Sap Business Work Flows by srn18580

VIEWS: 205 PAGES: 8

Sap Business Work Flows document sample

More Info
									Debasish Roy                                                           703 574 3250
Sr.SAP Security (GRC) / Basis Lead consultant                          debgrc@gmail.com

Summary
   Over 17 years of experience in administration and application development including more than 7 years in SAP
     Security and Basis admin.
   Sucessfully completed 5+ full-cycle implementations – Project planning through post go-live support, Upgrades
    and SOX, ASAP implementation methodology expertise
   Responsible for Managing large infrastructural and systems teams .Led by example while assuming
    risk/responsibility.
   Worked very closely with functional teams, BPOs and SME’s from R/3, XI, EP and BI to deliver fully integrated
    seamless solutions.
   Specializes in Upgrades, Large Scale Global Implementation of SAP.
   Extensive SAP Security and BASIS Administration knowledge of SAP R3 Products like ECC 6.0, ECC5.0, SAP R/3
     Enterprise, BI 70, BW 3.5, 3.0, 2.0, EP 70, 60, XI 2.0 and APO 3.0, CRM, GRC 5x, Approva and Sol. Man. 7.0.
   Experience in implementing Enterprise Directory (LDAP) with SSO to SAP ERP (SAP Passport).
   Knowledge of SAP Business Objects security at Object and Data Level.
   Experience in leveraging Versa Access Enforcer and Fire Fighter, Role Expert to enhance SAP Account
     Administration and processes and provide violations and mitigation required for roles and users.
   Extensive knowledge of GRC and SOX Compliance via Virsa CC for SAP and Approva Products (BizRights
    3.5) and worked closely with the External ( KPMG, Y&Y, DT, PWC) and Internal auditors to resolve GRC (SOX) and
    SOD related issues.
   Proficient in use CRM2007 security administration tools as ACE, Business Role, Technical Roles (PFCG)
   Extensive Security knowledge in a R3 Validated Environment and BW. R/3 Role-based authorization (SAP Profile
      Generator tool PFCG) and other method of SAP security including UME (SAP Enterprise Portal)and SAP HR
      (Structural Authorization).
    Created Security strategy and User Account based Policies. BW security, was Role based, created on the user
       base and transactions used by users. Security Process adapted to follow change management process
    I have worked extensively in System Sizing, Landscape, Installation, Client Strategy, Security, CUA, LSMW and
       CATT, STMS, CTO, CCMS, Printer Setup, Performance Tuning, Patch installation (SPAM) and Solution
       Manager (ChaRM).

Skills & Know ledge M at rix
Languages       Databases        Operating Systems                        ERP                            Network

C/C++,        Oracle, Ms-      Unix (HP-UX, AIX, SCO,      ECC 5.0 (WAS 640), SAP R/3 4.7            TCP/IP, IPX/SPX,
SQL,          SQL Server,      SYSTEM – V, Linux),         Ent., 4.6C, 4.5b, 4.0b, BW 3.5            HTTP, UUCP,
PL/SQL,       FoxPro 2.5,      MS-DOS, Windows-            (Content), BW 3.5, APO (SEM),XI           FTP, SMTP,
              Visual FoxPro    95/98/ XP/ NT, Windows      3.0, NW2004. Solution Manager 3.0,        X.400, X.121
              5                Adv. 2000 Server            SAP Compliance Calibrator by Virsa
                                                           (4.0, 5.2). Approva BizRights, Security
                                                           Weaver 2.0

Experience
Client :- EMDIesels (La Grange, IL)               SAP Security Project Lead               Dec. 2008 –Present

      Prepared the project plan for 64 bit migration and SAP R/3 and BI Security Re-Engineering.
      Involved in migrating the SAP and BI landscape from 32 bit to 64 bit (Hardware and Software)
      Involved in day to day Basis and Security support.
      Created document for the existing process and proposed future process.
      Reviewed present T-Code usage (BizRight) and created proposal for new roles.
      Coordinated with offshore about the development and guided them.
      Configured the TMS and PFCG tool after migration.
      Prepared project plan for SAP Security Re-Engineering.
      Installed Approve BizRight ( SOX and SOD) and updated the adaptor for SAP.
      Update Rule book for Approva BizRights (SAP GRC).
      Working closely with the auditors about SOD related activities.
      Conducting extraction of Authorization data from R/3 to BizRights and GRC 5.3 and prepared various reports for
       Auditors in SOD related areas.

