.... Majority of our customers are renowned Fortune 500 organizations.
What are we looking for
· Must have 8+ years of SAP BASIS & Security experience in support and Implementation projects in ECC / S4, BW and GRC...
...Performance Development EnvironmentLearning & Development - access to wide range of e-Learning courses (technical, Product, Process, etc.,)A host of Interest Groups/Clubs for Book Reading, Toastmasters, Sports - Cricket, Volleyball, Th...
...oriented trainings, workshops & certifications, licensing etc.
In short, the corresponding competency lead should be looked up as a light house
Should be willing to travel at short notice
14 to 20 Years of e...
...DevOps
Solid understanding of integration concepts and capabilities of BTP Integration Suite
Familiar with Agile development methodologies such as Scrum or Kanban.
Preferred certificate: C_CPE_14...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...
...and experience to make you more successful ensuring our services are uniquely customized to your specific needs.
One Stop Solutio n Coders Brain provides endtoend solutions for the businesses at an affordable p...
Role Overview :As an experienced SAP Security Analyst, you will be responsible to design, build, deploy and support of SAP Security roles, profiles and authorizations to S/4HANA, GRC and Fiori Apps. You will work with the fu...
...DevOps
Solid understanding of integration concepts and capabilities of BTP Integration Suite
Familiar with Agile development methodologies such as Scrum or Kanban.
Preferred certificate: C_CPE_14...
...medical conditions), sex, sexual orientation, sexual and other reproductive health decisions, genetic disorder, genetic predisposition, carrier status, military status, familial status, or domestic violence victim s...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...