No Title
cv: 5611 bekijken ------------------------------<-<- pagina terug
  • Reageer per email
  • Bel voor bemiddeling
  • Naar alle CV's



SAP security consultant
Haarlem
in overleg
opdracht


Hardware: & Software

SAP 4.0B, 4.6C, 4.6D, 4.6/7/8/9, ECC5, Revtrack, VIRSA
OS/400
IBM 4381 3090-180E AMDAHL 5995-700A IBM 9674 9672
OS/390 MVS/ESA MVS/XA MVS/SP
Capacity Planning Performance Tools
JES2 IMS RACF DFSMS DFHSM DFDSS SMP/E TSO ISPF
CA1 RACF SYSPLEX HCD OMEGAMON SERVERPACK
CBIPO CBPDO Infoprint Server
Every OEM product under the sun.

Technical skills:
Applications in a Client/Server environment
SAP Securrity
SAP Basis

Mainframe applications in an OS/390 environment
Every package under the sun as an OS/390/z/OS systems programmer

PC based applications (Windows)
Microsoft Word, Microsoft Excel, Various e-mail software

COURSES ATTENDED
ABAP Workbench-Basics
SAP security courses

LANGUAGES:
Dutch: fluent
English: fluent
German: good
French: good
Russian: currently learning

PERSONALITY
? Team worker
? Independent thinker
? Result oriented
? Loyal
? Friendly

AVAILABLE FOR COUNTRIES
Western Europe, anything within 4 travel hours
France, preferably Paris, Marseille, Lyon
Russia
Middle East

Work experience:
2008 January: OCE Technologies
In ECC 6 environment
? Implementing Codification new security roles
? Filling CSI repository
? Creating templates
? RACI analysis
2007 August: Philips Medical Systems
In ECC 5 environment
? Security audit
? Updating existing and implementing new SAP security audit procedures and controls.
? Coordinating offshore security team
? Implementing procedures for new tasks offshore team
2006 October: SmurfitKappa Run and Maintain
In 4.7 environment
? Keep the Run and Maintain work going whilst a SOXX compliant security environment is implemented.
? Support of introduction of SOX compliant security structures
? Security support of implementation new release SAP, ECC6
? Create/Maintain printers, various SExx/SMxx utilities
? Job scheduling
2006 august: Haagwonen Security blueprint design in a new SAP installation
In 4.7 environment
? Design blueprint security and procedures for Security Officers
? Creation of template roles
? Training of future local Security Officers
2006 february: GlaxoSmithKline Role maintenance
In 4.7 environment
? Role maintenance, mainly Master Data
? Creating testsets for roles to ensure a comprehensive test of new-changed roles.
? Writing recommendation for customisation changes in IMG, i.e. incomplete protection of Bank Data.
2005 october: ABN/AMRO Basis consultant/SAP security consultant
In 4.7 environment
? Transport: Setting up transport routes, configuring Workflow-controlled transporting with standard SAP Quality Assurance approval procedures.
? Procedure writing
? Rewriting transport procedures, Change Management procedures to adapt from a one-platform to multi-platform functionality.
? Role building : Developing roles in an implementation of a new role set to comply with SOX.
? Tracing: Problem solving on the user side as well as for role building activities.


2005 july: Sara Lee / DE SAP security consultant
In 4.6 environment
? Role building : Developing roles in an implementation of a new role set to comply with SOX.
? Tracing: Problem solving on the user side as well as for role building activities.
? Research: Verifying that transactions and activities comply with the segregation of duties matrix. (manually and with a tool called VIRSA)
? HR troubleshooting
2005 may: Gaselwest SAP security consultant
In 4.7 environment
? Role building : Developing roles at a new SAP installation for a Belgian energy supplier.
? Tracing: Problem solving on the user side as well as for role building activities.
? Research: Verifying that transactions and activities comply with the segregation of duties matrix. (manually)

2003 april - 2005 april: Shell ITI bv SAP security consultant
In a mixed 4.0B and 4.6C environment
? User support : - User maintenance, monitoring and changing access rights to the latest insights. Mass updates.
? User support : - Defining test/training userid's with required access rights.
? Ad hoc queries: - using SUIM (with SU53 output) , SE16/ZE16, SM30
? Profile building : - customisation of authorizations to meet business needs, monitoring users with critical authorization objects and transaction codes and implementing stringent security procedures for data security reasons. in numerous modules
? Tracing: - ensuring that certain critical processes are adequately protected with just the right access rights.
? Basis functions (SM*, ST*, SE*, SP*) for setting up printers, deleting locks, deleting active users, etc.

2002 - 2003: Shell ITI bv Project Management/AS/400
Implemnting new LPAR technology, upgrading software, reducing complexity of the AS/400
hardware environment, lowering operating cost of this platform.
1998 - 2002: Shell Services Int'l Project management/OS390 Specialist
Investigate/install/rollout Infoprint server
Implement HSM site-wide
Turn-key delivery of a Nigeria-based OS/390 system Installation/testing/rolling out of OS/390 and OEM software
Project leader for the Y2K-upgrade of all OS/390 based OEM software

1994 - 1997: Mitsubishi Motors Operations team leader/MVS technical support Installation/testing/exploitation of MVS/IMS/DB2/OEM Operations coordination
Software benchmarking /selection
1990 - 1994: Texaco Olie Mij MVS systeem programmeur Installation/testing/exploitation MVS/OEM software
1984 - 1990: Texaco Olie Mij Functioneel ontwerper/Technisch ontwerper/ Applicatie programmeur COBOL/MarkIV/MarkV/Easytrieve alle applicatie software Online Accounts Receivable/Billing bridge Online Accounts Payable systeem Online Lubricants location tracing logistics system