Post Job Free

Resume

Sign in

Management Security

Location:
Richmond, VA
Salary:
120000
Posted:
December 03, 2015

Contact this candidate

Resume:

Vivekanand Rane

SAP Security & Basis Consultant

VISA Status – H1B Richmond, VA

804-***-****

Education:

Master of Science (MBA) in Information Technology, INDIA

Technical Skills:

ERP : ECC 6.0, SAP R/3 Enterprise 4.7/4.6C,BI 3.5/7.0,SCM 4.1/7.0 & EP 7.0

Modules : Basis/ Security/FI/CO, HR/HCM, MM, SD, BW/BI & BPC

Operating Systems : Windows 2000/NT/XP/AIX 5.3

Databases : Oracle 9i/8i, SQL Server, MS Access.

Security Audit Tools : SAP GRC Access Control (10 & 5.3)

Experience Summary:

Having around 15 years of IT experience including 11 years of SAP Security with strong understanding of information security practices.

Strong technical knowledge in working for more than 4 SAP Security and SAP BASIS Full Life Cycle Implementations and SUPPORT Projects

Handling Go-Live, Post Go-Live, and Production Support projects.

Worked on Basis as well as SAP security and GRC 5.3 and GRC 10.0

Extensive experience in Requirement gathering, Design, Development, and Maintenance of SAP applications security.

Handled security and BASIS for various modules BI / BW, APO, FI, CO, MM, SD, MDM, HR /Solution manager & Enterprise Portal (EP).

Handling BASIS activities i.e. Monitoring the systems, health check Transports & Corrections using Change Manager, STMS & OS level using TP commands.

BASIS Overview of Kernel management and OSS connection.

SAP GRC Implementation and Production support experience, with a good understanding of business processes.

Remediation of Segregation of Duties (SOD) within SAP implementation for SOX (Sarbanes Oxley) Compliance using GRC tool.

Worked extensively on pre-SOX audits requirements and working with Auditors to comply the system.

Worked on the SERVICE NOW tool for Incident management and Change management.

Interfaced extensively with clients to gain insight and develop solutions to meet customer business needs across the SAP landscape.

Worked on the APPROVA compliance Management tool and handling support activities for compliance and Risk management.

Broad experience in maintaining single, composite, and derived roles using Profile Generator (PFCG).

Experience in designing and implementing SAP HR Security using position based Security and ESS and MSS Modules.

Very good knowledge of producing and analyzing reports in SAP using SUIM, and security related tables AGR*, USR* etc.

Experience setting up users and security on Enterprise Portal and creating users/user groups through UME for SAP Netweaver.

Extensive experience with resolving ticket issues and troubleshooting security authorization problems while adhering to Service Level Agreements (SLA).

Experience on Audit projects and working as a liaison between the security team and auditors.

Experienced in adhering to the Change Management Process for transporting roles and tables, security objects and maintaining the change documents.

Professional Experience:

Client : Altria, Philip Morris Inc (Richmond, USA)

Duration : Dec 2013 to Till Date

Designation : Architect – SAP Security

Working as SAP Security & Basis specialist for SAP Security Support ECC 6.0 EHP 6 (TWO systems), SERVICE NOW tool and SAP GRC 10.0 upgrade projects

Discussion with client about requirements and communicating to team members.

Conduct security Kick-off Meeting and meet with the functional Business Process Owners (BPO) to discuss the SAP authorization concept and explain that security implementation is a cross-application responsibility functional people will know what ECC transaction codes each job role will require.

System Landscape Design (work closely with BASIS and DBAs)

Check Infrastructure feasibility from security perspective (For Portals exposed to internet or extranet work closely with network providers for firewall security, VPS etc.)

Proposed security guidelines, access policies, disaster recovery plan, business continuity roadmap (work closely with information security consultants and internal auditors or risk management teams)

Working as Security and BASIS consultant. Basis is an additional responsibility being handled.

Working on the day to day user access issues and troubleshooting the authorizations on the basis of incidents

Work on the incident management in Service now ticketing tool

Managing roles revisions on the basis of business requirements with proper approval process

Performing unit tests and User Acceptance testing in the Quality environment

Managing Change management and CAB for transporting changes to the production.

Documenting all the required process and approval documents according to the SOX requirements.

