You are on page 1of 3

Janice ReShae

888-959-0941

Janice.ReShae@gmail.com
www.linkedin.com/in/janicereshae
SAP Security Analyst, Administrator | Open to new opportunities
PROFESSIONAL SUMMARY
Experienced professional with over 10 years Information Systems work history in SAP Security, Application
Security, Product Management, Business Support, Sales and Marketing, Customer Service, Audit, Governance &
Risk (GRC), and Training. Manage operational security controls and processes in systems across business modules
including dual landscape management. SAP security support and role development for 11 successful full life cycle
ERP go-live projects.
EXPERIENCE
Founder | SAP Security Analyst, Administrator | Consultant

2015 Present

SAP Security Analysis Leadership in the Greater Atlanta Area

Attending Networking Events - Use social media to exchange exciting ideas and share the latest technology news.
Researching Industry Leaders - Find and process information that is relevant to Technology, Enterprise Resource Planning
(ERP), Governance Risk Compliance (GRC), Application Security, SAP Security and Security Administration.
Tracking Industry Trends - Review of emerging trends in Technology, SAP | ERP | GRC.
Participating in Industry Discussions on LinkedIn and other social media to stay abreast of leading edge forthcoming
technologies.

BSC Solutions

Consultant | SAP Security Analyst

2013 2014

As a member of the Infrastructure Computer Systems Team, worked closely with regional training coordinators to validate
role requirements and test security role design including support of user acceptance testing (UAT); thereby ensuring testing
included all job roles based on HR job descriptions and developed solutions throughout the lifecycle, transitioning into a
successful production go-live.
Key contributor for implementation of the Healthcare eWM project for multiple mill locations; met strict timelines and
milestones resulting in a Security go-live with minimal updates required during hyper-care and post go-live.
Performed refresh steps in coordination with the Basis Team during system copies to ensure systems remain aligned and
updates are transparent between systems, which allowed end-users to continue their duties seamlessly.
Evaluate, test, recommend, develop, coordinate, monitor and maintain information security for SAP systems, user
identities, and role access while maintaining the integrity of system access via Job Roles created using the profile
generator (transaction PFCG).
Performed Level 2-3 support, role creation, modification, and derive roles in SAP APO, ECC, BI, SCM-P2P/P2S, SRM, PI,
and Solution Manager Systems.
Ensured the SAP environment were secure and user access granted following the least privilege transaction code and
object strategy in agreement with authorized role approvers, business leads, and defined policies. Entered access requests to
add/remove roles via Identity Management (IDM).
Manage user-based firefighter/superuser administration through defined user IDs, and role-based administration of defined
firefighter/superuser SAP roles thereby protecting overall system security by restricting access to sensitive and critical
transactions.
Communicate with a customer-focused attitude. Worked with both technical and non-technical levels of the organization
and joined forces with geographically dispersed virtual teams and IT leadership to ensure effective communication and to
support the achievement of objectives for SAP Security administration.

Janice ReShae

Newell Rubbermaid

Consultant | SAP Security Analyst | IS Support

2013 2013

Secure the SAP environment and grant user access adhering to the least privilege security strategy in agreement with
business process owners.
Responsible for onboarding New Hires and employee transfers via SAP access request (SAR) routing tool to ensure users
have access and equipment on first workday, preventing delays in training and transitioning duties.
Verify user training completion via SAP Success Factors prior to granting access resulting in low user error tolerance.
Conduct monthly/quarterly internal control reviews and risk assessments of security access in response to internal audit
processes (including access appropriateness and access to sensitive transactions) ensuring end users cannot view sensitive
data. Cooperate with Managers and Business Process Owners to ensure user SAP security access is appropriate and
approved and documented if risk is acceptable due to business policies.
Join forces with Change Management and business process owners to ensure effective communication and to support the
achievement of objectives for SAP Security administration and access restrictions.

NewellRubbermaid, Inc.

Lead SAP Security Analyst

2008 2013

COLLABORATION

Ability to effectively work with geographically dispersed virtual teams and IT leadership, and collaborated with software
designers, Security liaisons, Audit, QA team, Change Management, and Configuration Analysts, to ensure quality and the
successful implementation of new role development and security processes as defined by business requirements.
Develop positive and trusted working relationships within the team and other departments, working effectively with
geographically dispersed virtual teams, user communities and IT leadership to resolve security and business issues while
effectively prioritizing and executing tasks.
Proactively engages with business leaders and the change management team in automating and streamlining security and
control processes, by sharing knowledge and brainstorming with team members to jointly deliver solutions.
Work with 3rd party vendors to understand bolt-on systems and how they interact with SAP, opening a channel to better end
user support.
Organize regular meetings to communicate and reinforce standard business process concepts and methodologies to offshore
teams and regional security analysts.