                                                                                    Page 1 of 8
      Defined the risk areas in IT (specially in SAP landscape) on the basis of discussion with internal and external
       auditors.
    Created documents for Audit (Sensitive T-Codes/ Reports, Batch Job authorization, User Group maintenance and
       others) and guided the Compliance team and auditor about the technical aspects.
    Configured and installed SAP system to address those SAP risk areas (e.g., password policies, automatic user
       locking for incorrect logon attempts, restricted passwords and so on).
    Installed SAP Router on WAS 6.40 and configured for SAP OSS connection.
    Involved in defining and documenting SAP security process after reviewing the existing.
    Created new roles in R/3 Ent. And BI 7.0 (including Analytical Authorization) and Published Queries, Wordbook,
       Reports via BEx Query Designer and Report Designer.
    Created new business roles in CRM 7.0 and modified existing according to business requirement.
    Resolved SAP Security and GRC related issue through ChaRM in Solution Manager.
Environment: - SAP ECC 6.0, SAP 4.7 (Unicode), BI 7.0, APO, CRM7.0, Windows 2003 Server, ORACLE 10.2.0.2, Approva
                BizRight and SAP GRC 5.3

Client : ABB (Wickliffe, OH)            SAP Security (GRC) Team Lead/ /Architect          August 2008 –Dec. 2008

      Designed the Security landscape for SAP ECC 6.0, BW,BI 70, on the basis of the business requirement.
      Implemented and configured SAP GRC Tools by Virsa 5.2 (CC, AE, FF, RE).
      Created and modified the new Connector for SAP CC and backend SAP systems.
      Assisted in installation of IdM 7.0 (Identity Center database schema, database client libraries, Identity
       Management User Interface, and Identity Management User Interface)
      Worked closely with the SAP Security team to define the processes for SOD (PWC) and SOX (E&Y).
      Ran different reports on USER and ROLE violation with and without exclusion.
      Worked extensively on mitigation controls for SOD related issues.
      Worked with the BPO to translate the SOD conflicts in terms of business and technical aspect.
      Define the business areas which needed to be compliance with SOD and SOX.
      Define the procedure for the Roles and Users to be compliance with SOX.
      Working closely with the Auditors (internal and external) to define new rule for SOX in to Compliance Calibrator
       and modified the SOX rule on the basis of the recommendation by Auditors.
      Defined the procedure for the roles modification and creation of the new roles.
      Defined and documented the design for the new roles in to Authorization field level.
      Developed and executed plan for system health checkup in the SAP Security areas.
      Created new roles for the business (end users and BPOs) and technical team.
      Tested the new and existing roles with SAP Compliance Calibrator to find the exact SOX/SOD violations.
      Working closely with the Auditors, Business Process Owners and Team Leads to resolve the violations.
      Initiated Profile Generator Tool the succeeding steps after installation.
      Conducted workshop for the functional people for SAP security and defined the each functional area for SAP
       security.
      Defined and documented the process flows for Pre and Post GoLive user creation in Production Systems and
       other Non-Production Systems, e.g., DEV, QA, TRN, Sandbox.
      Defined the process flows for SAP Security Role creation and published documents for this purpose.
      Analyzed the requirement of the SAP Security roles for the business processes and created technical documents
       of the roles ( i.e., T-Codes, Auth. Obj. for a role ).
      Assignment of role (activity group) requirements based on job functions and audit control processes.
      Defined the Naming Convention for ROLES, PROFILE, and USER and documented it according to the business
       need.
      Defined the Field values for various Authorization Objects for all the areas of ECC 6.0 (FI, CO, MM, PP, SD, PS)
       and Created new roles in ECC 6.0, CRM, SRM, PLM, MDM and BI 7.0 (including Analytical Authorization
       RSECADMIN).
      Created new business roles in CRM according to business requirement.
      Restricted CRM WebUI on the basis of authorization object.
      Worked extensively on System Trace for both OLTP and OLAP(BW, APO) processing to define the values for
       Authorization Objects.
      Interacted with ABAP Developers to create custom Authorization group, Custom Transaction Codes.
      Recommended on current processes and procedures.
      Review critical and sensitive authorizations, implement improvements to meet audit requirements.
      Helped and coordinated in Security Testing and on documentation in all application areas to define the positive
       and negative testing criteria and published documentation.