Managing User Access Management through I AM PORTAL

Performed tasks for Basis support team as when required.

Handled Support Pack management (SPAM, SAINT)

Transports & Corrections using Change Manager, STMS & OS level using TP commands.

Supporting Grid projects and mass transports related to it.

Daily Performance checklist.

Backups monitoring.

Job Scheduling and Monitoring through SAP and Autosys.

Creating job streams for SAP through Autosys.

SAP ECC Spool Administration.

Maintaining Client for production system.

Overview of Kernel Upgrade, Applying Patches and User Administration.

Opening OSS connection.

Implemented SAP solution specific Security measures (involves almost every SAP solution) for example: SAP R/3 security, GRC, BW/BI, HR, FI, Portal security etc.

Participated in application integration for example: LDAP, IDM, SAP UME, shared directories etc. (User master records security is on high priority).

Check for any possible backdoor access vulnerabilities (ex: open RFCs, function modules), and it involves almost all SAP solutions and there are special procedures to analyze such vulnerabilities.

Prepared Security roles and authorization design plan for ECC 6.0 EHP 6 for more than 1200 roles in the TWO SAP ECC landscapes.

Co-coordinating with business and IT consultants to get the business requirements and implement that in the roles design

Implemented a strong Security strategy with policy adherence is requisite to manage compliance, minimize risks and to setup a secure and efficient authorization concept with process efficiency and adoption which can be based on organizational structures; business processes and Role based Authorization Concept.

Worked as Core team member for GRC 10.0 implementation team

GRC Access Controls 10.0 post installation administration.

Activation of BC sets and common workflows in GRC 10.0

Performing Task specific customization and maintain connector and connection type.

Audit Management – Handled Electronically Maintain the Audit Universe. Performed Risk-Based Scoping. Establish Audit and Work paper Templates. Centrally Managed Findings, Remediation, and Supporting Documents.

Compliance Management - Risk Analytics helps to prioritize enterprise-wide compliance issues. Compliance reports and dashboards turn information into intelligence,

Enterprise Risk management - Consolidate Risks from various silos into a Risk Register to support a universal risk taxonomy

Policy management - Centrally manage the entire policy lifecycle. Create policy structures to mirror their existing policy strategy.

Worked on the implementation of SERVICE NOW tool for Incident management and Change management. Segregating roles according to their business processes and aligning them in the SERVICE NOW tools. Designed CHANGE MANAGEMENT process for the transportation of the roles.

Designed INCIDENT MANAGEMENT for SAP Support team and configured SLA MANAGEMENT for the same.

Worked closely with SERVICE NOW team for creation of workflows for Approval management. Designed Reports for the business as well as IT for betterments of business process.

Client : Motorola Solutions (Philadelphia, USA)

Duration : May 2013 to Dec 2013

Designation : Architect – SAP Security

Responsibilities:

Worked as SAP Security & BASIS Security Support. Worked as key team members in SAP HR upgrade projects

Coordinating with Motorola IT and business teams to find the requirements of the business. Created Role Strategy Document for better understanding of the business and IT roles for ECC 6.0 and SAP HR for more than 900 roles.

Working on the day to day user access issues and troubleshooting the authorizations on the basis of incidents

Setup ALE environment for Central User Administration (CUA).

Maintaining Users in CUA System and Daily checking CUA logs through (SCUL).

Used Central User Administration (CUA) to handle & distribute users & profiles.

Reviewed the implementation scope and user role report to determine the necessary project team to manage end-user role and authorization profile creation and design

Produced an enterprise-wide role matrix, a document that describes authorizations, detailing roles and their assignments to transactions, reports, menu paths, and organizational levels

Drafted a technical design document of user roles and authorizations, providing the development details for the implementation of the roles

Generated a user authorization strategy and management procedures, detailing the responsibilities and procedures employed for user and authorization administration

Defined the role implementation framework prototype, which is a preliminary implementation of the user role and authorization concept

Designed, developed, and maintained roles for HR / HCM (Organizational Management, Personnel Administration, Succession Planning, Compensation Management, and Performance Management), BI / BW, ESS, MSS, and Portal for Global SAP Implementation.

Maintenance of HR organizational structure to administer and control user access, including time-delimited access.

Involved in Implementing Structural Authorization and Extensively used the following T-Codes:

OOPS - Turn on PD PA Switch.