TESTING | ROLE DEVELOPMENT | SUPPORT

Proficient in SAP Security measures, standards, practices and technology, and providing security support, configuration and
administration.
Key contributor as the lead security analyst for BI Spend Performance Management (SPM), Pay from Scan (SCM/PFS),
and Financial Supply Chain Management (FIN-FSCM) projects.
Manage SAP users, authorizations, and profiles during upgrades, system copy, and during planned audits.
Spearheaded project to streamline non-production support issues via Solution Manager ticket reporting and processing.
The project included coordinating efforts with the Solution Manager/QA team to ensure the Service Desk ticketing system
incorporated the required layouts and customized routing option. This process resulted in reduced email correspondence for
reporting and recording issues and better issue tracking capabilities.
Create roles and consult regularly with project team liaisons, and attend role design reviews in order to maintain a role
design which is compliant with the architecture and standards of the company.
Create and generate transports for development and production role updates across multiple clients via Solution Manager
ChaRM.
Monitor, Assign, and Resolve solution manager service desk tickets to determine type of access changes or role
development required in all production or non-production environments.
Support the Basis team by performing system administration procedures and monitoring user master records (UMR) during
system copy and upgrades.
Serve as liaison between users, vendors, and technical groups to resolve complex issues which ensures a successful
implementation of new security roles.
Involved in testing upgrades in SAP GRC/Suite, Solution Manager/Service Desk, SAP Central User Administration (CUA),
and Access Controls Portal.
Participate in performing security testing specific to SAP support/enhancement packs for Governance, Risk, and
Compliance (GRC 5.3) administration, configuration, and upgrades.

Janice ReShae

Setup testing IDs for User Acceptance Testing and obtain user sign-off by each process team liaison for confirmation of
roles ready for production.

AUDIT | DOCUMENTATION | TRAINING

Act as Governance & Compliance liaison between Security and Governance departments; creating an alliance between the
two departments resulting in fewer SOD violations at go-live due to ensuring compliance based on business needs and
organizational requirements.
Proactively conduct monthly/quarterly audit reviews of security access in response to internal audit processes (including
access appropriateness and access to sensitive transactions); Coordinate Governance/SOX controls via service desk ticket,
communication and reviews in partnership with Governance management to ensure users are compliant with governance
rules, and segregation of duties.
Create and update technical security documents according to IT standards (security development and configuration
Technical Specifications), training courses, and other relevant documentation used to provide knowledge transfer of
security development and configuration information, Policies, and Operating Procedures.
Review user access audit flags with Managers and Business Process Owners to ensure user SAP security access is
appropriate in regard to risk violations.

CP Kelco

SAP Security Coordinator | Analyst

2006 2008

Assist the Global IT Applications Manager with control of userid and user access for SAP international implementations,
and management of changes and releases in a Global SAP multi-system landscape environment throughout the project life
cycle.
Develop, support, and administer SAP Security. Responsible for SAP security design and configuration to ensure all
modules are functional and secure. Knowledge of segregation of duties concepts and ensures compliance of SOD processes
and procedures. Monitor, Analyze, and Resolve SAP access issues for the end-user community via Track-It ticket system
Provide Security audit information and results to internal and external (KPMG) auditors in response to IT General Controls
(ITGC) audit items.
Mentor/coach end users during user-acceptance testing and implementation. Training topics included service/material entry,
requisitioning and order tracking.
Ability to work with diverse end user communities and off-shore counterparts to resolve security and business issues while
effectively prioritizing and executing tasks.

INTERESTS
SAP Security, Application Security, SAP GRC 10, Access Controls, Process Controls, SAP ChaRM /Solution
Manager/Service Desk, Risk Management, SAP GUI, Master Data, Strategic Designs and Development, Business
Requirements, Technical Support, Administrator, Technical Implementations, Product Management, Business Analyst,
New Opportunities, Security and Controls, Enterprise Application Security.

EDUCATION
MSIS - Enterprise Resource Management /CIS Strayer University
BSBA - Management/Marketing University of Southern Colorado

Janice ReShae

You might also like