SAP SECURITY ANALYST

Mohawk Industries
Any Location, GA
Category Security
Job Description
Are you looking for more? At Mohawk Industries, we’re committed to more – more customer solutions, more process improvements, more sustainable manufacturing and more opportunities for our team.

Requirements

  • Troubleshoot and manage a spectrum of SAP systems including ECC, S/4, Fiori, NetWeaver, GRC, Solman, Ariba, and Cloud platforms.
  • Design, build, test, and implement composite and single roles based on project and continuous support needs, in tight collaboration with the Europe, Middle East, and Africa (EMEA)/Dal-Tile counterpart.
  • Guard the Segregation of Duties (SoD) rules that apply to the security setup and role assignment to users.
  • Conduct and aid in security research with recommendations for action on the following IT-related topics: upgrades, systems, methodologies, and software.
  • Oversee end-to-end SAP S4 Hana security implementations and migrations.
  • Use experience in Sail Point Administration and Azure Active Directory to contribute to robust identity and access management.
  • Act as the Strategic Advisor on SAP processes, workflow methodologies, and industry-leading practices.
  • Communicate requirements to workstream leads and stakeholders.
  • Support both internal and external teams during Quarterly/Annual Audits, with a focus on Cyber Security and SOX compliance requirements.
  • Implement security controls and collaborate with stakeholders throughout application implementations.
  • Identify and address application security issues and cloud security controls.
  • Ensure robust controls within SAP security, aligning with Internal Audit and IT Compliance requirements.
  • Evaluate GRC (governance, risk, and compliance) controls, identify areas for enhancement, and ensure compliance with regulations, policies, and security standards.
  • Conduct risk assessments and devise strategies to mitigate potential risks effectively.
  • Coordinate GRC audits and liaise with internal and external auditors as necessary.
  • Provide training and support to end-users, fostering GRC awareness and promoting best practices.
  • Create GRC Rulesets for IT Critical and Business Sensitive Access reviews, ensuring comprehensive security measures.
]]>