provided proof of table profiles and user authorization profiles.
  • Configured, Analysis and Cleanup of authorization profiles and Rule architect (Compliance Calibrator - Risk Analysis and Remediation) .
  • Assigned structural profiles to users using the program RHPROFL0 Maintained authorization profiles using OOSP.
  • Create structural authorization profiles (OOSP) Create infotype 1017 (PO13).

Show More

47. New Roles

demand arrow
low Demand
Here's how New Roles is used in SAP Security Consultant jobs:
  • Cleaned and adapting the roles (Merging, Renaming and Testing all the new roles with the functional and key-users).
  • Create new roles (single, Composite, and derived), and maintained authorization field values.
  • Coordinate with the role owners for the backups and the role owners for the new roles.
  • Designed and created new roles according to the input provided by the functional consultants.
  • Defined and documented the design for the new roles in to Authorization field level.
  • Established users in SAP-ERP and modified existing access for users transferring to new roles.
  • Adjust the new roles per SoD rule set and eliminate the false positives.
  • Worked with Business Process Owners to define new roles and processes in SAP.
  • Created new roles per business requirement and maintained existing roles as required.
  • Worked with functional and business teams to develop new roles and authorizations.
  • Build from business design new roles for ECC for new functionality.
  • Analyzed the nomenclature of roles and suggested changes for new roles.
  • Worked with functional consultants to analyze and design new roles.
  • Created new roles as per segregation of duties requirements.
  • Design and build new roles for support groups.
  • Created new roles as per SOD requirements.
  • Work on various business rollouts which involved building new roles depending on the business requirement for a given business unit.
  • Created new roles for the business (end users and BPOs) and technical team.
  • Defined the procedure for the roles modification and creation of the new roles.
  • Use Approva Bizrights for compliance checking of new roles.

Show More

48. Analysis Authorizations

demand arrow
low Demand
Here's how Analysis Authorizations is used in SAP Security Consultant jobs:
  • Formulated complex mapping documents to establish relationships between the InfoObjects, Analysis Authorizations and their respective roles.
  • Implemented InfoObject Security (field-level security) for Reporting Users and also created analysis authorizations.
  • Created a detailed upgrade strategy and implementation plan to implement Analysis Authorizations.
  • Designed and created analysis authorizations and assigned to new authorization roles.
  • Worked on BI Authorizations including standard authorization and analysis authorizations.
  • Worked with direct and indirect assignment of Analysis Authorizations.
  • Designed and implemented Analysis authorizations for BW roles.
  • Identified requirements to upgrade to analysis authorizations.
  • Created and maintained Analysis authorizations.
  • Create & test analysis authorizations, design master roles for BI and coordinate for testing with BI Functional Team.
  • Worked with the BI Team to create Analysis authorizations after extraction of the Structural Authorizations from the HR area.
  • Created Analysis Authorizations and menu based roles in BI to be integrated with BOBJ system for reporting.
  • Created BI analysis authorizations for FI, MM, SD internal data.
  • Assigned the Analysis Authorizations access to users using the authorization object S_RS_AUTH.
  • Created BI 7.3 roles from BW roles, templates and analysis authorizations.
  • Worked on BW/BI 7.0 security & Analysis Authorizations.
  • Worked on BI Analysis Authorizations.
  • Assigned the Analysis Authorizations access to users using Authorization Object S_RS_AUTH.Resolved issues related to Authorizations objects using T-Code RSSM.
  • Evaluated different methodologies to implement Analysis Authorizations based on existing security best practices and client's security approach.
  • Company: Complete Online INC Troubleshoot and supported BW and BPS security roles and analysis authorizations.

Show More

49. HCM

demand arrow
low Demand
Here's how HCM is used in SAP Security Consultant jobs:
  • Communicate and translate SAP HCM authorization requirements among business process owners.
  • Gathered requirements, analyzed and implemented HCM structural authorizations.
  • Provide production support of existing security roles and functions various SAP products which includes ECC, BI, BOBJ and HCM.
  • Design and created the new roles for HCM including ESS, MSS, Compensation, Benefits, Time Management etc.
  • Assist in mapping technical security roles to users in (GRC, BW/BI, HCM and ECC) environment.
  • Worked on setting up security for various HCM Modules such as LMS, Time, ESS/MSS etc.
  • Solo SAP HCM Security consultant responsible for design, development, and support of global HR security.
  • Implemented new product instances for SAP HCM, SAP Learning Solution and SAP Mobile Infrastructure.
  • Worked on scheduling various background jobs related to HCM Security module.
  • Leveraged HCM Org Structure for CRM 7.0 Design.
  • Implemented Org Publisher for SAP HCM.
  • Provided support to SAP HCM users.
  • Configured HCM/HR system to IDM.
  • Supported daily operations for SAP BW, BOBI, BPC, ECC, SolMan, HCM landscape.
  • Design Roles and Authorizations for SAP ERP, SAP HCM, SAP R3 and SAP PI.
  • Worked with P_PERNR, P_ORGIN, P_ORGINCON and P_ORGXXCON objects in designing the HCM Roles.
  • SAP HR Security: Implemented Personnel Administration and Organizational Management (PA and OM) modules of HCM.
  • Designed and implemented a new roles for the function teams for APO&HCM.
  • Created HCM Single Roles, to secure Infotypes using Authorization Objects P_ORGIN, P_ABAP.
  • Worked on HCM Authorization objects, Infotypes, personal area, subtype and etc.