                                                                                     Page 2 of 8
    Uploaded and updated the user master record via script (LSMW).
    Implemented security for SAP HR (4.6C) ( structural authorization)
    Provided Implementation and Go-Live support.
    Created new roles in SAP BI 7.0 (Analytical Authorization) and BW.
Environment: - SAP ECC 6.0, BI 7.0, AIX 5.3, ORACLE 10.2.0.2, CRM 7.0, SRM 5.0, IdM 7.0, GTS6.0 (Add On) SAP Virsa GRC
                Tools 5.3 (CC, FF, AE, RE)

Client : Siemens A&E Energy (Alpharetta, GA)             Sr. SAP Security Consultant (GRC)       April 2008 –July 2008

      Worked with the auditors to define the risk areas in IT and SAP.
      Prepared document for those risk areas.
      Configured and installed SAP system to address those SAP risk areas.
      Worked closely with the SAP Security team to define the processes for SOX.
      Ran the full and incremental extraction in Approva BizRights 3.5.
      Ran different reports on USER and ROLE violation with and without exclusion.
      Uploaded the SOX Rule (.zip and .xml format) in to Approva BizRights.
      Define the business areas which needed to be compliance with SOX.
      Define the procedure for the Roles and Users to be compliance with SOX.
      Working closely with the Auditors (internal and external) to define new rule for SOX in to Approva Bizrights 3.5 and
       SAP Security Weaver 2.0.
    Modified the SOX rule on the basis of the recommendation by Auditors.
    Defined the procedure for the roles modification and creation of the new roles.
    Defined and documented the design for the new roles in to Authorization field level.
    Created new roles for the business (end users and BPOs) and technical team.
    Tested the new and existing roles with Approva BizRights to find the exact SOX/SOD violation.
    Working closely with the Auditors, Business Process Owners and Team Leads to resolve the violation.
    Run various reports in BizRights to find the violation trend at the user and role level.
Environment: - SAP 4.7 Ent. (Non-Unicode),Sol. Manager, AIX, ORACLE, Approva BizRights 3.5 (GRC), SecurityWeaver 2.0
                (GRC), Windows 2003 Enterprise Server.

Client : Komatsu (Rowlling Meadows, IL)          SAP Security (GRC) Team Lead            Jan. 2008 –March 2008

       Defined the SAP HR Org. Structure and implemented Structural Authorizationon the Basis of Org on the basis of
        PA and PD.
       Created Organizational Plan, Personal Master Record, Infotype 105 and 1017 for SAP HR Structural Auth.
       Created, modified, assigned roles for Role-based and Structural Auth.
       Installed and configures SAP router for WAS 6.20
       Defined the upgrade processes for roles and authorizations from SAP 4.7 Ent. (non-unicode) to ECC 6.0.
       Upgraded the roles, profiles and authorizations from SAP 4.7 Ent. (non-unicode) to ECC 6.0.
       Defined the Field values for various Authorization Objects for all the areas of ECC 6.0 (FI, CO, MM, PP, SD, PS)
        and Created new roles in ECC 6.0, PLM, CRM 6.0 (2007), SRM and BI 7.0 (including Analytical Authorization
        RSECADMIN).
       Define the business areas which needed to be compliance with SOX.
       Define the procedure for the Roles and Users to be compliance with SOX
       Working closely with the Auditors (internal and external) to define new rule for SOX in to Approva Bizrights.
       Modified the SOX rule on the basis of the recommendation by Auditors (KPMG).
       Defined the procedure for the roles modification and creation of the new roles.
       Created new client (client copy) for the testing of SOX conflict.
       Define the transport strategy for the new roles and for the modified roles.
       Defined and documented the design for the new roles in to Authorization field level.
       Tested the new and existing roles with Approva BizRights to find the exact SOX/SOD violation.
       Working closely with the Auditor (KPMG and Komatsu America Corp.), Business Process Owners and Team Lead
        to resolve the violation.
       Run various reports in BizRights to find the violation trend at the user and role level.

