Vijay Ratnam
Cell: 703-***-****
Email: abk2iq@r.postjobfree.com
US Citizen
Summary - Dedicated professional with excellent analytical, critical
thinking skills and a detailed result oriented team leader.
NOTABLE SKILLS/SYSTEMS EXPOSURE
ERP: SAP R/3 4.6 C, ECC 6.0 ABAP
Programming, SAP Security
(FI/CO, MM, PP, SD, PM), BW 3.5,
BI 7.0
CRM: Siebel 99 and Siebel 2000.
Dev. Tools: Macromedia Suite, HTML
Operating Systems: Windows NT, Windows 95, Win2k, XP, Vista, Red
Hat Linux,
UNIX
Software Programs: MS Office, MS Project, Excel, Visio and MS
Access,
SharePoint, Great Plains, COSMO
Experience
SAAV Systems, Inc. September
2006 to Present
> Maintain authorization task through PFCG, SUIM & (SU01.
> Performed the creation & Modification of Users, Roles,
Authorization objects, Tcodes with PFCG, SU24, and SE93.
> Review, analyze and evaluate the security controls
> Performed SAP Role and authorization object re-engineering to
comply with SOX and Segregation of Duties.
> Setup and implementation and managed Central User Administration
(CUA).
> Entered SM30 value under table PRGN_CUST and user_rel_import to
'no' to avoid transporting users.
> Utilized Virsa to ensure SOD remediation.
> Browsed user and roles table data to ensure appropriate access of
tcodes.
> Created and assigned profiles and folder profiles in BI
> Created variants for different programs.
> Worked with S_RS_COMP to secure the report by cube and info area
> Designed roles with S_RS_COMP1 to secure query changes restricted
to specified users
> Utilized S_RS_FOLD to secure info area access to end users
> Familiar with Folder role concept to secure queries by function
team ( HR Reports, Fin reports)
> Worked business to understand the data sensitivity in the BW Query
> Worked with the development team to create developer roles
> Review requirement for creating data loader roles
> Used trace logs to trouble shoot security issues
> Catt scripts for creating users, adding roles to users, and
updating users.
> Created user and maintained the user in Portal UME ( User
Management Engine)
> Familiar with adding portal roles are portal groups to the user
> Review portal logs to trouble shoot portal logon issues
> Helped users with navigation of portal screens
> Help the Development team with documentation of user assignment
process
PricewaterhouseCoopers Jan 2005 to August 2006
> Performed controls review of SAP security implementation
> Created Authorizations, Profiles using profile generator PFCG
> Reviewed client data for SOD and SAT of roles and user based and
respective Authorization based objects
> Conducted pertinent interviews with business owners to obtain
appropriate clarifications of business held
> Recommended functionality, operations, system administration or
change procedures to maintain controls
> Organized reports with findings matrices for control deficiencies
and remediation analysis
> Reviewed IT internal controls from a SOX 404 perspective with
respect to databases such as Oracle, UNIX and Window platforms
> Analyzed criterion such as user profiles, password settings, access
to the IT infrastructure, ability of the users functions, accounts
existence and clarifications
> Conducted meetings to clarify and obtain evidences from business
process owners with screenshots to various change management
process
> Reviewed the organizational charts to gather pertinent information
controls of access granted to authorized personnel
> Analyzed, organized and presented IT control deficiencies and
themes
> Organized reports with findings matrices for the control
deficiencies and remediation analysis
> Reviewed these findings with the client to obtain clarification of
existence or required business function
> Performed Remediation SOX testing
> Utilized existing restatement documents, testing documents, data
gathering spreadsheets for the creation of documentation of process
and procedures
> Process and procedure templates created to standard of guidelines
for the remediation process of SOX testing
> Comprehensive control check includes reviewing, authorized
ftpusers, password parameters, processes running on the servers,
duplicate ID's and other vulnerable access and change requirements
for the business needs
Freddie Mac -Data Security Department May
2004 to August 2004
Information Systems and Services Intern
> Gathered data on current state of IT control processes from various
department managers and leads
> Assisted with re-engineering and documenting IT controls processes
Transportation Security Administration
October 2002 to May 2004
Lead Transportation Screener
> Performed security related procedures
> Managed screeners including scheduling, maintaining alignment to job
activities
Connaissance Consulting
August 2000 to May 2001
EXTREME NETWORKS
SUBMITORDER.COM
Siebel Developer
> Created/modified Siebel Business Objects/Components to customize the
business
object layers in Servers.
> Developed Screens for Contacts, Opportunities, Activities.
> Created, Pick Lists, Links and Joins.
> Performed Testing and Debugging for the Field Service Application
> Provided on -site Call Center support.
> Coordinated and trained sessions for call center associates.
> Implemented Siebel thick and thin clients (ActiveX and Java Thin
Client) and
general trouble-shooting.
> Worked with various levels of Management to resolve data integrity
issues as
they arose.
> Provided follow-up support for any "open" issues in the Siebel
application.
Hospitality Industry Experience September
1992 to March 1999
Front Office Supervisor/Night Auditor
> Managed front office and Housekeeping personnel
> Reconciled revenue due to customer dissatisfaction
Education
Bachelor of Science in Information Technology
Concentration in Information Security and Network Administration
George Mason University, Fairfax, VA