Sree Naga Pravallika
**********.*.*.*@*****.***
Professional Summary:
Leverage 11+ years of expertise as a seasoned SAP Security Consultant, specializing in safeguarding critical systems and data.
Unlocked the power of techno-functional skills gained over the course of an extensive IT career to comprehend client requirements, streamline business processes, and deliver tailored solutions.
Exceptional communication, consulting, and client relationship abilities ensure seamless collaboration and customer satisfaction. Ability to work with limited supervision and exhibit a strong sense of urgency.
Extensive experience in ERP, specifically S/4 HANA, ECC, CRM, BW/BOBJ, BODS, Solution Manager, GRC, Fiori, HANA Database, and SAP JAVA Systems (Portal and ADS). spanning implementation, enhancement, post-production support, and maintenance projects across diverse environments.
Provided ongoing support and troubleshooting for BRIM-related issues, maintaining a [percentage] uptime for the billing system.
customized and configured SAP BRIM modules, including SAP CC and SAP CI, to meet specific client requirements, enhancing billing accuracy by [percentage].
Profound understanding of SAP Authorization, SAP Best practices, Documentation, Audit upgrades across multiple modules of S/4 Hana, ensuring secure access and compliance.
Expertise in Security Risk Control, Audit Remediation, and HR Authorizations, effectively mitigating potential vulnerabilities.
Analysed GRC SOD Risks in close partnership with control teams, proactively addressing compliance challenges.
In-depth knowledge of Business Processes, Technical design, Blueprint, Analysis within SAP CRM/SRM/HCM/EWM/FI/CO/PP/SD/QM/HR and GRC modules, ensuring audit compliance, audit upgrades, mitigations, and risk-free operations.
Proficient in analysing and resolving SOD issues using GRC 10.0/10.1/12.0 Access control tools, such as ARA, EAM, BRM, and ARA.
Successfully configure GRC Access control 12.0 components, ensuring comprehensive security and compliance measures.
Expertise in integrating BTP with SAC and S/4 Hana, unlocking the full potential of these powerful platforms.
Troubleshooted Fiori application authorizations and access issues, leveraging extensive knowledge of Fiori, HANA, and S/4 HANA Security.
Delivered outstanding end-user support for SAP modules (FI/CO/SD/MM/PP/PM
/QM/WM/EWM), ensuring high customer satisfaction and seamless operations.
Proficient in utilizing data uploading tools like LSMW, LTMC, and LTMOM for efficient and accurate data management.
Expertise in GRC activities, including FFID maintenance, analytical reporting, risk mitigation through control IDs, and role and user-level simulation and analysis, ensuring a secure environment.
Resolve authorization issues in collaboration with functional teams, ensuring smooth system operations.
Excel in stakeholder management and possess technical leadership skills, offering valuable project management expertise for successful implementations.
Sap R/3 Security Skills:
Streamline user administration processes by efficiently managing user login IDs, password assignments and resets, as well as user lock and unlock activities.
Harness the power of Profile Generator (PFCG) to create tailored roles, including single, composite, and derived roles, while ensuring seamless deletion and modification of roles to meet specific business needs.
Conducted comprehensive security activities, such as reconciling user master records and roles through tools like PFUD, SUPC, and pfcg_time_dependency reports, ensuring accurate and up-to-date security configurations.
Maintained Authorization objects using SU24, guaranteeing precise and controlled access to system resources.
Safeguard against unauthorized table access by leveraging transaction SE54 and s_tabu_dis authorization object, effectively protecting sensitive data and maintaining data integrity.
Streamline user master data management by implementing mass changes using SU10, ensuring efficient and accurate updates across user profiles.
Proficiently navigate security-related tables like AGR* and USR*, leveraging valuable insights for enhanced security configurations.
Identified missing authorization objects through SU53 and ST01, providing proactive resolution and recommending appropriate roles for end users.
Personalized user authorizations by assigning missing authorizations based on individual user requirements, ensuring optimized system access and a seamless user experience.
EP,GRC & S/4 HANA,FIORI SECURITY:
Expertise in user administration activities in Enterprise Portal to process requests such as user creation and assigning Roles and resetting passwords, Lock/Unlock and other day-to-day operations relevant to the user administration.
