Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

SAP MDM Consultant

Job Title: SAP MDM Consultant
Contract Type: Contract
Location: Stuttgart, Baden-Württemberg
Industry:
Salary: €600.00 - €700.00 per annum
Start Date: ASAP
Duration: 3 Months
REF: J9107_1503063061
Contact Name: Lois Hinken
Contact Email: LoisH@montash.com
Job Published: 2 months ago

Job Description

My client is a global consultancy currently looking for a SAP MDM Consultant to join there team in Germany for a 3 month contract. Must be English and German speaking.

The main tasks on this project will be the re-modelling, input and clean-up of data with the partial programming.

Requirements;

- Basic experience in the SAP modules Master Data Management (MDM) and Master Data Governance (MDG)

- Conception of the master data domain "customer"

- Design and implementation of care processes in the master data domain "customer" (prospect, customer, contact, etc.)

- Integration of external address data providers (address data management)

- Data migration including data cleansing of master data in the master data domain "customer"

- Design and implementation of customer groups (classification, segmentation, hierarchization, etc.)

Nice to have -

Knowledge of data objects Business Partner and Customer in SAP ERP

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...