.... Majority of our customers are renowned Fortune 500 organizations.
What are we looking for
· Must have 8+ years of SAP BASIS & Security experience in support and Implementation projects in ECC / S4, BW and GRC...
We are looking for SAP Cloud Application Programming Model (CAP) developer to
play a key role in extending and supporting the NBCU SAP solutions. In this role, you would
leverage the SAP Cloud Applicati...
...Overview
As a SAP FICO Consultant you will play a crucial role in the implementation customization and support of SAP FICO solutions... ...with SAP FICO best practices and industry trends ...
We are looking for SAP Cloud Application Programming Model (CAP) developer to
play a key role in extending and supporting the NBCU SAP solutions. In this role, you would
leverage the SAP Cloud Applicati...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...
Role Overview :As an experienced SAP Security Analyst, you will be responsible to design, build, deploy and support of SAP Security roles, profiles and authorizations to S/4HANA, GRC and Fiori Apps. You will work with the fu...
...environment with teams and business units seamlessly connected across the organization.Required Skills:Role Overview:As an experienced SAP Security Analyst, you will be responsible to design, build, deploy and suppo...
...Principal Consultant, SAP HR!- ITO076746
With a startup spirit and 115,000+ curious and courageous minds, we have the expertise to go deep with the world’s biggest brands—and we have fun doing it. We dream in digital, dare in ...
Job Description for SAP Success Factor - Compensation Management Consultant
KloudPortal Technology Solutions Private limited offers a range of software solutions to clients worldwide. We take pride in creating solutions t...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...