
Extraction of SAP Security Table Names. USH table has change documents information. For those opting for a Brownfield migration approach from SAP ECC, the first stage is to analyse and understand your ECC usage data for any of the business processes that are not going to be fully redesigned as part of the implementation.AGR tables contains data about roles. Step 1: Understand your SAP ECC usage data. Read Safety first: Security for SAP S/4 HANA by clicking here.
Performed SAP Security related task such as Security Audits, SOX (Sarbanes Oxley) Compliance, Developed and Documented Security Policies and Procedures, User maintenance, Activity group/Role maintenance using profile generator, security redesign strategy.Sap-sap Basis-sap Security. I have been involved in complete SAP R/3 Projects lifecycle from design phase to post-implementation phase on various projects. I possess a complete understanding of SAP R/3 and BW system integrity in technical as well as functional areas, which allows solving potential problems in specific functional area as well as system area.
SAP Fiori architecture and security. Security for SAP S/4 HANA. Pro-active collaboration and stakeholder management.SAP ECC and SAP S/4 HANA. Knowledge & Experience on ECC, Netweaver, S/4HANA. Knowledge & Experience with designing a SAP landscape. The role requires an individual with a solid background in SAP Basis.
Worked on HR level security, work center, job, organizational unit, position and user level. Knowledge in creating positions and jobs in HR SAP Security design using structural authorizations ( HR-ORG) Experienced extensively in using Automatic Profile Generator ( PFCG) in creating and modifying Single Roles, Composite roles and Derived roles Experienced in 3 full cycle security implementation for modules such as FI, HR, CO, SD, MM, PP, QM, PS and PM. Experience includes analysis, development, and maintenance of SAP Security in SAP R/3 (4.7), ECC (6.0/5.0), SAP BW(3.0, 3.5),BI 7.0,SCM ,CRM
Experienced extensively in User Information System ( SUIM) Performed User Master Reconciliation using ( PFUD and SUPC). Experience in analyzing and processing, SOD and SOX issues.
Extensive Knowledge in using GRC Tool for handling SOD conflicts Experience in creating and Authorization Groups for securing Tables & Programs using SE54 and RSCSAUTH. Experience in Troubleshoot roles using SU53, ST01 and ST03.
Sap Ecc Security Upgrade To Enterprise
Experience in implementing security in BW (3.0B, 3.1C and 3.5) ,BI 7.0 including info object level security Experience in Security Upgrade including upgrade to Enterprise R/3 4.6, 4.7 and ECC 6.0, 5.0 - SU25 Strong knowledge of Security related tables and reports/programs
Excellent analytical and logical programming skills with a good understanding at the conceptual level and possess excellent presentation, interpersonal skills with a strong desire to achieve specified goals.ERP Skills: SAP R/3 4.6A, 4.6B, 4.6C, ECC 5.0, ECC 6.0, GRC, SAP BW 3.0,Database: SQL Server 2000, Sybase, Oracle 9i Enterprise EditionScripting Languages: Java Script, VB ScriptPlatforms: UNIX, Windows NT, 2000/Pro, MainframeOther Tools: Matlab, Pro/Engineer, Business Objects XI-R2Confidential, Melville, NY June'09-Nov'09 Extensively worked with the end users to resolve their security related problems by handling Trouble tickets in the production environment Strong documentation and training skills and enabling knowledge transfer. Generated Audit Information Systems (AIS) logs ( SM19,SM20,SM18)
Troubleshooting security problem by using different scenario such as ST01, SU53 to find security issues. Used SUIM and security related tables such as AGR_TCODES, AGR_USERS, AGR_1251, AGR_1250, AGR_DEFINE to generate Reports Maintained users in Central User Administration (CUA), monitored user activities, troubleshoot user level problems to access the servers and managed security throughout the SAP landscapes. Involved in security design for SAP HR Implementation Created and modified HR Single roles, Composite roles and Derived roles Worked on HP Quality Center to solve defects during Integration Testing.
Sap Ecc Security Code RSECADMIN To
Troubleshoot the authorization problem using RSSMTRACE, RSSU53 and also using RSR_TRACE Build user roles based on folders at the query level as client specifications. Use transaction code RSECADMIN to develop info cube and ODS level security based on profit and cost centers. Creating the reports using BEX Analyzer and customizing the workbooks for individual users
Responsible for providing HR security support. Extensively worked with ECATT (SECATT) for mass user creations. Provided user access and client authentication for Solution Manager 4.0. Worked on Production Support for ECC 6.0, BI 7.0, Portals.
Defined end user roles to be attached to HR position. Configured HR personnel positions. Worked with Business experts in placing Mitigations for Conflictingand Critical roles. Creating new users and maintaining users on day to-day basis. User Administration for more than 10,000 users.
Validated SOX compliance by using Virsa Compliance Calibrator and Role Expert Created Firefighter IDs and roles with Virsa VFAT tool Conducted GRC assessment and proof of concept including SOD review of Roles, Profiles, Authorizations, and T-Codes and identified conflicting Roles, Authorizations, and in-appropriate T-codes which lead to SOD issues. Maintained Virsa SAP GRC 4.0 security tools such as compliance calibrator, fire fighter and role expert

Complete security process overhaul, implementation of best practices for security provisioning and design of automated programs for the streamlining of security processes. SAP HR Security Re-Design. Interacted with HR Operations Team in creation of Org Structure, Evaluation paths as part of implementing HR Security (PD Authorizations) User Master Maintenance - Creating Users, Locking/Unlocking mass Users, Deleting users, Renaming users as per Audit guidelines
R/3 system security and Authorization concepts knowledge transfer. Implementing audit control points for end user roles. Developed and implemented complete security redesign plan and documented Security procedures, User guidelines. Provided production support and resolved Security issues.Confidential, Englewood, Cliffs, NJ Aug'05-Apr'07 Used CATT extensively for the Composite Role menu generation and the creation of mass roles at the time of going live Experience in HR Personnel Administration, concepts and technical aspects of Personnel administration integration between PA and OM.
Created roles for restricting access to queries, workbooks, info cubes Created Custom Reporting Authorization Object using transaction RSSM Worked on BW Security for creating Roles for power users.
Implementation and maintenance of Central User Administration (CUA). Used SUIM and security related tables such as AGR_TCODES, AGR_USERS, AGR_1251, AGR_1250, AGR_DEFINE etc to generate Reports Troubleshooting R/3 security problems by using different scenarios such as system trace, SU53, SU56 in order to find system security problem. Configured Risk/Mitigation interaction with Compliance Calibrator Responsible for the SAP Security assessment and Sarbanes-Oxley ITGC compliance audits and SAP Security/GRC implementation Involved in installing, configuring, maintaining and utilizing GRC (VIRSA) Suite for compliance and security purposes.
Transporting the new roles to different clients and R/3 systems. Monitoring system logs, system dumps, system traces. Troubleshooting security issues in different areas like MM, HR, PP, SD, and FI. Generating different reports for the management using t-code SUIM. Designed and developed security profiles in PFCG for SD, MM, and FI.
Reports of user usage profiles and authorizations, comparison reports in different R/3 system. Designed several utilities to support SAP R/3 security reporting needs.