I have extensively worked on GRC modules such as ARA, ARM, SOX, BRM, BRF, EAM
Successfully configured parameters in MSMP Workflow
Debugging (Logs/Trace) for the missing authorizations in SAP HANA
Deep understanding of S/4 HANA landscape, Database role and Privilege structure in SAP HANA
Worked with the LDAP group to maintain portal security on Java and ADS
I have been working on GRC like FFID maintenances, pulling analytical reports
Applying Control ids to unmitigated risks in GRC & performing role level, user level simulation/risk analysis and Access provisioning to users though GRC.
Maintaining Role Owners and Approvers for Roles in GRC.
Experience in Data migration, Data cleansing and uploading data in Sap using LSMW, BAPI’s, BDC recordings, Win shuttle, Process Runner and Data Sure.
Good knowledge of Fiori, HANA and S/4 HANA Security
Worked on Fiori user Role provisioning strategy and maintenance.
Create Fiori Front end roles, backend roles and Privileges.
TECHNICHAL SKILLS:
Skill Category
Skills
SAP Retail/BI Analytics
SAP BI 7.4, SAP BO 4.0, BO 4.1
ERP Applications
SAP R/3, ECC6.0, ECC5.0,4.7, S/4 Hana, ERP 2005
SAP Modules
SAP HR, CRM, SRM, SCM, Oracle DB,
SAP NetWeaver(JAVA) 7.0, GRC 10.0,12.0,Sap Solution Manager
Non-SAP System
MDM, Oracle, HANA
Middle Ware tool
SSIS, SAP BODS
Operating System
Windows 2003 &2008, AIX
Data Bases
Oracle, SQL
Professional Experience:
Client: IBM Feb’24 – till date
Project: TRUIST BANK
Role: Sr. SAP Security and grc consultant
Responsibilities:
Tailored and optimized user roles for your business needs with our expertise in creating and modifying Single, Composite, and Derived roles.
Resolved complex security issues across various SAP landscapes (ECC, Portal, GRC, Fiori, S/4 HANA, SAC) by troubleshooting user roles, security objects, and authorizations, ensuring seamless operations.
Identified missing authorizations and recommend appropriate roles for end users using advanced tools like SU53 and ST01, guaranteeing efficient and compliant access control.
HandleD S/4, BW/4 HANA and ON HANA migrations.
User Access Management: Manage user accounts, roles, and authorizations in the SAP BRIM environment. This includes creating, modifying, and deleting user accounts, as well as assigning appropriate roles and permissions.
Role Design and Maintenance: Design and maintain security roles specific to SAP BRIM modules, such as Convergent Charging (CC), Convergent Invoicing (CI), and Subscription Order Management (SOM).
Delivered compelling project presentations to customers, providing comprehensive solutions for complex situations and addressing customer needs.
Manage changes to the project scope, schedule, and costs.
Perform risk management and implement mitigation plans.
Ensure quality standards are met.
Conduct project evaluations and document lessons learned.
Close project contracts and complete necessary
Collaborate with other team members to achieve project goals.
Ensure quality and timely completion of their specific work components.
Foster effective communication with clients, actively troubleshooting issues through direct interaction, ensuring high client satisfaction. Created training materials and may assist with user orientation and training.
Streamline access control processes in GRC by maintaining role owners and approvers, ensuring a robust and compliant security framework.
Conducted comprehensive role-level and user-level simulation and risk analysis, proactively mitigating potential risks and ensuring a secure environment.
Redesigned and developed roles, delivering optimized role configurations for testing and validation in the Quality environment.
Reviewed SM20 Audit logs in emergency access scenarios, ensuring proper control and monitoring of critical system activities, Handled Audit activities related to Production System
Unlocked the full potential of Fiori by creating both front-end and back-end roles and privileges, aligning system access with business requirements and enhancing user experience.
Seamlessly transport composite and single roles using Charm in Solution Manager ensuring efficient and reliable role deployment across system landscapes.
Configured User ID’s using CUA by enabling Single sign on(SSO) using GRC
Client: TCS Oct’22 -Jan’24
Project: Dupont, U.S. A
Role: Sr. SAP Security consultant
Responsibilities:
Unlocked the power of SAP GRC (Governance, Risk & Compliance) Access Controls 12.0 with our expert configuration of rulesets, parameters, mitigation owners, and controllers in ARA and EAM, ensuring comprehensive risk management and compliance.