OOAC - Turn on Structural Authorizations Main Switches.

PPOM_OLD - Creating Organizational Plan.

PA40 - Creating Personnel Master Record.

OOSP - Creating structural authorization profiles.

Made the BI Security Roles as granular and optimum so that the Info Objects can be utilized as much as possible

Creating Analysis Authorizations based on the business requirements.

Optimized the Roles and Analysis Authorization for maintenance purposes.

Used the roles as the medium to assign the analysis authorization objects rather than direct assignment.

Created roles using PFCG and Analysis Authorizations using RSECADMIN.

Used SAP best practices like setting the following InfoObjects as “authorization-relevant” and using them in Analysis Authorizations 0TCAACTVT, 0TCAIPROV, 0TCAVALID.

Resolved BI Authorization issues using RSECADMIN logs and worked with BI developers to modify the reports as per the business requirements and including the authorization variables in the reports.

Researched and applied OSS Notes (SNOTE) to resolve hierarchy node security, and RSECAUTH / RSECADMIN performance issues.

Maintained authorization fields (SU20) for the authorization object R_PM_NAME (Planning Folder) in BI.

Client : Serco

Duration : Oct 2012 to May 2013

Designation : Architect – SAP Security

Responsibilities:

Worked on SAP Security support ECC 6.0, BI 7.0 and APPROVA Compliance Tool.

Discussion with client about requirements and communicating to team members for creating the SAP implementation plan.

Technical discussions with the client and core team members about the upgrade activities and the functional. Gathering requirements of the client. Working on the specifications with different business processes.

Conduct security Kick-off Meeting and meet with the functional Business Process Owners (BPO) to discuss the SAP authorization concept and explain that security implementation is a cross-application responsibility functional people will know what R/3 transaction codes each job role will require.

Worked on using PO to process data out of an external database and we are using Redwood Cronacle to start and stop the PO channel.

Implementation of New SAP Security & Basis design for ECC 6.0 and BI 7.0 for more than 1000 roles in the SAP ECC 6.0 and BI 7.0

Creation of new roles, authorization objects in ECC 6.0. Segregating the roles according to their business processes and functions.

Developing new methodologies for BI 7.0 roles design. Included Analysis Authorization strategy for business reporting roles.

Creation User maintained policy and dashboard for the User Management. Worked on the users access management for FIREFIGHTER access and their approval processes.

Created policies for the SAP systems i.e. Password policy, User Access firefighter policy, Critical system access policy.

Worked on (User Acceptance Testing) UAT queries from the SAP Security & Basis prospective. UAT involves lot of testing scenarios to be created and resolving the queries of the client. Successfully completed UAT and approved by client.

Work on the incident management in REMEDY ticketing tool

Managing roles revisions on the basis of business requirements with proper approval process

Performing unit tests and User Acceptance testing in the Quality environment

Managing Change management and CAB for transporting changes to the production.

Documenting all the required process and approval documents according to the SOX requirements.

Managing User Access Management through IDM

Adopted composite and single roles strategy in the place of old strategies in ECC 6.0 . Designed business roles with Task Based approach for some of the operations to avoid multiple roles changes.

Worked in the Central User Administration (CUA) experience to create users, assign roles, and maintenance.

Central User Administration (CUA) experience to create users, assign roles, and maintenance

Designed Workflow for the approval process in the change management process and taken care for the transports of the changes done in DEV to QA and Production

Finalizing the plan and start working on the task list for the consultants.

Created Checklist for the SUPPORT DESK and started training Support consultants on the newly designed processes.

Worked on implementation of APPROVA compliance Management tool.

Setting up policies for the APPROVA compliance management.

Worked on the APPROVA Audit Management to enable an integrated approach to governance, risk, and compliance (GRC) and allows organizations to effectively leverage from information from other areas of the organization (e.g. policy, compliance, vulnerability data) expedites the data collection and documentation process significantly. Integration capabilities

APPROVA Compliance Management for SOX to enable organizations to automate and streamline burdensome compliance management process to save time, money, and resources associated with ongoing compliance. With APPROVA, businesses can consistently identify compliance gaps, help justify risk acceptance, prioritize remediation, and react quickly to evolving regulations and overlapping compliance standards.

