SAP Security Analyst Administrator in Atlanta GA Resume Janice ReShae

July 1, 2016 | Author: JaniceReShae | Category: Types, Presentations
Share Embed Donate


Short Description

Janice ReShae is an experienced professional with over 10 years Information Systems work history in SAP Security, Applic...

Description

Janice ReShae

888-959-0941

[email protected] www.linkedin.com/in/janicereshae SAP Security Analyst, Administrator | Open to new opportunities PROFESSIONAL SUMMARY Experienced professional with over 10 years Information Systems work history in SAP Security, Application Security, Product Management, Business Support, Sales and Marketing, Customer Service, Audit, Governance & Risk (GRC), and Training. Manage operational security controls and processes in systems across business modules including dual landscape management. SAP security support and role development for 11 successful full life cycle ERP go-live projects. EXPERIENCE Founder | SAP Security Analyst, Administrator | Consultant

2015 – Present

SAP Security Analysis Leadership in the Greater Atlanta Area    

Attending Networking Events - Use social media to exchange exciting ideas and share the latest technology news. Researching Industry Leaders - Find and process information that is relevant to Technology, Enterprise Resource Planning (ERP), Governance Risk Compliance (GRC), Application Security, SAP Security and Security Administration. Tracking Industry Trends - Review of emerging trends in Technology, SAP | ERP | GRC. Participating in Industry Discussions on LinkedIn and other social media to stay abreast of leading edge forthcoming technologies.

BSC Solutions 

     



Consultant | SAP Security Analyst

2013 – 2014

As a member of the Infrastructure Computer Systems Team, worked closely with regional training coordinators to validate role requirements and test security role design including support of user acceptance testing (UAT); thereby ensuring testing included all job roles based on HR job descriptions and developed solutions throughout the lifecycle, transitioning into a successful production go-live. Key contributor for implementation of the Healthcare eWM project for multiple mill locations; met strict timelines and milestones resulting in a Security go-live with minimal updates required during hyper-care and post go-live. Performed refresh steps in coordination with the Basis Team during system copies to ensure systems remain aligned and updates are transparent between systems, which allowed end-users to continue their duties seamlessly. Evaluate, test, recommend, develop, coordinate, monitor and maintain information security for SAP systems, user identities, and role access while maintaining the integrity of system access via ‘Job Roles’ created using the profile generator (transaction PFCG). Performed Level 2-3 support, role creation, modification, and derive roles in SAP APO, ECC, BI, SCM-P2P/P2S, SRM, PI, and Solution Manager Systems. Ensured the SAP environment were secure and user access granted following the “least privilege” transaction code and object strategy in agreement with authorized role approvers, business leads, and defined policies. Entered access requests to add/remove roles via Identity Management (IDM). Manage user-based firefighter/superuser administration through defined user IDs, and role-based administration of defined firefighter/superuser SAP roles thereby protecting overall system security by restricting access to sensitive and critical transactions. Communicate with a customer-focused attitude. Worked with both technical and non-technical levels of the organization and joined forces with geographically dispersed virtual teams and IT leadership to ensure effective communication and to support the achievement of objectives for SAP Security administration.

Janice ReShae

Newell Rubbermaid    



Consultant | SAP Security Analyst | IS Support

2013 – 2013

Secure the SAP environment and grant user access adhering to the “least privilege” security strategy in agreement with business process owners. Responsible for onboarding New Hires and employee transfers via SAP access request (SAR) routing tool to ensure users have access and equipment on first workday, preventing delays in training and transitioning duties. Verify user training completion via SAP Success Factors prior to granting access resulting in low user error tolerance. Conduct monthly/quarterly internal control reviews and risk assessments of security access in response to internal audit processes (including access appropriateness and access to sensitive transactions) ensuring end users cannot view sensitive data. Cooperate with Managers and Business Process Owners to ensure user SAP security access is appropriate and approved and documented if risk is acceptable due to business policies. Join forces with Change Management and business process owners to ensure effective communication and to support the achievement of objectives for SAP Security administration and access restrictions.

NewellRubbermaid, Inc.

