Sr. SAP Security Consultant at Bridgesoft
Wilmington, DE 19801, USA -
Full Time


Start Date

Immediate

Expiry Date

22 Jul, 25

Salary

0.0

Posted On

22 Apr, 25

Experience

7 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Sap Security Administration, Architecture, Communication Skills, Access Control, Application Security

Industry

Information Technology/IT

Description

JOB DESCRIPTION:

We are seeking a highly skilled and experienced SAP Security Consultant to join our team. In this critical role, you will be responsible for designing, implementing, and maintaining robust security solutions across our SAP landscape. You will play a key role in ensuring the confidentiality, integrity, and availability of our sensitive data.

REQUIREMENTS:

  • 7+ years of experience in SAP Security administration and architecture.
  • In-depth knowledge of SAP GRC, RAR, and SOD concepts and best practices.
  • Expertise in SAP BW authorization and access control.
  • Strong understanding of SAP security across various modules (FI/HR/MM/PM).
  • Experience with WebSphere application security.
  • Excellent analytical, problem-solving, and communication skills.
  • Ability to work independently and as part of a team.
Responsibilities

ESSENTIAL RESPONSIBILITIES:

  • Lead and execute GRC/RAR/SOD initiatives, including risk assessments, remediation plans, and mitigation strategies.
  • Design and implement comprehensive SAP security architectures, aligning with industry best practices and regulatory requirements.
  • Provide expert guidance on SAP security best practices, including access control, authorization concepts, and segregation of duties.
  • Administer and maintain SAP user access, including role design, provisioning, and de-provisioning.
  • Troubleshoot security issues, conduct security audits, and provide timely resolution to end-user inquiries.
  • Support SAP security across all project phases, from initial design to go-live and ongoing maintenance.
  • Collaborate with business stakeholders and IT teams to gather requirements, analyze risks, and implement effective security controls.
  • Stay abreast of emerging security threats and vulnerabilities, and implement appropriate countermeasures.
Loading...