This position forms part of the IT Operations Datacom Team. The candidate will be responsible for implementing change management and ongoing maintenance of parts of the networking infrastructure for the WAN, DMZ and Internet Edge of the network.
Verify that the FHA Mortgage Insurance Premiums were remitted to FHA by the required time frames.Review Mortgage Insurance cancellations to ensure evidence of approval and validation account insurance should be cancelled.
Provide dedicated system administration, networking, programming, cyber research and development, and cyber intelligence gathering / analysis support of multiple ongoing customer programs and internal research efforts.
The Information Security Analyst is responsible for reviewing, monitoring and administering network security instrumentation. This includes, firewalls, intrusion detection devices and other network based security technology designed to detect and block malicious activity on the network.
The Business Analysts II to be responsible for orchestrating the various activities associated with ensuring that software products are delivered that meet user needs, represent the needs of end users throughout all stages of the product development process, and utilize knowledge of business processes and IT solutions to determine what features to build.
In this role, the selected candidate must have a strong hands-on Business Analysis and Data skills: facilitation and gathering of user requirements development of business requirements and functional specifications documents, system and user acceptance testing (UAT), process mapping, data extraction and validation, data mapping, reporting development & automation, building of queries, experience working with data warehouses or databases.
Consult with business users within and outside of HR to gather access requirements, and determine best approach for access to the system, at times thinking out of the box in order to maintain current requirements while providing solutions for others.
The IT Security Analyst is responsible for providing information security services to protect the confidentiality, integrity, and availability of information and technical environments and to support enterprise security goals and objectives.