Sap Information Security

Topics: SAP AG, Design, Sales Pages: 2 (600 words) Published: December 16, 2012
Provided end-to-end SAP solutions, implemented SAP software’s such as SAP R/3 and coordinated execution and operation. •Integrated between business needs and the technology – Designed system strategy •Evaluated customer’s needs, defined and installed new values, implemented changes, planned different transition and tested functionality in order to fulfill organization needs. •Documented test cases, managed changes and addressed costs to organization •Trained users, prepared training materials, prepared guidelines, assisted users and supported technical staffs on the implementation of SAP •Ensured that SAP Applications are delivered to meet customers' needs and expectations. •Ensured that district application system and new business standards were reliable. •Assisted and supported SAP Applications Management Team Lead. Participated in Regional and Global Specific application projects. Identified and managed gaps in the Regional design.

Provide CRM functional design solutions for customers, including full life-cycle implementation. •Configure and implement CRM functional modules, encompassing sales planning, order management, account and contact management, and commission management. •Collaborate with technical, production, and design teams to create Web and e-mail campaigns and solutions. Define technical designs and develop and implement test plans. •Set up, monitor, tune, and administer PeopleSoft environment systems. •Conduct detailed analysis sessions with end users and business subject matter experts (SMEs). •Responsible for SAP systems integration, application design, and product management for global commercial retail clients. Tasked with administering modules for customer service and support, resource planning, and service operations and management. •Identified requirements for clients and designed appropriate business models and user interfaces (UI). •Configured SAP CRM products per requirements, including testing, problem solving,...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Information Security
  • Essay on Information Security
  • Information Security Essay
  • Information Security Essay
  • Kirk Patrick Samuda, Kirk Samuda.
  • Information Security Strategy Essay
  • information systems risk and security Essay
  • The Role of Information Security Policy Essay

Become a StudyMode Member

Sign Up - It's Free