APPROVA Enterprise Risk Management to provide an integrated approach to managing a broad spectrum of risks across the enterprise. With APPROVA ERM organized to create a central repository for all risks, controls, and remediation.

Client : Commercial Metal Company Ltd. (Texas, USA)

Duration : Feb 2012 to Oct 2012

Designation : Architect – SAP Security

Responsibilities:

Worked as Architect SAP implementation for SAP ECC 6.0 and SAP HR

(2 Implementations)

Designed new SAP Security & Basis strategy for SAP ECC 6.0 and SAP HR for more than 700 roles and solution providing for the technical and functional specifications

Decision making for the roles strategy in the ECC as well as in the SAP HR.

Conduct security Kick-off Meeting and meet with the functional Business Process Owners (BPO) to discuss the SAP authorization concept and explain that security implementation is a cross-application responsibility functional people will know what R/3 transaction codes each job role will require. .

Created Role Strategy Document for the business and IT roles for ECC 6.0 and SAP HR for more than 700 roles.

Designed composite and single roles strategy in the place of old strategies in ECC 6.0 . Designed business roles with Task Based approach for some of the operations to avoid multiple roles changes.

Implemented a strong Security strategy with policy adherence is requisite to manage compliance, minimize risks and to setup a secure and efficient authorization concept with process efficiency and adoption which can be based on organizational structures; business processes and Role based Authorization Concept.

Reviewed the implementation scope and user role report to determine the necessary project team to manage end-user role and authorization profile creation and design

Produced an enterprise-wide role matrix, a document that describes authorizations, detailing roles and their assignments to transactions, reports, menu paths, and organizational levels

Drafted a technical design document of user roles and authorizations, providing the development details for the implementation of the roles

Implemented new strategies for SAP HR environment. Creation of new roles and structural authorizations for the business accesses.

Designed the Reporting Strategy for the HR Business Function.

Designed new HR Security Processes such as assigning of roles to positions, handling issues in portal.

Created HR structural authorizations design to streamline maintenance and user access issues.

Designed, developed, and maintained structural authorizations and standard/derived roles for position-based HR security strategy, driven by complex span-of-control requirements.

Implemented Personnel Administration and Organizational Management (PA and OM) modules of HCM.

Made the HR Security Roles as appropriate and optimum so that the Info Objects can be utilized as much as possible without creating too many Analysis Authorizations.

Optimized the Roles and Analysis Authorization for maintenance purposes.

Used the roles as the medium to assign the analysis authorization objects rather than direct assignment.

Worked in all risk control processes including IT general controls, testing plans, testing execution in an integration testing environment and control remediation.

Extensively worked on management view, risk analysis, audit reports, security reports and background jobs for analyzing the risks in role level.

Client : Dow Chemicals, Philadelphia (USA)

Duration : Nov 2010 to Feb 2012

Designation : Team Lead – SAP Security

Responsibilities:

Worked on the SAP ECC 6.0 EHP2 and SAP BI 7.0 implementation project.

(2 Implementations)

Coordinating with clients business and IT for requirements gathering and discussing the best strategies for SAP Security & Basis designs.

Conduct security Kick-off Meeting and meet with the functional Business Process Owners (BPO) to discuss the SAP authorization concept and explain that security implementation is a cross-application responsibility functional people will know what R/3 transaction codes each job role will require.

Identify General Information Access and Service Usage. Discuss organizational information that will be common to all security roles like company codes, purchasing groups, etc. and have then decide what standard values will be used. Conduct Authorization Interview with Data Owner.

ECC 6.0 and BI 7.0 Global Delivery Considerations

Defining documentation standards, the global delivery team can deliver the process/strategy for changing/enhancing the authorization concept and following user management tasks. The team can do these using predefined templates, such as the following:

• User creation

• Role assignment

• Granting/revoking of authorizations

• Role enhancements

ECC 6.0 and BI 7.0 Role Implementation Framework Prototype

The role implementation framework prototype is a preliminary implementation of the user role and authorization concept. The prototype does not contain organization-level restrictions and serves as a verification of the technical design. The prototype allows for early recognition and correction of mistakes in the design of the user role and authorization concept.

Completely designed and implemented methodology for controlling end user access to plants, fund centers, cost centers, etc. Applied to both R/3 and BW environments. Designed security solution for FI (AR, AP, SD, FA), CO, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules.

