SAP Project Specialist
Al Khafji Joint Operations
مجموع سنوات الخبرة :12 years, 1 أشهر
• Configuration for SAP Solution Manager 7.2.
• Contribution in Research Cell & technical documentation of the integration processes to develop end-to-end Business logics.
• Helping in handling ITD audits for SAP Change Requests.
• Reviewed security vulnerability reports for applications and databases, analyzed and worked extensively with the development
teams for the implementation of mitigating controls.
• Reported security findings, recommendations and presented to the business users, executive committee and Compliance
departments.
• Developed security policies and baselines for mobile and web applications.
• Involved in performing compliance audits to ensure security policies and baselines have been adequately implemented.
• Supporting the integration projects through various phases from gathering business requirements to go-live and postimplementation
support.
• Analysis of change requests (corrections, enhancements).
• Contribute to 2nd level support of SAP SolMan (Incident Management, Problem Management, troubleshooting, etc)
• Suggest improvements to current operational procedures within the integration environment.
• Managing technical/ functional documentation in SAP system.
• Ensuring the minimum customization in the SAP system and automating the workflows as per SAP recommendations.
• Dealing with the complete life cycle of urgent change requests in SAP SolMan at different system landscapes.
• Conducting User Acceptance Test (UAT) s with business users and ensuring implementation of requirements.
• Prioritizing the impact of change requested in the system and differentiating between major and minor enhancements
requested from the business.
• Monitored and responded to the customers’ tickets on the IT helpdesk service.
• Documented and organized the issues and the steps taken to resolve them.
• Assisted Systems specialist in creating VPN remote access support for the entire Confidential chain.
• Ensuring marketing of the IT department by creating interactive, educational and learning videos for business users as per the
automations provided.
• Supporting the process automation through well-defined workflows.
• Planned, organize, control, and evaluate IT and electronic data operations.
• Designed, developed, implemented security algorithms and coordinated systems, policies, and procedures & ensured the
security of data, network access, and backup systems.
• Acted in alignment with user needs and system functionality to contribute to organizational policy.
• Identified problematic areas and implement strategic solutions in time.
• Involved in circuit designs for security enhancements.
• Generated executive summary reports showing the security assessments results, recommendations and risk mitigation plans
and presented them to the respective business sponsors and senior management.
• Monitoring & evaluation of IT operations using LFA, PMF & POSTCORB.
• Keeping in view of company dynamics, and need of the hour devising and implementing the minimum possible algorithms in
terms of time and space complexity.
• Used AES, DES & Serpent for encryption & Decryption of data.
• Ensured Data CIA as per SLA (service level agreement) with venders.
• Executing hourly, daily, weekly and monthly data threshold reports to management as per directions.
• Ensured information security policy, standards, processes and procedures are implemented and managed properly
• Managed and perform delegated Information Security Projects, major activities and requirements
• Identify, understand and implement all information security requirements to ensure the required compliance.
• Assure that team member has the necessary education and training.
• Provide necessary business information on timed slots to vendor management.
• Coordinates meetings with the product committee, project manager, and functional management to discuss project
impediments, needed resources, or issues/delays in completing the task.
• Resolving VIP escalations for Pakistan Telecommunication Authority (PTA) cases.
• Monitoring, configuring & managing Service Levels, Month to Date (MTD) Stats.
• Monitoring and troubleshooting of Cisco Routers & Formation of DTR (Down Time Report) in Real-Time Adherence (RTA).
• Hands-on experience on MS Office for command execution and creating DTR.
• Provide Technical support for Telecom transport services Optical Fiber.
• Checking of IP Address of a Server/Router connected to the right Port No. on the LAN Structure all Pakistan.
• Concentrating on the protection of business processes, applications, and IT systems
• Protecting sensitive information from disclosure to unauthorized individuals
• Ensuring that new information systems and solutions are developed securely
• Evaluate information received from the monitoring and reviewing of Information Security incidents, recommend, take
proactive and appropriate actions in response to identified Information Security incidents.
• Organize, conduct tests “ethical hacks” of the existing security solutions.
• Support IT organization to understand and mitigate/solve identified vulnerabilities
• Support and provide advanced security consulting and architecture with data protection & business continuity requirements.
• Conduct vulnerability assessments to find weaknesses and analyze existing controls effectiveness and suggest remedial action
• Report residual risk, security exposures, vulnerabilities, noncompliance and maltreatment of information assets to IT security
management.
MPhil is of 50 credit hours, 24 credit hours for the course work and 26 credit hours for research work. Each course is of 3 credit hours. There are 2 compulsory courses, and 6 optional courses are taken to complete 24 credits. The courses are designed in such a way that during the course work students will be exposed to research activities. The course work set the basic ground work to start research.