AG

Ambedkar Gorremuchu

available

Last update: 04.01.2024

SAP Security Consultant, SAP Security Consultant, SAP Security Consultant

Company: SSG Technologies
Graduation: M.Sc Computer Science
Hourly-/Daily rates: show
Languages: English (Native or Bilingual)

Keywords

SAP Security Governance Risk Management and Compliance

Attachments

Ambedkar-SAP-Security-GRC-CV_040124.docx

Skills

SAP Security, GRC

Project history

04/2017 - 05/2023
SAP Security Consultant
IBM India. (Internet and Information Technology, >10.000 employees)

Company IBM India., (Client - Bio-Rad, USA)
Project Type AMS Support
Duration April 2019 -May 2023
Role SAP Security Consultant
SAP Technology SAP 4.7, ECC 5.0/ECC 6.0, BIW 7.0, GRC 5.2/5.3, GRC AC 10.1/12, SAP Fiori 2.0, S4
HANA
Tools used in the SAP Support projects: Service Now, Charm tool, Rev trac tool, Active control,
HPALM

Responsibilities SAP R/3 ECC 6.0 SECURITY
* Efficiently analysed and resolving the authorization relation issues by Taking SU53 dumps
and switching on the trace. Executing the calls as per the defined SOPs
* Handling Mass Role and user modifications by using the LSMW. Assisting the support team
members in minimizing the Risks at the Role level. Troubleshooting the authorization
problems using ST01 and SU53.
* Working with functional teams and business users to gather the role requirements.
Creating user groups for easy administration for users
* Assisting the business/support team members in creating/modifying the roles as per the
required authorization. Running the USMM Reports for the monitoring the Existing licenses
of the users.
* Cleaning up of the unused RFC Connections, inactive RFC Connections in all the Systems of
the Landscape
* Modifying the RFC Connections, changing the RFC User ids naming convention as per the SAP
ISP Standards and recreating the required new user IDs
* Performed the SU25 Activities as part of Upgrade.
* Maintaining the users through CUA.
* Structural authorization and organizational levels

* Worked on various Roles and eliminated the Transaction Codes which are causing conflicts
from those Roles, Role Redesign, Mitigation and Role Remediation work
* Responsible for the developing single/composite/derived roles using the Profile Generator
(PFCG)
* Worked on SAP Check Indicator Defaults and Field values, reduced the scope of
Authorization checks using transaction SU24 and maintained check indicators for Transaction
codes.

SAP Fiori 2.0 :
* Assigning the Roles to the users based on the Fiori Apps accessed by the users.
* Analysing the errors and publishing the required service based on the analysis

SAP GRC AC 12 SECURITY
* Responsible for Uploading the new Roles along with the Role owner data. Submitting the
GRC Access related requests through ARA.
* Maintaining Configuration parameters settings, Generating Sod Rule set and creating
Custom Functions, Risk IDs and custom Rule set, Run Synchronization jobs.
* Creating User Access Request Templates, FFIDs and assigned to FFID Owners, controllers,
reason codes.
* Executing EAM Master Data Sync Jobs, Uploading the new Roles along with the Role owner
data and Submitting the GRC Access related requests through ARA.
* Creating FFIDs and assigned to FFID Owners and controllers. Creating the new roles
through BRM.
* Preparing the data for the renaming of the existing active RFC Connections as per the ISP
Standards by changing the RFC names
* Perform walkthroughs and test of operating effectiveness for SAP General Controls, SAP
Security and application controls
* Work with the manager to effectively document the audit reports, findings and
recommendations
* Analysing SOD violations through SAP GRC's Access Control (AC) module
* Highlight and discuss violations with role owners / business users for remediation
* Identify and assign mitigating controls to violations that cannot be remediated
* Carry out ruleset changes to incorporate custom T-Codes
* Verify mitigating controls effectiveness
* Report findings and make recommendations for the correction of noted violations and
improvements in operations as per industry standards and best practices
* Creating the Workflows based on the Business Requirements
* Having the experience in Upgrading the GRC 10.1 to GRC 12 Access control
* Configuration activities like SPRO, NWBC, and BRF+ in ARA, EAM, ARM, and BRM.
* Configuration ARA and firefighter id with set up of Connector & connector settings.
* Configured Access request management and create workflow for new user creation and
change user , user validity based on business process with custom agents.
* Risk analysis using GRC ARA tool for the role assignment to the users and transaction
assigning to the roles and suggesting mitigation controls or remediation when required.
* Creation of Mitigation Control id & mapping of various risk is with control id based on
region and business process.
* Performing the UAR at Users, Roles and T-Codes review reports in Production.
* Created the Fire fighter log review report work flow which send the fire fighter logs
to the respective Fire fighter controller for the Logs review
* Preparing SOD Conflict excel sheet, Roles & T-codes excel sheet.
* Integration of ARA, ARM, EAM and BRM components of GRC Access Control 10.1/12
* Maintain Configuration parameters settings
* Generate Sod Rule set
* Create Custom Functions , Risk IDs and custom Rule set
* Run Synchronization jobs
* Generating the Risk Analysis reports for the management
* Integration Data Sources in GRC Access Control for User Authentication and User Details
repository (HR) and aswell from the LDAP Directory
* Maintain Provisioning Settings and Password Self Service
* Customized Access Management screen and fields in User Request Form
* Create User Access Request Templates
* Create FFIDs and assigned to FFID Owners and controllers
* Create reason codes
* Define decentralized ID-based Firefighting Configuration
* Execute EAM Master Data Sync Jobs
* Running User level and Role level Simulations Before assigning T-codes and Roles to the
User's.
* Hands-on working experience on GRC tools Complaint User Provisioning, Risk Analysis and
Remediation.
* Perform User & Role analysis to find the existing SOD violation for users and roles.

HANA Security
* Created Standard, Technical and Restricted Users
* Created Roles for Developers, End User and Database Users
* Worked on Schema/Object level Privilege access

BI 7.3 Security
* Created Analysis Authorizations (RSECADMIN / RSECAUTH) to restrict BI reporting users.
* Optimized the authorization relevant checks on Info Objects in BI.
* Define Authorization-Relevant Characteristics and Attributes using Info Object
Maintenance (RSD1)
* Restricted Analysis Authorizations (Using RSECADMIN Transaction code) at Characteristic
Values, Attribute Values, Hierarchies and Key Figure level.
* Worked with BW Technical Team to design security, identify Info Areas, Info Cubes, and
created custom objects.

Certifications

SAP Certified Application Associate - SAP BusinessObjects Access Control 10.0
2021
SAP Certified Technology Professional - SAP System Security Architect
2021

Local Availability

Only available in these countries: Luxembourg
Profileimage by Ambedkar Gorremuchu SAP Security Consultant, SAP Security Consultant, SAP Security Consultant from Hyderabad SAP Security Consultant, SAP Security Consultant, SAP Security Consultant
Register