Seamlessly administer user maintenance and role maintenance, providing a robust foundation for secure and efficient access control in SAP landscapes (ECC, Portal, GRC).
Segregation of Duties (SoD): Ensure proper segregation of duties to prevent conflicts of interest within the system. Regularly review and mitigate SoD conflicts through role adjustments and access reviews.
Expertise in handling audits and working with compliance, internal and external auditors.
Resolved complex security issues by troubleshooting existing user roles, security objects, and authorizations, ensuring a seamless and secure SAP environment
Developed detailed project plans, schedules, and budgets.
Identify resource requirements and allocate resources.
Establish communication plans.
Drived efficient access control processes through GRC CUP Requests, enabling streamlined new user creation and access provisioning based on proper approvals.
Verified rules against known cases and create new test cases to ensure accurate and comprehensive risk management in GRC.
Implemented innovative methods to manage SOD (Segregation of Duties) risks, minimizing the number of mitigation controls and ensuring efficient and compliant access control.
Conducted comprehensive role-level and user-level simulation and risk analysis, proactively mitigating potential risks and ensuring a secure environment.
Redesigned and developed roles, delivering optimized role configurations for testing and validation in the Quality environment.
Client: HCL Technologies Mar’21 – Sep’22
Project: ERICSSON, U.S. A
Role: Sr. SAP Security consultant
Responsibilities:
Tailored and optimized user roles for your business needs with our expertise in creating and modifying Single, Composite, and Derived roles.
Resolved complex security issues across various SAP landscapes (ECC, Portal, GRC, Fiori, S/4 HANA, SAC) by troubleshooting user roles, security objects, and authorizations, ensuring seamless operations.
Identified missing authorizations and recommend appropriate roles for end users using advanced tools like SU53 and ST01, guaranteeing efficient and compliant access control.
Leveraged our SAP Presales capabilities and client mentoring services to gain valuable insights and drive successful project outcomes.
Delivered compelling project presentations to customers, providing comprehensive solutions for complex situations and addressing customer needs.
Lead and manage the project team.
Implement project plans and monitor progress.
Ensure project tasks are completed on time and within budget.
Communicate with stakeholders and manage expectations.
Track project performance using appropriate tools and techniques.
Foster effective communication with clients, actively troubleshooting issues through direct interaction, ensuring high client satisfaction.
Streamline access control processes in GRC by maintaining role owners and approvers, ensuring a robust and compliant security framework.
Conducted comprehensive role-level and user-level simulation and risk analysis, proactively mitigating potential risks and ensuring a secure environment.
Redesigned and developed roles, delivering optimized role configurations for testing and validation in the Quality environment.
Unlocked the full potential of Fiori by creating both front-end and back-end roles and privileges, aligning system access with business requirements and enhancing user experience.
Seamlessly transport composite and single roles using Charm, ensuring efficient and reliable role deployment across system landscapes.
Established clear role-to-business role owner matrices, facilitating effective coordination with business point of contacts and ensuring streamlined approval processes.
Monitored SOD conflicts at both user and role levels, proactively addressing compliance concerns and maintaining a secure and compliant system environment.
Provided timely support for SAP incidents, service requests, and access-related issues, ensuring high availability and resolution of production security and GRC matters.
Designed and authorized HANA roles for developers, modelers, database administrators, and end users, guaranteeing secure and controlled access to SAP HANA resources.
Maintained Authorization objects using SU24, ensuring precise and controlled access to system resources in SAP HANA.
Streamline user ID and role creation processes in SAP HANA, enabling efficient user provisioning and optimized security configurations.
Utilized advanced debugging techniques, such as logs and traces, to identify missing authorizations in SAP HANA, ensuring robust security measures and optimized system access.
Leveraged our expertise in security-related tables like AGR_TCODES, AGR_USERS, and AGR_DEFINE, ensuring comprehensive security configurations and streamlined access control.
