IT-Jobs(04/06/2024)

0
20

SAP Security

SAP Security is the term used to describe the procedures and policies put in place to guard against threats, misuse, and illegal access to SAP systems and data. As SAP systems are crucial for handling sensitive data and business operations, strong security is necessary to guarantee data availability, confidentiality, and integrity.

Authorization and Authentication of Users:

Authentication: Confirming a user’s identity before allowing them access. This covers multi-factor authentication (MFA), single sign-on (SSO), and password policies.
Authorization is the process of using roles and permissions to define and enforce what can be done by authenticated users within the system.

Access Control Based on Roles (RBAC):

Users’ permissions are assigned according to their positions in the company, guaranteeing that they have the minimal access required to carry out their duties.
Roles should be updated and reviewed frequently to avoid privilege creep.

Apply Link

1-https://in.linkedin.com/jobs/view/sap-security-at-talpro-leaders-in-technology-hiring-3779904467?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic

  • Experience in Security role
  • Good working experience with role management and security role design in Projects
  • Troubleshooting skills for authorization related issues
  • Understand engagement as it relates to client’s business
  • Demonstrate knowledge in SAP Application Security
  • Communicate client expectations to the engagement team
  • Good understanding of SAP application security implementation methodologies, role based access controls and different applications threats.
  • Be part of a team working on global projects.
  • User Administration using SAP Standard tcodes, CUA, CUP OR ARM or IDM.
  • Role Management such as updates related to bug fixes, role creation and design.
  • Work independently on standard SAP authorizations tasks.

2-https://in.indeed.com/viewjob?jk=c9e08735851bbe98&utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic

Date: May 28, 2024
Job Requisition Id: 57061
Location: Hyderabad, TG, IN

YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.

 

At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.

 

We are looking forward to hire SAP Security Professionals in the following areas :

 

  • Minimum of 6-8 years of experience in GRC Access Control 12.0 on S/4H, Fiori, BI.
  • Day-to-day support on authorization issues
  • Perform configuring/customizing workflows with different conditions
  • SOD clean design
  • Experience in designing, and customizing roles with relevant Catalogs/Groups/Apps
  • SOD analysis and cleanup
  • Firefighter mappings, log review monitoring
  • Workflow customization and monitoring
  • Working knowledge of cloud and on-premise environments
  • Working knowledge of ITGC and SOX controls, monitoring, and extraction of data
  • Pre-audit checks and SOD cleanup
  • Customizing ruleset
  • Experience with defining system controls and developing procedures Strategic thinking, problem-solving, and decision-making capabilities
  • Excellent organizational, analytical, written/verbal communication, and presentation skills required
  • Internal/external audit experience pref+A1erred
  • Strong communication skills with employees at all levels including the ability to translate distinct terminology differences between and for technical teams and business teams

At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.

Our Hyperlearning workplace is grounded upon four principles

  • Flexible work arrangements, Free spirit, and emotional positivity
  • Agile self-determination, trust, transparency, and open collaboration
  • All Support needed for the realization of business goals

3-https://in.linkedin.com/jobs/view/sap-s-4-security-grc-ac-associate-solution-advisor-solution-advisor-at-deloitte-3927740350?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic

Cyber & Strategic

Risk Deloitte Advisory’s Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory’s Cyber Risk Services practice.

4-https://in.indeed.com/viewjob?jk=62bb1e41d432f4a2&utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic

Tetra Pak Global Information Management (Global IM) supports the Tetra Pak Group with all aspects of Information Management. We set the Information Management strategy and standards and work together with Tetra Pak’s Global Process Owners to automate our business processes making sure we run projects & services that provide the greatest value for Tetra Pak and its customers. Global IM has approx. 900 employees in four main sites: Chakan in India, Lund in Sweden, Denton in the USA and in Singapore. • We are based in Chakan, Pune • Transport Services Provided, Work Mode : Hybrid : 2 days’ Work from Home and 3 days’ Work from Office. • Work from Office timings: IST 07:30 am to IST 04:30 pm What you will do 1 Deliver GAPs as part of Projects or Continuous Improvement • Gather and clarify business As-Is and To-be requirements with high level of IT and Business intelligence and adequate level of details. • Collaborate with Subject Matter Experts, Process experts to design an optimal solution according to best practices. Generate and challenge several solutions from different perspectives prior discussing them with Stakeholders. 2. Support Audit related activities within service, according to ITIL standards. The activities include troubleshooting and solving security problems, analysing change requests, providing expertise what regards security and access and perform maintenance according to our audit requirements.

5-https://in.linkedin.com/jobs/view/sap-vulnerability-management-solution-delivery-lead-senior-solution-delivery-lead-at-deloitte-3927741027?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organic

Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and Robotic Process Automation (RPA) to solve Deloitte’s clients‘ most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk The cyber risk services— As part of Cyber Application Security team, you will be part of our SAP practice and will be responsible for assisting the Clients in running SAP Vulnerability Assessments. Qualication The key job responsibilities will be to:

• Ability to run vulnerability scans using vulnerability scanning tools

• Perform penetration tests to identify the vulnerabilities in the security controls setup

• Ability to identify and evaluate the scan results, and provide insightful remediations

• Ability to run SAP ABAP custom code scanning and prepare a report with insightful remediations