Anil Kumar N. - SAP Security

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Anil Kumar N.

SAP GRC Security Consultant


Mobile: +91 7799334233
E-Mail ID: anil4ever30@gmail.com

Professional Summary:

 Having over 4+ Years of experience as SAP Security & GRC Consultant.


 Experience in multiple Security environment like SAP R/3, ECC, BI 7.0 and 10.1 Systems.
 Worked extensively on ECC Security by using transactions like SUIM, PFCG, SU10, SU24, SU01 etc...
 Maintained SAP security in terms of creating (users, profiles & roles), assigning (profiles, roles, authorization) to users
using Profile Generator [PFCG].
 User Management involving Managing User Master Record creating user, User groups, locking and unlocking user and
assigning authorization groups and roles based on service request approval.
 Analyzing authorization checks & performance troubleshooting on Security problems by using SU53 and ST01.
 Working with tables like AGR*, USR* and Restricting tables through authorization groups using SE54 transaction.
 Close proximity and ability to maintain excellent rapport, communicating with the clients.
 Worked extensively on BI Security by creating Analysis Authorizations using RSECADMIN, running the reports for
different users through RSECADMIN.
 Worked on Central User Administration (CUA)
 Maintained Client Level Settings for Production System.

GRC AC 10.1 Skills:

 SPRO configurations for Access control.


 Experience in working with Support and Implementation Projects.
 Analyzing& Remediating SOD violations against the various Risks. Determining and report if any risks will be introduced
by simulating the addition of transactions, Roles, or Profiles to a User ID.
 Define Risks through ARA (RAR).
 Maintenance of Rule Set, Function ID & Risk ID with Risk Owners and generated rules
 Creation of Mitigation Approvers & Monitors and created mitigating IDs
 Configuration of number ranges and activated for access request and mitigating requests
 Generation of MSMP Rule for Process, defined Business Rule Framework through BRF+, Mapped BRF+ application with
MSMP workflow and defined request types for Process IDs
 Importing of Roles into BRM using Template
 Replacing Role Owners, FFID Owners, Controllers, Risk Owners using Mass maintenance Tools.
 Troubleshooting Access Requests Related Requests and Re-routing when needed.
 Configuration of PSS, EUL, Simplified Access Request and Template Management
 Monitoring of Invalid Mitigation Controls

ECC 6.0 Skills:

 User administration like creating, modifying and password resetting based on request.
 Role Modification, change, (single roles, composite roles, derived roles).
 Mass Users Maintenance for the business convenience.
 Resetting Passwords for users and intimating password policy.
 Assigned roles to users as per approvals.
 Analyzing User Information System using SUIM.
 Addition, Removal of Transaction Codes, authorizations, authorization objects by modifying existing roles based upon
change request.
 Performed Transportation of newly created roles/ modified roles.
 Performed User comparison in PFCG.
 Analyzing missing authorizations based on screen shot sent by the user.

Academic Qualifications:

 B.Tech., in Electronics and Communication Engineering from JNTU Anantapur in the year 2012.

Experience Summary: -
 Currently working with Softtek India pvt ltd as a SAP Security & GRC Consultant.

Professional Experience:

Client : Restaurant Brands International [RBI]


Environment : ECC 6.0 Security, GRC AC 10.1
Duration : Sep 2016 to till – Date
Role : SAP Security & GRC Consultant

Client Description: Restaurant Brands International is a Canadian multinational fast food company. Formed by the $12.5 billion
merger between American fast food restaurant chains Burger King and the Canadian coffee shop and restaurant chain Tim
Hortons, the company is the third-largest operator of fast food restaurants in the world.

Roles & Responsibilities:

 Role Administration-Creation of Single, Parent, Derived and complex roles, Modification of Roles and Deletion of roles.
 Configured EAM and ARM including Workflow Configurations
 Configuration of Connector Settings and SPRO Configurations for Access control.
 Perform Synchronization Jobs.
 Creation of FF_ID’s and Mapping to Owner, Controller and Firefighters.
 Assigning the 4010 parameter role in backend system.
 Mass role upload via template through Role Import in BRM.
 Maintaining the Business role owners in Role Maintenance.
 Configured the Decision Table and Function in BRF+.
 Designed workflow in MSMP and maintained the Stages and Paths.
 Generated the Number ranging and customized the request type and EUP Fields.
 Created the Template based request via Template Management.
 Monthly Audit Reports.
 Troubleshooting User Access related Authorization issues
 Emergency access provisioning through Firefighters.
 Assigning FIREFIGHTER ID to FIREFIGHTER ID owners, assigning FIREFIGHTER ID to Controllers by using FF tool.
 Distributing fire fighter logs to owner

Client : Vedanta Limited


Environment : SAP ECC 6.0, BW ECC 6.0 Security, CUA
Duration : December 2014 – Aug 2016
Role : SAP Security Consultant

Client Description: Vedanta Limited is a natural resource company engaged in the business of manufacturing copper and copper
products, and aluminum and aluminum products. Its iron ore business consists of iron ore exploration, mining, beneficiation and
exports. The Company has iron ore mining operations in the States of Goa and Karnataka. Its copper business consists of custom
smelting. Its power business consists of 2,400 megawatts thermal coal-based power facility in the State of Odisha.

Roles & Responsibilities:

 User administration like creating, modifying and password resetting based on request.
 Role Modification, change, (single roles, composite roles, derived roles).
 Mass Users Maintenance for the business convenience.
 Resetting Passwords for users and intimating password policy.
 Assigned roles to users as per approvals.
 Analyzing User Information System using SUIM.
 Addition, Removal of Transaction Codes, authorizations, authorization objects by modifying existing roles based upon
change request.
 Performed Transportation of newly created roles/ modified roles.
 Performed User comparison in PFCG.
 Analyzing missing authorizations based on screen shot sent by the user.

You might also like