Client: Srivil Solutions Pvt Ltd Apr ’20 – Mar’21
Project: DIGICOMM, India
Role: Sr. SAP Security consultant
Responsibilities:
Unlocked the power of SAP GRC (Governance, Risk & Compliance) Access Controls 10.0 with our expert configuration of rulesets, parameters, mitigation owners, and controllers in ARA and EAM, ensuring comprehensive risk management and compliance.
Seamlessly administer user maintenance and role maintenance, providing a robust foundation for secure and efficient access control in SAP landscapes (ECC, Portal, GRC).
Resolved complex security issues by troubleshooting existing user roles, security objects, and authorizations, ensuring a seamless and secure SAP environment.
Leveraged our SAP Presales expertise to guide and mentor clients, providing valuable insights and driving successful project outcomes.
Delivered compelling project presentations, defining solutions for complex situations and responding to RFPs, ensuring alignment with customer needs and driving project success.
Foster effective communication with clients, actively troubleshooting issues and providing personalized support, ensuring high client satisfaction and smooth operations.
Streamline the role transport process by efficiently transporting composite and single roles using Charm, ensuring reliable and efficient role deployment across system landscapes.
Drived efficient access control processes through GRC CUP Requests, enabling streamlined new user creation and access provisioning based on proper approvals.
Verified rules against known cases and create new test cases to ensure accurate and comprehensive risk management in GRC.
Implemented innovative methods to manage SOD (Segregation of Duties) risks, minimizing the number of mitigation controls and ensuring efficient and compliant access control.
Seamlessly manage user administration tasks, including user creation, deletion, lock/unlock, and password resets, as well as mass user creation and password resets, ensuring streamlined and secure user management.
Optimized role administration by performing role assignments, maintenance (including single, composite, and derived roles), modifications, and transaction management, enabling efficient and controlled access.
Strategically manage Fiori user roles, provisioning and maintaining roles to optimize system access and ensure an intuitive user experience.
Created Fiori front-end roles, back-end roles, and privileges, aligning system access with business requirements and enhancing user productivity.
Leveraged our extensive expertise in Profile Generator (PFCG) to efficiently configure and manage role profiles, ensuring precise and controlled access to system resources.
Streamline Fiori catalogs and troubleshoot Fiori tile apps, enhancing the usability and functionality of your Fiori environment.
Conducted comprehensive analysis of trace files using ST01, tracking missing authorizations and resolving user access problems efficiently, ensuring optimized system access.
Identified missing authorizations using SU53 and manually maintain them in PFCG, guaranteeing accurate and controlled access to system resources.
Ensured compliance with Segregation of Duties (SOD) requirements by providing authorizations based on SOD matrix, ensuring a secure and compliant system environment.
Reviewed SM20 logs in emergency access scenarios, ensuring proper control and monitoring of critical system activities.
Effectively utilize security-related tables (AGR*, USR*, etc.) to streamline and optimize security configurations, guaranteeing comprehensive access control.
Expertly handle system security setup following system refreshes, ensuring a secure and compliant system environment.
Leveraged our expertise in authorizations for BI/CRM/HANA and Fiori systems, ensuring optimized system access and enhanced user experience.
Client: IBM India Pvt Ltd Dec’15– Oct’18
Project: SUNCOREnergyINC (Canada)
Role: SAP Security and GRC Lead
Responsibilities:
Efficiently created and maintained individual Users in Central User Administration (CUA) using SU01, ensuring streamlined user management and access control.
Seamlessly perform mass and individual user creation, deletion, locking, unlocking, password changes, and role assignments, enhancing user productivity and security.
Leveraged our expertise in Presales to provide valuable insights and guidance, ensuring optimal SAP solutions aligned with your business needs.
Streamline role assignments based on positions through GRC using PO13D, enabling efficient and controlled access management.
Taken leadership responsibilities as a team lead, supporting the development of team members and contributing to their growth under the guidance of line managers.
Maintained Role Owners and Approvers for Roles in GRC, ensuring proper governance and accountability in access management.
Performed comprehensive role-level and user-level simulations and risk analyses, mitigating potential risks and ensuring a secure and compliant system environment.
Efficiently create, maintain, and modify Single, Derived, and Composite roles, tailoring system access to meet specific business requirements and optimizing user experience.
Leveraged our extensive experience with the CHARM tool to facilitate seamless transport request (TR) creation and transport management between clients and systems.
