SAP Security Full Lifecycle Implementation
Experience
|
· Standard Role and Structural Authorization Design, Development, Implementation, and Support · Position-based and User-based Security Designs · Cleanup of Existing Roles · SAP_ALL Usage Analysis and Correction · Central User Administration (CUA) Configuration and Management · Functional/Technical Requirements Gathering · Role Definition · Definition and Documentation of Controlling Objects · Unit Testing and Integration Testing of Roles · Role Assignment |
· Go Live and Post-Go-Live Support · Role Maintenance, Problem and Change Management · ECC Security Upgrades · Security Monitoring · Separation of Duties Analysis, Risk Analysis and Remediation · Audit Preparation and Readiness · Project Team and End User Security · Procedure Development and Documentation · Team Leadership · Full Documentation and Knowledge Transfer to the Client |
Aerospace & Defense Industry Clients
· Sikorsky Aircraft, Stratford, CT
· ITT Corporation, Hanover/Annapolis, MD
· Honda Aircraft Company, Greensboro NC
· United States Army, Picatinny Arsenal, NJ
· United States Department of Energy, Aiken, SC
Retail Industry Clients
· Bealls, Inc, Bradenton FL
· The BonTon Stores, Dayton, OH
Manufacturing Industry Clients
· Southwire Corporation, Carrollton, GA
· Cadbury Schweppes Americas Beverages, Plano, TX
· Newell Rubbermaid, Atlanta, GA
· Delphi Automotive Systems, Detroit, MI
· Uniroyal Chemical Company, Middlebury, CT
· James River Corporation, Richmond, VA
Public Sector Clients
·
Commonwealth
of Kentucky Personnel Cabinet, Frankfort, KY
· North Carolina Dept of Transportation, Raleigh, NC
· World Bank, Washington, DC
NorthShore Resources •
HCL-Axon •
Bourntec •
Oxford Global Resources •
Signature Consultants LLC •
• TEK Systems
• SAP Public Sector, SAP America
• IBM Global Services
• Computer Sciences Corporation (CSC)
• ACS-Systech
Keylock Consulting
Corporation, PO Box 90487, Raleigh, NC 27675-0487 Robert J Pederson, President Phone 919-249-6459 |