Environment:- SAP 4.7, ECC 6.0 (WAS 640), AIX, DB2, EBP SRM 5.0, Approva BizRights 3.5 (GRC) on Windows 2000 Server,
SAP Virsa CC, FF, RE, AE .




                                                                                       Page 3 of 8
   Client : Arizona Chemical ( Jacksonville, FL)      SAP Security/ Basis Team Lead              Apr. 2007 – Dec 2007

SAP Basis/Security:
    Designed the Security landscape for SAP R/3 4.6C and APO (SCM 4.0) on the basis of the business requirement.
    Redesigned the existing roles and developed the new roles for 4.6 and APO.
    Maintained multi-landscape environment through client copies (local and remote), client refresh
    Conducted workshop for the functional people for SAP security.
    Defined and documented the process flows for Pre and Post Go-Live user creation in Production Systems and
      other Non-Production Systems, e.g., DEV, QA, PRD.
    Defined the process flows for SAP Security Role creation and published documents for this purpose.
    Created SAP Security roles for Auditors from SAP standard roles and modified them according to business need.
    Analyzed the requirement of the SAP Security roles for the business processes and created technical documents
      of the roles ( i.e., T-Codes, Auth. Obj. for a role ).
    Installed and configured SAP Compliance Calibrator 5x suite ( SOD and SOX) )including Firefighter, Access
      Enforcer and Role Expert.
    Implementing Go-Live recommendations, SNOTE, Hotpack applications, Add-on Plugin Installation, Development
      Support, implementing security, transports etc.
    Defined the Naming Convention for ROLES, PROFILE, and USER and documented it according to the business
      need.
    Defined the Field values for various Authorization Objects for all the areas of SAP 4.6C (FI, CO, MM, PP, SD) .
    Worked extensively on System Trace for both OLTP and OLAP processing to define the values for Authorization
      Objects.
    Recommended on current processes and procedures.
    Review critical and sensitive authorizations, implement improvements to meet audit requirements.
    Helped and coordinated in Security Testing and on documentation in all application areas to define the positive
      and negative testing criteria and published documentation.
    Define the password policy including length, expiration and content and maintained the impermissible passwords
      in the table USR40.
    Transporting Security Profiles from DEV, QA, CNV, TRN and PRD.
    Developed security roles for developer and supported developers and end user in Day-to-day.
    Secured the SAP System users like SAP*, DDIC.
    Uploaded and updated the user master record via script (CATT, LSMW).
    Provided Implementation and Go-Live support
    Locking and unlocking the transactions to safeguard against misuse.
    Secured the SAP System users (SAP*, DDIC).
    Worked on Client-administration of Development, Production and Quality System.
    Actively involved in setting procedures for securing ABAP/4 programs and custom table with Authorization Groups,
      transactions and authority check statement.
    Evaluated security authorizations, segregation of duties conflicts and identifying sensitive T-codes and implement
      controls on them and monitoring the audit logs.
    Monitoring of the complete R/3 System, Buffers, Database, Work processes, Instances, Workload.
    SAP standard job scheduling using operation modes.
    Tuned SAP buffers and memory utilization, Tuned database for performance optimization
      Support Package Installation
    TMS Administration and Configuration, Applying OSS Notes.
    Encouraging and enabling knowledge transfer while transition to project Teams.
    Worked closely with the SAP Security team to define the processes for SOX.
    Ran different reports on USER and ROLE violation with and without exclusion.
    Uploaded the SOX Rule in to Compliance CC.
    Define the business areas which needed to be compliance with SOX.
    Define the procedure for the Roles and Users to be compliance with SOX.
    Working closely with the Auditors (internal and external) to define new rule for SOX in to SAP CC and SAP
      Security Weaver 2.0.
    Modified the SOX rule on the basis of the recommendation by Auditors.
    Defined the procedure for the roles modification and creation of the new roles.
    Defined and documented the design for the new roles in to Authorization field level.
    Created new roles for the business (end users and BPOs) and technical team.
                                                                                    Page 4 of 8
       Tested the new and existing roles with Virsa SAP CC to find the exact SOX/SOD violation.
       Working closely with the Auditors, Business Process Owners and Team Leads to resolve the violation.

Environment :- SAP 4.6C ( with 4.6D kernel), BW 3.1, APO (SCM 4.0) Oracle 9.2.0.6.0, AIX, Virsa CC for SAP 4.0.

