Wednesday, October 16, 2013

Verizon - Systems Engineer

Responsibilities

The CFO-IT organization is driving business change through ERP convergence, a process whereby VZ-Wireline will be transformed into a SAP-centric IT model. To enable these sweeping changes new SAP tools will be deployed to manage the immense volumes of data and users within the newly created system and to more efficiently maintain the legacy systems.

In the security area, the SAP landscape will grow in breadth as well as depth. Currently, two SAP environments are being maintained but this will grow to three (vSAP – made up of six systems) as will the complexity of the environments: Identity Management (new SAP system), Governance, Risk and Compliance (new SAP System), HANA (new SAP system), SAP Landscape Transformation Server (new SAP system) will be added as new systems to be maintained. These not only are for use by the new wireline SAP system (vSAP) but will be integrated into the existing SAP landscapes. Additionally, SAP Portal (redesigned / enhanced functionality), SAP Business Intelligence (redesigned, enhanced, new platform), SAP Business Objects (expanded scope, enhanced) and SAP Solution Manager (enhanced, upgraded, expanded functionality) will all be significantly changed and play much more critical roles in the Wireline Organization (comprising more than 50% of Verizon’s assets). To support an additional 10 new systems and the four strategically enhanced systems, additional senior-level security resources will be required, both for deployment and on-going support. The Wireline ERP Convergence program continues into 2016 and support for other programs (CPM, Alternate Financing, etc.) will be ongoing.

The volume of users in these systems will also increase significantly to include ALL Verizon employees due to workflow approvals, organizational reporting, etc., in a more blended Verizon. Total users of these SAP systems will be more than 230,000 employees, contractors and business partners.

In order to efficiently manage this explosive growth in the SAP security area additional resources will be required. These resources will need to have a broad background in SAP security to be able to handle the varied systems and models employed by SAP to provide top-tier security to these systems. These systems contain financial data, customer data, employee data and vendor data, both domestically and internationally. Seasoned resources with broad and extensive SAP backgrounds are required to design, implement and maintain the security processes and methods to be compliant with VZ data security policies. Fiscally, it is more responsible to add these resources as employees.

Responsibility:

% of Time Spent

Project leadership – provide strong leadership and direction to our IT resources and our business partners in designing security solutions. This position would guide less senior security resources and contractors as well.

20

Cross-functional Solution Design – working across SAP modules (AM, PS, SD, MM, CO, PA, SD, etc.) and business constituencies, design efficient security solutions which meet or exceed business requirements within the constraints of SAP best technical practices. Design may include the application of SAP business configuration or SAP workbench objects (ABAP programs, tables, BAPI / BADI, LSMW, etc.) or a combination multiple SAP tools.

30

TTTSA – Develop testing scenarios for new development and production fixes; perform training for end users on the business functions and for team members to grow them and the team’s capabilities; troubleshoot issues in the development systems (transports, cross-functional items, system errors, etc.) and also in production as required by the critical business processes ongoing in SAP; Support business constituents and other IT departments in break-fix situations and in designing efficient, powerful solutions to business problems; Analyze existing business and technical processes to constantly improve efficiency and drive shareholder value.

30

Critical Administrative – monitors security systems to maximize operational efficiency; coordinates and supports compliance with internal and external audit (Sarbanes-Oxley, Segregation of Duties, GARM, GSAM); upgrade / patch analysis to keep systems operating at peak efficiency.

20

Review Security Requirements for VZ specific security rules (GARM, GSAM); Design security model for use in BOBJ that incorporates both nSAP business processes and vSAP business processes which rely on different user ID criteria for the same user; Build security roles for all six systems in all three SAP landscapes (nSAP, SCM, vSAP); Incorporate systems shared by multiple landscapes into a common security model (portal, IDM, GRC, HANA, BOBJ)

Provides resolutions to a diverse range of complex problems. Analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods & techniques for obtaining solutions.

Project Leadership:
Well-versed in the core SAP modules in order to be able to lead others
Good communication skills, team-building, problem solving and delegation skills
Strong project planning and metrics gathering


Cross-Functional Solution Design:
Requirements gathering from business users, IT professionals, etc.
Synthesizing business requirements across functional departments – this may range from construction projects to spend control, from supply chain purchasing to retirement of fixed assets
Research potential solutions within existing SAP environments and in external information sources (SAP Developer Network, American SAP User Group, personal contacts, etc.)
Propose and implement creative solutions based upon results of analysis and research
Document designs
Work interactively across SAP teams to develop and install business solutions
Manage projects and while both performing and directing the security configuration functions


Business Configuration:
Create working prototypes within SAP to address specific business process needs. For example,
 Determine an approach for facilitating the intercompany material movements through a procurement company to defer tax payments, allowing for proper security in both companies
 Customer Premise Equipment process from provisioning to monthly billing for the product with proper segregation of duties applied to the process.
Configuring entire security processes in SAP. For example,
 Project Systems – capital / expense project profiles, Settlement, Revenue Projects
 Sales and Distribution – sales orders, stock transport orders, material billing, Resource-related billing
 Materials Management – material movements, automatic account determination
Transport of configuration settings between Dev / QA / Production systems

TTTSA:
Develop and execute testing scenarios (positive/negative) within and across business process areas
Develop and deliver formal and informal training to users (business) and coworkers (technical)
Troubleshoot issues in all environments, managing the solution for the business users
Support business and IT in what-if analysis, problem resolution and process improvements
Analyze business process performance regularly to continually improve and eliminate opportunities for Failure. This could be program performance, error handling, user experience, etc.