Expertise in handling audits and working with compliance, internal and external auditors
Resolved security-related issues by troubleshooting existing user roles, security objects, and authorizations across various SAP landscapes (ECC, Portal, GRC), ensuring a secure and reliable system environment.
Streamline the role transport process for composite and single roles using CHARM, ensuring efficient and error-free role deployment across system landscapes.
Developed, tested, and implemented SAP Security Roles, Profiles, and Authorizations for various landscapes using Profile Generator, aligning system access with business requirements and compliance standards.
Created robust SAP technical roles based on business requirements, ensuring accurate and controlled access to system resources and enhancing overall system security.
Generated comprehensive reports, including User lists, Role lists, and Profile lists, using tools like SUIM and SQVI, providing valuable insights for auditing and access control purposes.
Analyzed end user authorization issues using error screenshots from SU53 or trace tools like ST01 and STAUTHTRACE, resolving issues promptly and ensuring optimized user access.
Facilitated the deletion of roles in production systems through transports from development systems, ensuring proper control and compliance with change management processes.
Maintained rule sets in GRC by adding custom transactions/actions to functions/risks and apply control IDs to unmitigated risks, following governance recommendations and approvals.
Utilized SAP Security and audit logging tools such as SM20, SM19, and SECR to set up security audit parameters, define filter groups, and enable comprehensive logging of changes to user master records, profiles, and authorizations.
Seamlessly upload roles in the portal and perform mass upload/download of roles in SAP systems, simplifying and accelerating role management processes.
Efficiently monitor team mailboxes, ensuring prompt response to inquiries and requests, and maintaining smooth communication channels within the team.
Client: IBM India Pvt Ltd Feb’13 – Nov’15
Project: ERICSSON, Sweden
Role: SAP Security consultant
Responsibilities:
Designed and modified Single, Composite, and Derived roles to precisely match your unique business requirements. Our role management expertise ensures efficient access control and compliance.
Benefit from our daily support for SAP R/3, BW, and HR security. We handle ID requests, access requirements, and troubleshooting, while diligently defining and maintaining authorizations and roles to maintain a secure and optimized system.
We adhere to Ericsson's SOX AUDIT COMPLIANCE GUIDELINES, providing Quality Assurance through meticulous analysis and resolution of user problems. Our team efficiently dispatches requests to the appropriate resolver groups, ensuring compliance and process integrity.
Our services include mass creation and deletion of users using BDC upload, along with efficient handling of your team mailbox. We support Drop-related activities, enhancing user administration processes for smooth operations.
Simplified the role request process by making roles orderable in Gordon, an Ericsson-specific tool designed to streamline SAP role requests. We optimize role provisioning and ensure seamless access management.
Counted on us for all aspects of user maintenance, including creating new users, password resets, user lock/unlock, and setting validity dates. We ensure that user access aligns with your business needs and security requirements.
We facilitated the addition and removal of transaction codes, authorizations, and authorization objects within existing roles, responding promptly to change requests. Stay agile and maintain up-to-date access controls.
Our experts excel in maintaining authorization objects using SU24 and providing structural authorization through PD profiles in PO13. We efficiently assign roles to positions using transaction PO13 and execute RHPROFL0 as needed.
Leveraged our deep knowledge of SAP HR Security, including position-based security, structural profiles, and organization structures. We specialize in PA, PD, Payroll, Time, ESS, and MSS Modules, ensuring a comprehensive approach to HR security.
We utilized tools such as SU53 and ST01 to trace missing authorizations and recommend appropriate roles to end users. Our focus is on resolving authorization issues promptly, ensuring smooth and secure system access.
We bring valuable insights to SAP Presales activities, providing guidance and mentoring to clients. Our expertise in delivering impressive project presentations, defining solutions for complex situations, and crafting compelling RFP responses adds significant value to your organization.
We prioritized proactive and clear communication with clients, ensuring efficient troubleshooting and issue resolution. We actively engage with clients, delivering personalized support and fostering high client satisfaction.
Our team has extensive experience working with security-related tables, including AGR_TCODES, AGR_USERS, AGR_DEFINE, and more. We also specialize in maintaining authorization object S_TABU_DIS and working with BI objects such as S_RS_COMP, S_RS_COMP1, and S_RS_AUTH.