    Bearingpoint                                      Sr. SAP Consultant
    Client : Johnson & Johnson (Newark, NJ)           Sr. SAP BW Security Consultant           Jan. 2007 – Apr. 2007

SAP Security :
    Defined the Security Landscape for HR and BW structural authorization on the basis of Organization structure.
    Defined the Organizational structure, Authorization Object.
    Defined the SAP HR Org. Structure and implemented Structural Authorizationon the Basis of Org on the basis of
      PA and PD.
    Created Organizational Plan, Personal Master Record, Infotype 105 and 1017 for SAP HR Structural Auth.
    Developed new role and modified the existing role for SAP 4.6C and BW on the basis of Org. structure (SAP HR).
    Maintained SAP Security roles and profiles in heterogeneous landscape (Role based and Structural Auth).
    Defined and implemented the CUA for SAP and BW systems.
    Maintained the User Master record (creation, modification, deletion, locking).
    Implemented Single Sign On to SAP Enterprise Portal using SAP Passport.
    Implementing Go-Live recommendations, SNOTE, Hotpack applications, Add-on Plugin Installation, Development
      Support, implementing security, transports etc.
    Defined the upgrade processes for roles and authorizations from SAP 4.5b to SAP 4.7.
    Upgraded the security related tables (USOBT and USOBX) as a part of security upgrade.
    Conducted SAP Security training for Basis Administrators of Johnson & Johnson.
    Created and maintained document relate to SAP security.
    Maintained the user master records via UME in Enterprise Portal (NW 2004)

    Environment :- SAP 4.6C, BW 3.1 with 3.5 content, HP-UX 64bit, Oracle 9.2.1

    Bearingpoint                             Sr. SAP Consultant
    Client : Mosaic Inc ( Tampa, FL)          SAP Security Team Lead (GRC) /Architect               Jan. 2006 – Dec. 2006

       Configured the XI Landscape in SLD viz. adding all the Systems in the System Landscape browser and creating
        Technical systems for the Web AS ABAP and Web AS JAVA.
       Assigning and creating all the required Business systems for the Technical systems.
       Configured the Software catalog by adding all the necessary Products and their related Software Components.
       Installed and configured SAP XI 3.0 SR1 ( SAP NW ’04 SR1).
       Configured the Exchange profile of XI instance.
       Monitoring Message, Alert, Cache in SAP XI.
       Configuring UME (SAP Enterprise Portal) to connect to LDAP for Authentication.
       Configuring SSO between Portal and backend R/3, BW systems.
       Configuring SSO between WebDynpro and Backend R/3 systems.
       Responsible for providing support to all development and production environments for the SAP system including
        SAP ECC 5.0, BW 3.5, CRM 4.0 and various server components.
       Daily reporting of Preventive Maintenance checklist of production systems.
       Analyze system performance and adjust various tuning parameters to maintain optimum utilization including
        application server load balancing, operation modes, background jobs, and spool management.
       Interact with SAP application teams to analyze proposed changes to SAP technical configuration settings to
        optimize overall performance and Daily system administration.
       Involved in scheduling all SAP Remote Support services including Early watch and GoLive
       Completed successful Client copies, system copies, support pack upgrades, kernel upgrades of R/3, BW systems
        and carried out post-upgrade tasks.
       Designed the Security landscape for SAP R/3 (ECC5.0), XI 3.0 (NW ’04) SEM (BW and APO), EBP SRM, CRM
        5.0 on the basis of the business requirement.
       Initiated Profile Generator Tool the succeeding steps after installation.
       Conducted workshop for the functional people for SAP security.
       Defined the each functional area for SAP security.
       Defined and documented the process flows for Pre and Post Go-Live user creation in Production Systems and
        other Non-Production Systems, e.g., DEV, QA, TRN, Sandbox.
                                                                                          Page 5 of 8
       Defined the process flows for SAP Security Role creation and published documents for this purpose.
       Created SAP Security roles for Auditors from SAP standard roles and modified them according to business need.
       Worked with Auditors to implement the SOD matrix in Virsa Compliance Calibrator.
       Implemented Single Sign On via SAP Enterprise Portal using SAP Cryptographic Library (SAP Passport).
       Implemented LDAP to communicate CUA via SAP Portal.
       Installed, configured and worked on Approva BizRights for mySAP ( 3.5,) to solve SOX related conflict.
       Analyzed the requirement of the SAP Security roles for the business processes and created technical documents
        of the roles ( i.e., T-Codes, Auth. Obj. for a role ).
       Assignment of role (activity group) requirements based on job functions and audit control processes.
       Defined the Naming Convention for ROLES, PROFILE, and USER and documented it according to the business
        need.
       Defined the Field values for various Authorization Objects for all the areas of ECC 5.0 (FI, CO, MM, PP, SD) .
       Worked extensively on System Trace for both OLTP and OLAP processing to define the values for Authorization
        Objects.
       Recommended on current processes and procedures.
       Review critical and sensitive authorizations, implement improvements to meet audit requirements.
       Helped and coordinated in Security Testing and on documentation in all application areas to define the positive
        and negative testing criteria and published documentation.
       Define the password policy including length, expiration and content and maintained the impermissible passwords
        in the table USR40.
       Transporting Security Profiles from DEV, QA, CNV, TRN and PRD.
       Developed security roles for developer and supported developers and end user in Day-to-day.
       Secured the SAP System users like SAP*, DDIC.
       Uploaded and updated the user master record via script (CATT, LSMW).
       Locking and unlocking the transactions to safeguard against misuse.

