Shanthi Manohar Phone: +1-201-***-****
SAP Security & SAP GRC Consultant Email: *******.********@*****.***
PROFESSIONAL SUMMARY
SAP Security consultant having 8+ Years of experience on ECC, GRC, Business Intelligence, BW, BOBJ, HR, HANA,IDM,SRM, CRM and Enterprise Portal.
Having Good experience in areas of administration in Security related issues, User Administration, Troubleshooting Authorization issues, Audits etc., and handling User Community.
Experienced in handling multiple SAP Security projects for global clients at both on-shore and offshore development models.
Experience in requirements gathering, design, development, testing and implementation
Involved in high-level client meetings for various projects.
Knowledge in SAP HANA Security including User Management, Roles, and Privileges.
Experience in SAP BI 7.0 and SAP DBM implementation.
Completed two E2E implementations of SAP GRC Access Control 10.0
Led the GRC 5.3 Optimization project in Mahindra & Mahindra.
Implementing and technically configuring GRC - Access Controls ver. (10.0) Access Risk Analysis (ARA), Access Request Management (ARM), Business Role Management (BRM) and Emergency Access Management (EAM) tools.
Business role restructuring and roll out for 3000+ users considering cross-module access scenario like FI/CO, MM, SD, PM and HR etc.
Well versed with working with Clients & End-users for support and requirements definition.
Strong communication skills and abilities to work under pressures with the reputation of Strong learning ability coupled with good teamwork spirit.
Completed 40+ Roll outs of versatile different Business verticals –SAP Security projects
Completed two E2E SAP ECC 6.0 Implementation.
Proven ability to quickly learn and apply new technologies with strong technical background.
EDUCATION DETAILS
MBA in Information Systems and Marketing from Osmania University.
Bsc., (Comp Science) from Osmania University.
TECHNICAL SKILLS
SAP :SAP R3,BI(3.5/7.0),APO,CRM,DBM
SAP Security tools :Virsa, GRC 5.3,GRC 10.1 and SiAM (Simplified Authorized Management)
Audit tools :CheckAud
RDBMS : Oracle 9i, Oracle 10g
Ticketing tool :Remedy 5, Remedy 7, Quality Centre 9.0 (HPCA)
Transport tool :Rev-trac
Operating System :UNIX (IBM-AIX), WinNT4.0, Win2000, and Win2003
EXPERIENCE:
Client Harman International, Northridge, CA May 2013 to Apr 2018
Designation SAP Security & GRC Consultant
Roles and Responsibilities:
Production Support for users in R/3 and BI, BW, BPC,BOBJ, IDM,HR,HANA, EAM, SCM, CRM, PI Security, Portal, Solution Manager Environments.
Project planning & detailing
Documented policies, procedures and method of user administration.
Helping Client for Internal & External SAP Security Audit.
Modification of roles according to missing authorizations and ongoing business changes.
Accountable for Audit-related tasks/controls (SOX/SOD).
Worked on SAP Check Indicator Defaults and Field values, reduced the scope of Authorization checks using transaction SU24, and maintained check indicators for Transaction codes.
Worked on especially in financial modules to build roles/profiles to secure financial data.
Worked on integrated modules security with financial modules.
As part of internal audit checking manual Password reset, Audit Logs, DEBUG rights, critical authorization objects.
Experience in BPC Security using teams, Task profiles and data access profiles and analysis authorization from BW.
Review standard SAP users like SAP*, DDIC and SAPCPIC.
Worked on Enterprise Asset Management (EAM) restricting the access on company code and plant and maintenance plant level etc.,
Worked on Setting up Security features with Task profiles and Member Access Profiles in BPC.
Worked on setting up Security and Audit settings to ensure user entitlements and access rights in BPC.
Creating Analytic Privileges, Setup data level authorization and privileges at SAP HANA Database, Creating User, Roles & assigning the respective Privileges
Creating RFC (System type) user IDs & providing necessary authorizations for communication between SAP systems.
Created/deleted Organization values as per the business requirement.
Review programs and Custom transactions for security auth check requirements.
BI Implementation Project:
Designed and implemented BI/BW role structure for End user based on segregation on Info cube/Info area etc. Creation of BW authorizations Object (RSECADMIN & RSSM) and making them Authorization Relevant (RSD1) to restrict BW reporting on fields/organization values like Company code/Plant.
Worked on Bex Analyzer/RSA1/Rsecadmin.
Creating workbooks to make it available in Bex analyzer.
Activating analyze authorization (RSECADMIN).
GRC (Governance, Risks & Controls) 10.1 Access Control Implementation:-
Proficient in implementing and technically configuring SAP GRC Access Controls 10.0 components such as Access Risk Analysis(ARA), Access Request Management (ARM), Emergency Access Management (EAM) and Business Role Management(BRM)
Implementation exposure of multi stage multi path workflows, configuring email notification and business rules framework plus rules.