We possessed the knowledge and skills to create Analysis Authorizations through RSECADMIN, granting query-level access to reporting users while ensuring precise and controlled data access.
Leveraging the SPM tool, we provide emergency access to functional, technical, and audit teams when needed, ensuring smooth operations and adherence to security protocols.
Our experts proactively monitored Segregation of Duties (SOD) conflicts at both the user and role levels, minimizing risks and ensuring compliance with regulatory requirements.
Rely on our proficiency in performing transports.
Client: IBM India Pvt Ltd May’12 – Jan’13
Project: TATAMOTORS
Role: SAP Security Consultant
Responsibilities:
handled all aspects of user administration, from creation and deletion to ongoing administration and monitoring. With our expertise, you can ensure that user accounts are accurately maintained and aligned with your business requirements.
Specialized in creating single roles and composite roles tailored to your specific needs. Our team maintains and generates authorization profiles, ensuring that access privileges are precisely defined and controlled.
Having extensive experience in maintaining SOD compliance. By carefully aligning authorizations with SOD matrices and resolving conflicts at both the transaction and authorization object levels, we help you achieve a secure and compliant system.
Leveraging tools such as SU53 and ST01 trace, we swiftly analyze authorization problems and errors. Our team implements effective solutions, ensuring that users have the appropriate authorizations to perform their tasks.
Provided comprehensive authorization support across various areas, including R/3, HR, BW, Portal, BOBJ, and SRM. Whatever your SAP landscape, we have the expertise to optimize authorization controls.
Our team leverages tools such as SUIM and SQVI to generate insightful reports, empowering you with valuable dimensional insights. Additionally, we seamlessly assign LDAP groups to users, enabling smooth portal link integration.
Proficiency in tools like SU01 and SU10, we perform user administration tasks with precision and efficiency. From creating and changing accounts to maintaining and deleting them, we ensure your user accounts are accurately managed.
Experts excel in analyzing trace files and identifying missed authorizations to resolve user access problems promptly. We insert missing authorizations manually, ensuring users have the necessary access to perform their tasks effectively.
Leveraged SE01, SE10, and SE09 to efficiently manage mass transports. Our team ensures smooth and reliable transportation of roles, minimizing disruptions and maintaining system integrity.
Prioritized meeting your contractual SLAs, providing timely ticket resolution with a strong focus on quality and peer review. Our goal is to deliver zero-defect solutions, ensuring smooth operations and maximum customer satisfaction.
Role: Sr SAP Security Consultant
Responsibilities:
Successfully implemented Advanced Risk Assessment (ARA) and Enterprise Access Management (EAM) on the Iberian system following the merger of Coke Europe.
Streamlined approval processes and log review processing using efficient workflows, ensuring smooth operations and compliance.
Enhanced the Global rule set by updating custom rules, enabling comprehensive coverage and improved security.
Conducted periodic report extractions and collaborated with Internal Auditors to review and address nearly 100k high/medium violations in the newly merged Iberian system, ensuring successful audit clearance.
Leveraged Bizright's cutting-edge tools to significantly reduce violations and proactively updated rule sets to align with evolving compliance requirements.
Collaborated closely with the IDM team to seamlessly migrate 25,000 users from the RBSR (Legacy System SRDB) to the SAP IDM system, ensuring minimal disruption and streamlined user management.
Successfully completed xMII system upgrades for 18 plants, implementing LDAP connection between xMII systems and Active Directory (AD) to automate user setup and improve efficiency.
Efficiently exported roles from the old xMII system and seamlessly imported them into the upgraded new xMII system, ensuring a smooth transition and consistent access controls.
Verified and validated role assignments to users, ensuring a seamless transition from the old xMII system to the new system while maintaining continuity.
Demonstrated strong leadership skills by spearheading multiple release projects (50+) across ECC, ECC(PM), BI, EWM, xMII, and APO systems, delivering successful outcomes and driving business growth.
Collaborated closely with Subject Matter Experts (SMEs) to gather and analyze requirements, ensuring alignment with business objectives and delivering tailored solutions.
Developed SAP role structures that comply with industry standards and adhere to the architecture of