0% found this document useful (0 votes)
291 views

Santhosh - SAP GRC

P. Santhosh has over 3.5 years of experience as an SAP Security and GRC consultant, providing implementation, support, and maintenance services for clients like Wipro Technologies, Philips, and Boston Scientific. He has expertise in SAP security, GRC access control, HR security, BI security, and has worked extensively with ECC, GRC, and BI systems. Santhosh is looking for new opportunities as an SAP Security consultant.

Uploaded by

Life L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
291 views

Santhosh - SAP GRC

P. Santhosh has over 3.5 years of experience as an SAP Security and GRC consultant, providing implementation, support, and maintenance services for clients like Wipro Technologies, Philips, and Boston Scientific. He has expertise in SAP security, GRC access control, HR security, BI security, and has worked extensively with ECC, GRC, and BI systems. Santhosh is looking for new opportunities as an SAP Security consultant.

Uploaded by

Life L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

P.

Santhosh
Email: [email protected]
Ph. (M) +91-9441156191
SAP Security & GRC consultant
-------------------------------------------------------------------------------------------------------------------------
WORK EXPERIENCE

 Offering 3.5 Years of experience across the industry.


 Extensive experience on SAP R/3 Security SAP GRC Access Control & includes Support activities,
Enhancement and Maintenance Projects of SAP.
 Post-Installation Configuration activities of GRC 10.0 Access control components (ARM, AQM, BRM and
EAM).
 HR Security & BI Security

SOFTWARE & TOOLS

• SAP Environment : ERP - SAP R/3 4.7 EE, ECC 5.0, ECC 6.0,
• Operating systems : MS Windows NT/2000/2003/XP
• Compliance tools : GRC AC (ARM, AQM, BRM and EAM)
• Supporting Modules : HR Security and BI Security
• Ticketing Tools : Remedy

ACADEMIC PROFILE: B.Tech from JNTU University, 2010.

PROFESSIONAL EXPERIENCE:

Company : Wipro Technologies


Type : implementation & Support
Technology/Software : ECC6 and BI 7.0, Oracle 10i, Net weaver 4s
Role : SAP Security Consultant
Duration : April 2012 to till date.

Project - 2
Client Philips
Role SAP security consultant
Organization Wipro Technologies
Duration Aug 2013 to till date

Responsibilities:

 As team member worked in Wholesale Reorganization project to centralized role creations and
modifications
 SAP application Security development by taking business requirements and building Security roles using
Profile Generator tool (PFCG).
 Maintain customer specific objects using SU24.
 Customizing authorization object creation
 Master and Derive role concept.
 Value and Transaction role Security approach.
 HR structural authorizations.
 BI analysis authorizations.
 User Administration in the entire landscapes (Prod\Test\Dev)
 Requirement Analysis: Authorization requirements and Design of authorization structure.
 Involved in Role & Profile maintenance and assigning Roles & Authorizations to the Users.
 Troubleshooting user’s authorization failures and day to day issues in all landscapes and resolving all security
related issues.
 Analyzing the authorization issues using SU53 dump and ST01 then providing the solution based on the user
position.

Project – 1
Client Boston Scientific
Role SAP Security, GRC Consultant
Organization Wipro Technologies
Duration May 2012 to July 2013

Roles and Responsibilities:

 Understanding and implementing the Change Control process for any enhancements or operational changes
as required.
 Creating and maintaining template roles, derived roles, and composite roles using Profile Generator (PFCG)
across different landscapes.
 Analyzing and solving missing authorizations (using SU53 and System Trace ST01) and day-to-day security
issues that are being raised by the users using Remedy ticketing tool and common mailbox requests.
 Maintaining organizational values as and when required while creating / modifying single activity groups and
updating the documents.
 Generating reports using SUIM and security tables for Internal Security Audit and other requirements as and
when required.
 Knowledge in BW authorizations.
 Working with the functional support groups for development of new security policies and procedures for
SAP applications.
 Create, up version the System Requirement and Design specification documents with respect to security
changes.

HR Security
 Assign Roles to the position.
 Creating link between personal numbers to user id.
 Assign structural profile to users.
 Extensively used PA20, PA30 Transactions.
 Finding position and assigning role to position in PO13.
BI Security
 Maintain BI authorization objects based on the business requirements.
 Worked on management and maintenance of Authorization object by using (RSECADMIN)
 Worked on Trace the users in BI.
 Handling end user day to day BI security support.
 Expertise in standard and analysis authorization in BI security, RSECADMIN.

GRC AC 10.0
 Post-Installation Configuration activities of Access control components (ARM, AQM, BRM and EAM).
 Activate Applications
 Activate Services
 Activate BC Sets

You might also like