Role name: | Consultant |
---|---|
Role Description: | Evaluate & integrate SAP Fiori apps into SAP GRCPerform outside research to develop expertise in SAP GRC security functionality and industry best practices within the SAP GRC, the IT risk management and compliance spaceProvide technical leadership in the assessment, design, and implementation of SAP GRC security and IT risk solutionsDesign, implement, and support business process and IT controls in an ERP environment,including new implementations, control redesigns, or assessment of a client’s ERP control frameworkUnderstand ERP configuration as it relates to the development of automated controlsStrong knowledge of key business processes, the inherit risks, potential controlsUnderstand leading practices as it relates to ERP control environments, and provide recommendations to clients on control design and implementationAssess complex governance requirements, including Sarbanes Oxley, and provide clients with leading practice recommendations as it relates to controls in an ERP environmentPerform the role of GRC subject matter specialis tincluding the ability to provide in-depth application support to internal/external project team membersUnderstanding of GRC configuration and security concepts and procedures |
Competencies: | SAP GRC Risk Management |
Experience (Years): | 8-10 |
Country: | United States |
---|---|
Branch | City | Location: | TCS – Los Angeles Rosemead Rosemead, CA |
Keywords: | SAP GRC |
Mohd Adil | Talent Acquisition
2838 E. LONG LAKE ROAD SUITE 210, TROY, MI 48085
M: 469-552-7783 | Mail: [email protected]
Connect me on – Linkedin
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to which they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.