Designed process for OSS ID’S, Providing Developer Key’s, Providing Authorizations to OSS ID’S and Object Registration on the SAP MARKET PLACE.

Newly designed BI Security Roles as competitive and effective so that the Info Objects can be utilized as much as possible without creating too many Analysis Authorizations.

Optimized the Roles and Analysis Authorization for maintenance purposes.

Used SAP best practices like setting the following Info Objects as “authorization-relevant” and using them in Analysis Authorizations 0TCAACTVT, 0TCAIPROV, 0TCAVALID.

Maintaining the Users and Authorizations in SAP XI systems.

Maintained Assignment of Authorization Objects (SU24).

Maintained program authorization groups (Report RSCSAUTH) and table authorization groups (SE54) to protect access to programs and tables.

Client : BHP Billiton

Duration : June 2010 to Oct 2010

Designation : Sr. Consultant – SAP Security

Responsibilities:

Worked on the SAP ECC 6.0 EHP2, SAP BI 7.0 and SAP GRC 5.3 implementation project. (2 Implementations)

Coordinating with clients business and IT for requirements gathering and discussing the best strategies for SAP Security & Basis designs.

Conduct security Kick-off Meeting and meet with the functional Business Process Owners (BPO) to discuss the SAP authorization concept and explain that security implementation is a cross-application responsibility functional people will know what R/3 transaction codes each job role will require.

Identify General Information Access and Service Usage. Discuss organizational information that will be common to all security roles like company codes, purchasing groups, etc. and have then decide what standard values will be used. Conduct Authorization Interview with Data Owner.

Creation of the New roles design document for more than 500 roles in the SAP ECC and SAP BI systems.

Designed the ECC and BI roles and new strategies for different business processes.

New role implementation framework prototype is a preliminary implementation of the user role and authorization concept. The prototype does not contain organization-level restrictions and serves as a verification of the technical design. The prototype allows for early recognition and correction of mistakes in the design of the user role and authorization concept.

Completely designed and implemented methodology for controlling end user access to plants,

fund centers, cost centers, etc. Applied to both R/3 and BW environments. Designed security solution for FI (AR, AP, SD, FA), CO, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules.

Designed process for OSS ID’S, Providing Developer Key’s, Providing Authorizations to OSS ID’S and Object Registration on the SAP MARKET PLACE.

Newly designed BI Security Roles as competitive and effective so that the Info Objects can be utilized as much as possible without creating too many Analysis Authorizations.

Worked on implementation of GRC 5.3 compliance Management tool.

Setting up policies for the GRC 5.3 compliance management.

Worked on the GRC 5.3 Audit Management to enable an integrated approach to governance, risk, and compliance (GRC) and allows organizations to effectively leverage from information from other areas of the organization (e.g. policy, compliance, vulnerability data) expedites the data collection and documentation process significantly. Integration capabilities with other enterprise systems (e.g. HR systems, active directory, financial systems) help to shorten the audit cycle dramatically.

GRC 5.3 Compliance Management for SOX to enable organizations to automate and streamline burdensome compliance management process to save time, money, and resources associated with ongoing compliance. With GRC 5.3, businesses can consistently identify compliance gaps, help justify risk acceptance, prioritize remediation, and react quickly to evolving regulations and overlapping compliance standards.

GRC 5.3 Enterprise Risk Management to provide an integrated approach to managing a broad spectrum of risks across the enterprise. With GRC 5.3 ERM organized to create a central repository for all risks, controls, and remediation activities across the enterprise wide. Organizations are able to establish common risk taxonomy, allowing them to aggregate, normalize, and centralize risk across Operations, IT, Legal, Human Resources, and other business units for a truly consolidated view of enterprise risk.

Risk Analytics helps to prioritize enterprise-wide compliance issues. Compliance reports and dashboards turn information into intelligence, allowing you to take action before a compliance breach occurs

Client : Watson Pharmaceutical Ltd (NJ, USA)

Duration : Oct 2008 to June 2010

Designation : Sr. Consultant – SAP Security

Responsibilities:

As a SAP senior most experienced member Successful SAP BASIS & Security activities of SAP in Watson Pharmaceuticals of SAP ECC 6.0 and GRC 5.2.

Daily Performance checklist.

Backups monitoring.

