Assists in the creation of comprehensive unit test plans and creates and executes test cases in line with test plans. Participates in design, coding, testing, implementation, and documentation of solutions.
The Incident Response Analyst would create appropriate documentation, processes, and response plans to identify security incidents, contain attacks, investigate intrusion vectors, eradicate infections, recover affected systems, disclose responsibly to stakeholders, and provide lessons learned to the enterprise.
Responsibilities will include the programming or support or architecture of the infrastructure and platform, so server and infrastructure skills should be strong as well. Ideal candidates will have management or team lead experience to go along with their techno-functional skillset.
Assists in the creation of comprehensive unit test plans and creates and executes test cases in line with test plans. Participates in design, coding, testing, implementation, and documentation of solutions. Participates in investigation, analysis, and resolution of technical problems related to system functions, programming, and procedures. Assists with post-implementation reviews.
The Report & Visualization Developer will work as a member of the Business Intelligence (BI) Team within the IT organization to create, enhance, analyze, and test reports for MicroStrategy and other reporting tools.
Attend specification meeting with project team workers to determine scope and limitations of project; work closely with other team members, application developers, and business process owners throughout the organization.
Designs, specifies, implements, codes tests and maintains automated and manual processes in support of business needs and/or corporate strategies. Securely configures and documents computer programs. Acts as liaison between division implementation teams, division process owners and implementation sites while eliciting requirements for process improvement.
In this role, the selected candidate will be responsible for maintaining all security documentation, document, and maintain the process and procedures, incorporating applicable policies and ensuring the process meets the needs of the IT security strategy, thereby ensuring the process is fit for purpose.