Lead SAP Security Analyst

2008 – 2013

COLLABORATION     

Ability to effectively work with geographically dispersed virtual teams and IT leadership, and collaborated with software designers, Security liaisons, Audit, QA team, Change Management, and Configuration Analysts, to ensure quality and the successful implementation of new role development and security processes as defined by business requirements. Develop positive and trusted working relationships within the team and other departments, working effectively with geographically dispersed virtual teams, user communities and IT leadership to resolve security and business issues while effectively prioritizing and executing tasks. Proactively engages with business leaders and the change management team in automating and streamlining security and control processes, by sharing knowledge and brainstorming with team members to jointly deliver solutions. Work with 3rd party vendors to understand bolt-on systems and how they interact with SAP, opening a channel to better end user support. Organize regular meetings to communicate and reinforce standard business process concepts and methodologies to offshore teams and regional security analysts.

TESTING | ROLE DEVELOPMENT | SUPPORT    

      

Proficient in SAP Security measures, standards, practices and technology, and providing security support, configuration and administration. Key contributor as the lead security analyst for BI Spend Performance Management (SPM), Pay from Scan (SCM/PFS), and Financial Supply Chain Management (FIN-FSCM) projects. Manage SAP users, authorizations, and profiles during upgrades, system copy, and during planned audits. Spearheaded project to streamline non-production support issues via Solution Manager © ticket reporting and processing. The project included coordinating efforts with the Solution Manager/QA team to ensure the Service Desk ticketing system incorporated the required layouts and customized routing option. This process resulted in reduced email correspondence for reporting and recording issues and better issue tracking capabilities. Create roles and consult regularly with project team liaisons, and attend role design reviews in order to maintain a role design which is compliant with the architecture and standards of the company. Create and generate transports for development and production role updates across multiple clients via Solution Manager ChaRM. Monitor, Assign, and Resolve solution manager service desk tickets to determine type of access changes or role development required in all production or non-production environments. Support the Basis team by performing system administration procedures and monitoring user master records (UMR) during system copy and upgrades. Serve as liaison between users, vendors, and technical groups to resolve complex issues which ensures a successful implementation of new security roles. Involved in testing upgrades in SAP GRC/Suite, Solution Manager/Service Desk, SAP Central User Administration (CUA), and Access Controls Portal. Participate in performing security testing specific to SAP support/enhancement packs for Governance, Risk, and Compliance (GRC 5.3) administration, configuration, and upgrades.

Janice ReShae



Setup testing IDs for User Acceptance Testing and obtain user sign-off by each process team liaison for confirmation of roles ready for production.

AUDIT | DOCUMENTATION | TRAINING  

 

Act as Governance & Compliance liaison between Security and Governance departments; creating an alliance between the two departments resulting in fewer SOD violations at go-live due to ensuring compliance based on business needs and organizational requirements. Proactively conduct monthly/quarterly audit reviews of security access in response to internal audit processes (including access appropriateness and access to sensitive transactions); Coordinate Governance/SOX controls via service desk ticket, communication and reviews in partnership with Governance management to ensure users are compliant with governance rules, and segregation of duties. Create and update technical security documents according to IT standards (security development and configuration Technical Specifications), training courses, and other relevant documentation used to provide knowledge transfer of security development and configuration information, Policies, and Operating Procedures. Review user access audit flags with Managers and Business Process Owners to ensure user SAP security access is appropriate in regard to risk violations.

CP Kelco     

SAP Security Coordinator | Analyst

2006 – 2008

Assist the Global IT Applications Manager with control of userid and user access for SAP international implementations, and management of changes and releases in a Global SAP multi-system landscape environment throughout the project life cycle. Develop, support, and administer SAP Security. Responsible for SAP security design and configuration to ensure all modules are functional and secure. Knowledge of segregation of duties concepts and ensures compliance of SOD processes and procedures. Monitor, Analyze, and Resolve SAP access issues for the end-user community via Track-It© ticket system Provide Security audit information and results to internal and external (KPMG) auditors in response to IT General Controls (ITGC) audit items. Mentor/coach end users during user-acceptance testing and implementation. Training topics included service/material entry, requisitioning and order tracking. Ability to work with diverse end user communities and off-shore counterparts to resolve security and business issues while effectively prioritizing and executing tasks.

INTERESTS SAP Security, Application Security, SAP GRC 10, Access Controls, Process Controls, SAP ChaRM /Solution Manager/Service Desk, Risk Management, SAP GUI, Master Data, Strategic Designs and Development, Business Requirements, Technical Support, Administrator, Technical Implementations, Product Management, Business Analyst, New Opportunities, Security and Controls, Enterprise Application Security.

EDUCATION MSIS - Enterprise Resource Management /CIS –Strayer University BSBA - Management/Marketing – University of Southern Colorado

Janice ReShae

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF