.... Majority of our customers are renowned Fortune 500 organizations.
What are we looking for
· Must have 8+ years of SAP BASIS & Security experience in support and Implementation projects in ECC / S4, BW and GRC...
...services. This office is located at SKYVIEW-20 near Bio diversity park , Raidurgam.
The Position:
Qualifications:... ...implementation, administration, and support of the Workforc...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...
About the job :Cyber Security Analyst (VAPT) L2 / L3 || Hyderabad WFO || Quick Joiner ||Responsibilities include but are not limited to :The associate will be the senior analyst leading the technical aspects of all cybersecu...
Role Overview :As an experienced SAP Security Analyst, you will be responsible to design, build, deploy and support of SAP Security roles, profiles and authorizations to S/4HANA, GRC and Fiori Apps. You will work with the fu...
...About the role
Role Title: Sr. Spec. DDIT OPS Data Analyst
Location: Hyderabad
The purpose of the role is to lead the design and managing deliverables of Procurement business critical applications as well a...
...adoption of new technology
As a Package Consultant at IBM, get ready to tackle numerous... ...experiment everyday, all whilst having continuous trust and support in an ...
...environment with teams and business units seamlessly connected across the organization.Required Skills:Role Overview:As an experienced SAP Security Analyst, you will be responsible to design, build, deploy and suppo...
...of 8 Years in SAP FICO
Implementation exp - Minimum 3 three implementations are mandatory
Mandatory : Implementation, SAP S4HANA, Controlling, CO CCA.
REQUIREMENT FOR SAP FICO CONSULTANT:
The SAP functional an...
Key elements of the role
Responsible for defining and driving a consistent business role and application identity and access strategy.
Design and support the building and testing of roles, authorizations, and data restrictions in line with the applic...