(Authorisations & access strategies) SAP GRC and access control related policies Any additional responsibilities
apply a mastery of data and technology to craft strategies that revolutionise business decision-making, initiatives. Develop, implement, and maintain all IT policies, processes, procedures, and standards required implement comprehensive cybersecurity strategies and policies to safeguard organisational assets and organisational financial policies and compliance requirements. Implement strategies for team building, foster
up-to-date with industry trends and adapt their sales strategies accordingly. Organization and Time Management: services could be beneficial. This involves researching and qualifying leads to determine their suitability deadlines Computer Literate Comply with specific policies, procedures, regulations and best practices Sober
structured work environment. Flexible, but sound code policies and methods. Communication and systems are streamlined
fulfil their requirements. Creating plans and strategy for the self-developed software solutions Developing implementing a Endpoint Management Cloud Service Strategy and it´s technical architecture with the focus
IDOC and RFC's processing Preparing the cut over strategy for SD/VMS objects Preparing User manuals and
apply a mastery of data and technology to craft strategies that revolutionise business decision-making,
to business process owners Preparing cut-over strategy, e.g., data migration Go-Live preparation and
Stay knowledgeable of new testing tools and strategies and evaluate the technologies to incorporate
IDOC and RFC's processing Preparing the cut over strategy for MM objects Preparing User manuals and conducting