Job Scheduling and Monitoring through SAP and Autosys.

Creating job streams for SAP through Autosys.

SAP ECC Spool Administration.

Handled Support Pack management (SPAM, SAINT)

Maintaining Client for production system.

Worked on MAXRUN project for job monitoring in AUTOSYS.

Recycles and Maintenance of the systems. Bouncing production systems.

Monitoring Production and Test Development systems through HP

Tivoli.

Administered Users, Authorization Data and Authorization Profiles.

Worked on SAP Check Indicator Defaults and Field values, reduced the scope of Authorization checks using transaction SU24 and maintained check indicators for Transaction codes.

Involved in revamping of security spec design, development & testing protocol design

Core team member of Implementation of GRC 5.2 Access Controller with KPIT

Major role in configuration of all GRC Modules AE, RE, CC and FF with ECC 6.0

Working on BW security. Maintaining Roles on the basis of ODS, Data cubes. Connecting BIW system to GRC 5.3

Successful Upgrade for GRC 5.2 To 5.3 and implementation of new GRC functionalities ie. CUP, ERM, SUP, Compliance Calibrator

Working on Risk Analysis and Remedies (RAR) Reports SOD Violations, Critical Actions, Critical Roles by Risk, Critical Roles by Risk, Mitigating Controls by User.

Working on Super User Privilege (Firefighter) Transaction Usage Report, SOD Violations Report, Log Report

Working on User Identity Management (UME) for users administrations

Security Administration and creating users, creating roles, assigning profiles, assigning roles, assigning authorization objects to roles across landscape

Scheduling Backups and Checking the Backup of GRC

Scheduling Background job administration and monitoring in GRC

Setting up and maintenance of the Profile Parameters(Start/Default/Instance)

worked with IT / Internal Audit Department to achieve Sarbanes-Oxley Compliance to overcome SOD issued in SAP ERP System.

Configured Approval process for User and Role creation as per Organizational requirement in GRC server

Strong knowledge of JSPM, SDM, Config tool Visual Admin

Scheduled Managing Report on weekly basis in GRC server

Prepared and maintain Basis related SOPs

Good Experience in handling GRC considering SOD and SOX compliance

Managing Incidence reports

Created SAP Roles, and users in standalone training environment for 19,000 named user base covering R/3 & BW.

Trouble-shoot authorization problems using Repository Information System and tracing authorizations using SU53, SU24 and ST01.

Client : Colgate Palmolive (NJ, USA)

Duration : Dec 2006 to Oct 2008

Designation : Sr. Consultant – SAP Security

Responsibilities:

Working on SAP Security & Basis and authorization admin in 12x7 SAP Production support environment

Worked on Solution manager 4.0. Change Management. Part of solution Manager 4.0 upgrade team. Worked on Normal Corrections Implementation in Colgate.

Daily Performance checklist.

Backups monitoring.

Handled Support Pack management (SPAM, SAINT)

Job Scheduling and Monitoring through SAP and Autosys.

Creating job streams for SAP through Autosys.

SAP ECC Spool Administration.

Maintaining Client for production system.

Worked on Maxrun project for job monitoring in Autosys.

Recycles and Maintenance of the systems. Bouncing production systems.

Monitoring Production and Test Development systems backups through HP Tivoli.

Monitoring Production and Test Development HEALTH CHECKUP on HP Openview

Administered Users, Authorization Data and Authorization Profiles.

Worked on SAP Check Indicator Defaults and Field values, reduced the scope of Authorization checks using transaction SU24 and maintained check indicators for Transaction codes.

Involved in revamping of security spec design, development & testing protocol design.

Worked on Users & Security, including T-Codes like: SU01, PFCG, PFUD, SCAT, SCEM, ST01, SUIM, SUPC, SU24, SU53, and SU56.

Developed authorization profiles for FI, CO, SD, MM in Development, Test and Production environments.

Working on SOX compliance and considering SOD for audit prospective, worked on making Role level and User level violation zero by applying Mitigation control if required in GRC server

(Firefighter) Transaction Usage Report, SOD Violations Report, Log Report

Worked on improving SAP user / Role Management to avoid SOD issues

worked with IT / Internal Audit Department to achieve Sarbanes-Oxley Compliance to overcome SOD issued in SAP ERP System.



Contact this candidate