Show More

50. Su10

demand arrow
low Demand
Here's how Su10 is used in SAP Security Consultant jobs:
  • Use transaction codes SU10, PFUD and SUPC for mass generation of profiles, roles user comparisons and for user assignments.
  • Used SU10 to make changes to mass number of users and SU01 to create user ids.
  • Used T-code SU10 for creating mass users and assigning roles to multiple users.
  • Build SECATT scripts, use transaction SU10 for any mass user updates.
  • Initiated user creation and assignment of roles using SU01 and SU10.
  • Used SU10 to perform mass changes to user's roles assignments.
  • Created and maintained user master records using SU01 and SU10.
  • Create and modify user accounts using transaction SU01 and SU10.
  • Created CATT scripts for mass users creations also used SU10.
  • Maintained user master record for mass users using SU10.
  • Created mass users using CATT script and SU10.
  • Utilized SU10 and CUA for User mass maintenance.
  • Worked on SU10 to perform mass operations.
  • Used SU10 to perform mass operations.
  • Utilized SU01/SU10 for User Modification.
  • Mass user creation using SU10.
  • Worked with SU01, PFCG, SU24, SU25, ST01, SU53, SU10, SE10, STMS_IMPORT etc.
  • Experienced using transaction codes SU01, SU10, PFCG, ST01, SU24, SU53, SUIM etc.
  • Used SU10 for mass changes.
  • Support in implementation and configuration of SAP CRM module and GRC 5.3 Perform extensive user administration using SU01 and SU10.

Show More

SAP Security Consultant Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A SAP Security Consultant

ECC

8.5%

GRC

7.5%

Compliance Calibrator

6.2%

BI

5.9%

User Administration

5.5%

SAP R/3

5.4%

Pfcg

5.2%

HR

5.0%

Su53

5.0%

Authorization Objects

4.9%

Fighter

4.6%

SOX

4.6%

CUA

4.3%

ST

4.2%

Business Requirements

4.2%

CRM

4.1%

Profile Generator

4.1%

Su24

3.8%

Suim

3.5%

Security Roles

3.5%
Show More

Typical Skill-Sets Required For A SAP Security Consultant

Rank Skill
1 ECC 5.1%
2 GRC 4.6%
3 Compliance Calibrator 3.8%
4 BI 3.5%
5 User Administration 3.3%
6 SAP R/3 3.2%
7 Pfcg 3.1%
8 HR 3.0%
9 Su53 3.0%
10 Authorization Objects 2.9%
11 Fighter 2.8%
12 SOX 2.8%
13 CUA 2.6%
14 ST 2.5%
15 Business Requirements 2.5%
16 CRM 2.5%
17 Profile Generator 2.5%
18 Su24 2.3%
19 Suim 2.1%
20 Security Roles 2.1%
21 IDS 2.1%
22 MM 2.0%
23 SRM 1.9%
24 Composite Roles 1.8%
25 Transaction Codes 1.8%
26 User Access 1.8%
27 Risk Analysis 1.7%
28 Troubleshoot 1.6%
29 Production System 1.5%
30 FI 1.4%
31 Virsa 1.4%
32 Access Control 1.4%
33 Security Issues 1.3%
34 Authorization Issues 1.3%
35 SCM 1.2%
36 Su01 1.2%
37 Go-Live 1.2%
38 Information System 1.1%
39 RAR 1.1%
40 Abap 1.1%
41 APO 1.1%
42 PP 1.1%
43 Rsecadmin 1.0%
44 OSS 1.0%
45 User Roles 1.0%
46 Authorization Profiles 1.0%
47 New Roles 1.0%
48 Analysis Authorizations 1.0%
49 HCM 0.9%
50 Su10 0.9%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

12,982 SAP Security Consultant Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.