Hi
I hope you are doing well. I am sending the new requirement, please go 
through it and let me know if you are comfortable.
 


*Need         :    SAP Application Security LeadLocation  :    Warsaw 
INDuration  :    3+ months *
 
 *Citizen or GC*
 
*Job Summary*
The IT Lead Analyst leads regional or local projects, solutions and/or 
processes of medium-to-high complexity. The Lead Analyst may lead teams of 
non-employee resources and provides mentoring and coaching to junior team 
members. He or she participates actively on committees representing 
inter/intra IT organizations.
The Lead Analyst identifies, quantifies and prioritizes solutions to 
address business and technical issues; influences and negotiates to achieve 
business strategy and deliver results to internal/external partners; and 
functions as leader and subject matter expert in one or more of the 
following capacities: technical, project management or industry. He or she 
researches and validates innovative solutions (both external and internal), 
leveraging best practices for quality and process efficiencies; leads 
assignments and/or maintains systems of medium to large complexity, 
including requirements definition, internal/external resource management 
and budgets; applies principles, concepts and practices of the ZBS 
Competency Model at the Lead level; and proactively enforces worldwide and 
local security policies to ensure ZBS information assets are protected.
The Application Security Lead should thoroughly understand and be committed 
to best practices for security application software; Be responsible for the 
design, development, testing, deployment and administration of user and 
role/menu access; Participate and lead in the development of procedures, 
policies and SOP documentation for application security;  Collaborate with 
management, audit, basis, developers and functional support to ensure the 
applications are secured as per organizational company security policies 
and procedures; Provide guidance and leadership in the areas of issue 
troubleshooting and resolutions, maintenance, security technologies and 
system architecture;  Provide knowledge transfer and training to junior 
administrators and operations; Collaborate with both audit and functional 
teams in establishing the security controls in accordance with Segregation 
of Duties principles.
 
*Expected Areas of Competence (i.e., KSAs)* 
Expertise in SAP platform security (Required: ECC/R3, Portal, CUA.| 
Desired( BOBJ, BI, Solution Manager, GRC)
Results orientation; proven ability to deliver results on-time and on-budget
Demonstrated success leading IT projects of low-to-medium complexity at the 
regional or local level
Strong interpersonal, influence and communication skills 
(written/verbal/presentation) at multiple levels
Strong analytical, organizational, critical thinking and win-win 
negotiation skills
Demonstrates excellent project management and work planning skills; must be 
able to multitask effectively
Understanding of Zimmer’s competitive environment preferred
 
*Education/Experience Requirements*
Bachelor’s degree in Information Technology or related field required
Master’s degree in business, technology or related field preferred
4+ years of professional experience required (3+ years with a master’s 
degree)
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Thanks&Regards
James Miller |  IT Recruiter 
ITBrainiac Inc,
Princeton, NJ 08540
Direct:  (609-935-3773)*101         | Fax 312.582.2699
Website:www.itbrainiac.
Yahoo  :james.usrecruiter
Gtalk    :james.usrecruiter
Email  : [email protected]
 
Notice: This email contains confidential or proprietary information which 
may be legally privileged. It is intended only for the named recipient (s). 
If an.addressing or transmission error has misdirected the email, please 
notify the author by replying to this message. If you are not the named 
recipient, youare not authorized to use, disclose, distribute, copy, print 
or reply on this email, and should immediately delete it from your computer 
system list

Reply via email to