Created design and training documentation for the application.
Configuration and analysis for risk analysis reporting.
Worked on customized Launchpad and role built for GRC 10.
Configured Access Risk Analysis module by Creating Connector, setting up Connector type, updating Global Rule sets, Updating Repository Sync (User, Role and Profile).
Performed User/role level Segregation of Duties (SOD) analysis using GRC ARA, remediated and mitigated SOD conflicts to address security controls for SOX (Sarbanes - Oxley) compliance.,
Expert in Configuring EAM and configured Fire Fighter id's, Fire Fighter owners and Fire Fighter Controllers
Performed workshops with Business users to make them understand how to get more benefits from GRC and let them know End to End GRC Functionality and gathered the required data from business users.
Client Mahindra & Mahindra Oct 2010 - May 2013
Designation SAP Security & GRC Consultant
Roles and Responsibilities:
Production Support for users in R/3 and BI, IDM, BW, BOBJ, HANA, BPC, HR, SCM, EAM, IDM, Portal, Solution Manager Environments.
Troubleshoot authorization problems using SU53 and tracing the transaction for authorization objects using ST01.
Assignment of Authorization Groups to Transaction Codes through the Tables (TDDAT).
Worked on SAP Check Indicator Defaults and Field values, reduced the scope of Authorization checks using transaction SU24, maintained check indicators for Transaction codes
Worked on especially in financial modules to build roles/profiles to secure financial data.
Creating RFC (System type) user IDs & providing necessary authorizations for communication between SAP systems.
Review standard SAP users like SAP*, DDIC and SAPCPIC.
Created/deleted Organization values as per the business requirement.
Worked on roll out projects, designed security for these projects
Executing monthly, quarterly, biannually Controls to remain complaint with SOX and Audit, as per security procedures.
Worked on integrated modules security with financial modules.
Documented policies, procedures and method of user administration.
Integration of BOBJ Security with HANA DB Security Roles
Experience creating customized roles in HANA DB for Developers, Modelers, Technical Admin’s, End Users, Power Users.
Identifying and managing the risk exposure across global supply chain in SAP GRC GTS.
Coordinated with SAP for OSS Support
Review programs and transactions for security auth check requirements.
GRC 5.3 Optimization Project:
Involved in configuration of CUP,SPM, and RAR
Creating Roles in IDM for restricting the access of Access control components.
Worked on customizing workflows (Stages, Initiators and auto provisioning)
Configured Fire fighter in backend systems.
Worked on Fire Fighter (FF) for Super User privileges Management like maintaining Controllers and Fire Fighter Access to a user.
Checking the log report when required for audit purposes.
Checking the SOD (Segregations of Duties) using RAR before assigning to the users.
ECC Implementation:
Involved in End-to-End ECC Implementation Project as a SAP basis/Security consultant right from requirement gathering.
Implemented new module DBM (Dealer Business Management)
Created position based roles /authorization without any SoX/SoD Conflicts.
Taking the same roles to GRC (governance Risk Compliance) available to end user.
Executed SU25 steps to stabilize the Authorizations in DBM Server and did SU24 changes based on business requirement.
Created new Org. Levels as per the business requirements and implemented SAP notes for the same.
Created roles by considering audit policies(Critical accesses are restricted to Consultant only)
Client Cadbury Schweppes Sep 2009 - Aug 2010
Designation SAP Security Consultant
Roles and Responsibilities:
Production Support for users in R/3, BO, BW, SRM, Versa and SMP Environments.
Extensively used mass user creation using(SU10) for mass user creation and addition Of similar roles to mass users.
Creation of Firefighter Roles.
User master maintenance includes user creation, deletion, lockdown, and activation.
Troubleshoot authorization problems using SU53 and tracing the transaction for authorization objects using ST01.
Assignment of Authorization Groups to Transaction Codes through the Tables (TDDAT).
Used R/3 Profile Generator (PFCG) to create, generate and assign roles and authorization profiles to users.
Running PFUD’s using SM37 for updating User Master Records in all Production and Nonproduction environment on a daily basis in all systems.
Generating monthly powerful review access reports using Compliance Calibrator based on critical t-codes and Authorization objects
Functional testing support extensive testing in development and quality systems before moving the roles to production through mercury ticketing tool.
Used Rev-trac for transport Roles and security changes to other clients and systems.
Auditing the Emergency users as per the project.
Preparing monthly/Quarterly Compliance check list.
Checking the SOD (Segregation of Duties) using Compliance calibrator before assigning to the users.
Review emergency user access, table logging, OSS users, Interface users and usage audit logs.
Audit trail for user request procedure – Create/Change of users, authorization changes.