Examples

1

Deployment of BOBJ initially to nSAP, subsequently to HANA and then to vSAP. All systems utilitze different user master keys (VZ ID vs. E-ID) and each has different security roles in the back end (core) SAP systems. Develop single method to accommodate all models concurrently with a migration plan to remove legacy systems as they are shut down without an impact to the on-going operation. Design test plan, execute plan, educate users.

2

Develop security model for each business area to encompass all SAP landscapes. For example, develop roles for Supply Chain Management that address domestic telco needs, international VES needs and Corporate needs concurrently. Work across business groups to ensure adequate access is provided while maintaining appropriate security. Test, Troubleshoot, Train with users for successful implementation.

3

Develop single HANA security model to address access for nSAP, vSAP and CPM (oracle application). Involved in great detail as each HANA release (currently on REV 62) impacts both HANA and SAP processes, including security. Analyze objects for security gaps / weaknesses. Mitigate gaps / weaknesses. Plan for release of each REV to maximize reporting benefit while minimizing impact to non-HAHA systems.

Candidate will need to be a demonstrated ‘self-starter’, capable of leading and acting independently with clients and other IT organizations. This role demands a person who can confidently work with remote groups, either on new functionality of a production issue and make determinations as to potential impact with minimal supervision.

Receives general guidance for the accomplishment of short to medium term goals and operating objectives. Plans and executes own work. Guides the plans and decision making of and contractors. Leads a project team.

Uses professional concepts and company policies & procedures to solve a wide range of complex problems in creative and practical ways; makes recommendations that aid in the successful completion of initiatives within a functional area. Typically involved in multiple large projects at any point in time.

Examples

1

Review of changes introduced by SAP indicates a need for changes in the systems configuration, java or portal routines. The employee identifies the issue, determines the recommendation, and takes corrective action. When necessary, reviews that recommendation with their manager, and upon approval, implements and tests/monitors the change (system-wide outages, changes in standards, etc.)

2

The employee makes decisions on business process designs which directly impact VZ revenue producing projects and/or back office processes. Good designs result in effective processes which enable VZ to grow revenue, control spend, eliminate costs. Decisions made impact VZ bottom line. These decisions are made routinely by the incumbent.

Qualifications

Skills and knowledge required to perform the job are as follows: Experience in design and configuration of SAP security roles
Experience in business configuration within SAP in multiple Finance and Logistics related modules is required (each SAP module is equivalent to a legacy system). For example, AM, PS, PP, PM, MM, IM, WM, SD, CATS, PPM, etc.
Information Technology experience regarding best practices for development, testing, controls, etc.
Knowledge of specific business areas – Accounting, Asset Management, Engineering, Construction, Sales, etc.
Experience in designing user-level security roles
Experience in report design using BOBJ, Report Writer, Report Painter, Business Warehouse, Crystal
Ability to resolve GUI issues
Ability to integrate cross-module functions using BAPI, BADI, function modules, user exits, customer includes
Ability to coordinate work efforts of resources with diverse backgrounds to achieve outstanding results for business customer
Ability to grasp business concepts quickly and apply knowledge of SAP processes to address security requirements
Knowledge of SAP Solution Manager and it’s capabilities
Familiar with Identity Management implications to solution design
Understanding of SAP landscape design and its implications
Knowledge of Business Objects and its multiple means of providing security / authorization


Incumbent will interact with business users (including presentations) and all levels within the IT community. Security Role Owners – to coach / advise on potential segregation of duty issues
IT Management – to report on GARM, GSAM, SOD, SOX, Audit standards (CPI-810, etc.)
Business Users – to advise on proper role selection
IT Developers – to design / assist in creation of authorization groups and their proper applications


Education and Experience:

Degree: Bachelors

Certifications SAP

Years of Related Experience 10+

SAP Full-lifecycle implementation

(prefer 2 or more)

Direct configuration of SAP modules (AM, PS, IM) for 5+ years

Excellent trouble analysis and resolution skills

Ability to provide On-Call Support - 24x7x365

Able to work independently with little direction


Equal Employment Opportunity

We are an equal opportunity employer m/f/d/v.

We are an equal opportunity employer m/f/d/v.