Environment :- ECC 5.0, SEM ( BW 3.5 with BI , APO), XI 3.0,EP 6.0 (NW 2004), Sol. Manager 3.0, Approva BizRights 3.5 (GRC),
                 Remedy Ticket System.

       Bearingpoint                                  Sr. SAP Consultant
Client : Hospira Inc. ( Lincolnshire, IL)             Sr. SAP Consultant                    Aug. 2005 – Dec. 2005

       Defined the Archival strategy for the unwanted date.
       Created variants for Deletion.
       Deleted date which is not related to Hospira Inc. via archive.
       Implementing Go-Live recommendations, SNOTE, Hot-pack applications, Add-on Plug-in Installation,
        Development Support, implementing security, transports etc.
       Created documents for the process flow in the data archival and deletion.
       Trained the junior Basis administrator.
       Implemented CUA.
       Upgraded Database from Oracle 8.1.2.7 to 9.2.0.5 for BW System.
       Performance Monitoring of Hardware, Application & Database.
       Monitoring the Transport Management system and troubleshooting Transport Management system.
       Implementing Go-Live recommendations, SNOTE, Hotpack applications, Add-on Plugin Installation, Development
        Support, implementing security, transports etc.
       Provided Implementation and Go-Live support

   SBM Group                          Sr. SAP Basis Consultant
    Client : Johnson Controls Inc     SAP Security (GRC) Team Lead                     May 2004 – July 2005
SAP Security: SAP 4.7 Ent (Non-Unicode), BW 3.1, APO, SRM, HP-UNIX, Oracle 9x, Virsa CC for SAP 4.0 (GRC), FF
4.0
     Designed the Security landscape for SAP R/3 (4.7 Ent,), BW, EBP SRM on the basis of the business requirement.
     Initiated Profile Generator Tool the succeeding steps after installation.
     Conducted workshop for the functional people and functional areas for SAP security .
     Defined and documented the process flows for Pre and Post GoLive user creation in Production Systems and
        other Non-Production Systems, e.g., DEV, QA, TRN, Sandbox.
     Defined the process flows for SAP Security Role creation and published documents for this purpose.
     Worked with Auditors to implement the SOD matrix in Virsa Compliance Calibrator.
     Installed and worked on SAP Compliance Calibrator by Virsa ( 4.0 ) to solve SOX related conflict.
                                                                                        Page 6 of 8
       Analyzed the requirement of the SAP Security roles for the business processes and created technical documents
        of the roles ( i.e., T-Codes, Auth. Obj. for a role ).
       Installed configured the SAP Router.
       Assignment of role (activity group) requirements based on job functions and audit control processes.
       Defined the Naming Convention for ROLES, PROFILE, and USER and documented it according to the business
        need.
       Defined the Field values for various Authorization Objects for all the areas of SAP Ent. 4.7 (FI, CO, MM, PP, SD),
        BW, APO, EBP SRM .
       Worked extensively on System Trace for both OLTP and OLAP processing to define the values for Authorization
        Objects.
       Interacted with ABAP Developers to create custom Authorization group, Custom Transaction Codes.
       Evaluated Central User Administration (CUA) functionality and feasibility.
       Reviewed and established CUA settings on field level for SU01.
       Recommended on current processes and procedures.
       Review critical and sensitive authorizations, implement improvements to meet audit requirements.
       Helped and coordinated in Security Testing and on documentation in all application areas to define the positive
        and negative testing criteria and published documentation.
       Define the password policy including length, expiration and content and maintained the impermissible passwords
        in the table USR40.
       Uploaded and updated the user master record via script (CATT, LSMW).
       Implemented security for SAP HR (4.6C) ( structural authorization)
       Locking and unlocking the transactions to safeguard against misuse.
       Secured the SAP System users (SAP*, DDIC).

