We are seeking a dedicated Security Architectto join our team at Wipro Technologies - United Kingdom. In this critical role, you will design, implement, and maintain robust SAP security frameworks that protect our business processes and data integrity across multiple SAP environments.
Your expertise will ensure that user access is managed securely and efficiently throughout its lifecycle—covering provisioning, changes, and terminations. You will be responsible for administrating various user types including dialog, system, service, and reference users, following established best practices and compliance standards.
Key Responsibilities
* Design, build, and maintain SAP roles and authorizationsusing best practices for single, composite, and derived roles across SAP environments.
* Administer user access throughout the lifecycle (provisioning, changes, terminations)including management of dialog, system, service, and reference users.
* Translate business process requirements into secure access designs across key SAP process areassuch as Procure-to-Pay, Order-to-Cash, Record-to-Report, and Hire-to-Retire.
* Identify, assess, and remediate Segregation of Duties (SoD)and sensitive access risks through role design, mitigation controls, and monitoring.
* Configure and support SAP Governance, Risk, and Compliance processesincluding Access Risk Analysis, Access Request workflows, and Emergency Access management.
* Support SAP technical security architecture including transports, client strategy, RFC and background user design, and integration security.
* Administer and secure modern SAP user experiencesincluding Fiori catalogs, groups, spaces, OData services, and gateway authorizations.
* Integrate SAP security with enterprise identity and access management solutions, supporting SSO, federation, and automated provisioning processes.
* Ensure SAP security compliance with internal controls and regulatory requirements, including SOX/ITGC support, access reviews, audit evidence, and documentation standards.
* Serve as a liaison between business, IT, and audit stakeholders, explaining security risks in business terms, facilitating role design discussions, and driving secure, practical access decisions.
#J-18808-Ljbffr