Debasish Roy aceey3@r.postjobfree.com
Sr.SAP Security (GRC) Professional 614-***-**** ( M )
www.linkedin.com/pub/debasish roy/7/842/537/
Summary
Over 17 years of experience in administration and application development including more than 12 years in SAP
Security and Basis admin.
Successfully completed 6+ full cycle implementations – Project planning through post go live support, Upgrades
and SOX, ASAP implementation methodology expertise
Responsible for Managing large infrastructural and systems teams .Led by example while assuming
risk/responsibility.
Worked very closely with functional teams, BPOs and SME’s from R/3, XI, EP and BI to deliver fully integrated
seamless solutions.
Specializes in Upgrades, Large Scale Global Implementation of SAP.
Extensive SAP Security and BASIS Administration knowledge of SAP R3 Products like ECC 6.0, ECC5.0, SAP R/3 Enterprise, BI 70, BW 3.5, 3.0,
2.0, EP 70, 60, XI 2.0 and APO 3.0, CRM, GRC 5x, Approva and Sol. Man. 7.0.
Experience in implementing Enterprise Directory (LDAP) with SSO to SAP ERP (SAP Passport).
Knowledge of SAP Business Objects security at Object and Data Level.
Experience in leveraging Versa Access Enforcer and Fire Fighter, Role Expert to enhance SAP Account Administration and processes and provide
violations and mitigation required for roles and users.
Extensive knowledge of GRC and SOX Compliance via Virsa for SAP, Process Control (2.0 and 2.5) and Approva Products (BizRights 3.5) and
worked closely with the External (KPMG, Y&Y, DT, PWC) and Internal auditors to resolve GRC (SOX) and SOD related issues.
Proficient in use CRM2007 security administration tools as ACE, Business Role, Technical Roles (PFCG)
Extensive Security knowledge in a R3 Validated Environment and BW. R/3 Role based authorization (SAP Profile
Generator tool PFCG) and other method of SAP security including UME (SAP Enterprise Portal) and SAP HR
(Structural Authorization).
Created Security strategy and User Account based Policies. BW security, was Role based, created on the user base and transactions used by
users. Security Process adapted to follow change management process
I have worked extensively in System Sizing, Landscape, Installation, Client Strategy, Security, CUA, LSMW and CATT, STMS, CTO, CCMS,
Printer Setup, Performance Tuning, Patch installation (SPAM).
Computer Skills
Page 1 of 3
Operating System:
Microsoft Office Suite
Databases:
Testing Tools
Language
ERP – SAP
GRC Suite
TXU Energy, Irving, Texas
EMDiesels, LaGrange, IL
ABB, Wickliffe, OH
Siemens A&E Energy, Alpharetta, GA
Komatsu, Rolling Meadows, IL
Arizona Chemical, Jacksonville, FL
Bearingpoint, Columbus, OH
Johnson Controls Inc., Holland, MI
E x pe rie nc e
Employer / Client
Role
Project Duration
Tools Used
Responsibilities
• Planning,
sizing,
resource
allocation
for GRC 10
implement
Page 2 of 3
Network Administrator
Role
Project Duration Jan. 1996 – January 1997
AT&T System V, BSD
Tools Used
UNIX & Networking
Developed UNIX shell scripts for Network Management.
Administered LAN and WAN and performed nodal activities in the communication protocol according to X.400, TCP/IP.
Performed system administration of UNIX servers and maintained connectivity of GEMS 400
Conducted integrated system testing for faults detection and analysis (e.g., loss of packet during communication).
Installed and supported Oracle 7.3.2, data file configuration and tuning.
Performed OS level backup in tape.
Installed, upgraded & maintained network. Conducted troubleshooting & resolved problems with network issues on IBM & H/W interface on
network.
Proficient in setting up TCP/IP networks & configuration of various services NFS, LDAP, and DNS, DHCP.
Checking & repairing file systems whenever required.
E duca ti on
Bachelor of Science from Calcutta University, INDIA – (1999 to 2002) .
Diploma in Mechanical Engineering, INDIA – (1990 to 1993).
Honors Diploma in Software Technology and Management (NIIT), INDIA – 1995.
Certificate on ORACLE 7.1 with Developer - 2000 for Client Server Application - 1996
ITIL v3 – 2011
GRC300 - SAP Access Control 10.0 - Implementation and Configuration - 2013
Page 3 of 3