 Halcyon Soln., Columbus, O H                  SAP Basis / Security Consultant      Mar. ‘03 – April ‘04
SAP BASIS
     Responsible for providing support to all development and production environments for the SAP system including
      SAP SAP4.6C, BW2.0 and various server components.
     Daily reporting of Preventive Maintenance checklist of production systems.
     Implemented SAP HR Structural Authorization on the basis of PD objects.
     Created, modified roles for SAP (MM, PP, FI, CO, HR, SD, BW).
     Analyzed system performance and adjust various tuning parameters to maintain optimum utilization including
      application server load balancing, operation modes, background jobs, and spool management.
     Client Administration to me the requirement of the implementation.
     Interacted with SAP application teams to analyze proposed changes to SAP technical configuration settings to
      optimize overall performance and Daily system administration..
     Involved in scheduling all SAP Remote Support services including Early watch and GoLive
     Completed successful Client copies, system copies, support pack upgrades, kernel upgrades of R/3, BW systems
      and carried out post-upgrade tasks.
     Upgraded Database from Oracle 8.1.2.7 to 9.2.0.5
     Performed installation, configuration, performance analysis and maintenance of SAP 4.6C, and Oracle.
     Checked for patches, installation and administration of patches by SPAM.
     Involved in upgrade and maintenance of BW from 2.1C to 3.0B.
     Reorganized database table/Index/ table space and Network reconfigure.
     Worked on maintenance and performance analysis of Oracle Database 8.1.7.4. Managing database table extents
      and data files (SAPDBA), executed database reorganization.
       Scheduled background job, analyzed jobs to be scheduled and error logs.
       Reduced System down time, Profile Management – RZ10
       Worked on weekly User’s SAP Systems / Memory usage reviews, identifying processing and/or memory abnormal
        usage. Discussed with corresponding developer/consultant for fine-tuning.
       Analyzed Exclusive lock waits and monitored back up logs.

   DGTraders & Engineers, Calcutta, INDIA         Database Application Developer/         Jan. 1997 – March 2003
                                                   SAP Basis Administrator
Oracle 7.3 with D2K
    Maintained databases of the customers, materials inflow/outflow.
    Designed and developed software for office applications.
    Designed and developed software for the suppliers.

                                                                                       Page 7 of 8
      Provided customer support.
      Supervised trouble shooting of the systems.

 Datapro Information Technology Limited, India         Network Administrator              Jan. 1996 – Jan. 1997
UNIX & Networking
    Developed UNIX shell scripts for Network Management.
    Administered LAN and WAN and performed nodal activities in the communication protocol according to X.400,
       TCP/IP.
    Performed system administration of UNIX servers and maintained connectivity of GEMS 400
    Conducted integrated system testing for faults detection and analysis (e.g., loss of packet during communication).
    Installed and supported Oracle 7.3.2, data file configuration and tuning.
    Performed OS level backup in tape.
    Installed, upgraded & maintained network. Conducted troubleshooting & resolved problems with network issues on
       IBM & H/W interface on network.
    Proficient in setting up TCP/IP networks & configuration of various services NFS, LDAP, and DNS, DHCP.
    Checking & repairing file systems whenever required.

Education
     Bachelor of Science from Calcutta University, INDIA.
     Diploma in Mechanical Engineering, INDIA.
     Honors Diploma in Software Technology and Management (NIIT), INDIA
     Certificate on ORACLE 7.1 with Developer - 2000 for Client Server Application.




                                                                                    Page 8 of 8

								
To top