This position is responsible for testing new or modified products prior to production release; designing, developing, creating, and executing test plans and cases based on business requirements and technical understanding of product architecture.
Lead risk based and security analysis to administer and maintain, proactively identify issues/gaps and lead initiatives to improve overall Information Security function, ensuring access rights are maintained and risks remains low in changing business requirements and changing risk and threat landscape.
Creates and executes product test plans to ensure software products meet design specifications and product quality standards. Assists Development team with process improvements to improve product quality. Communicates with stakeholders on software issues. Uses Agile Central, Microsoft Test Manager, Microsoft SQL Server Management Studio, and other tools to perform the essential job functions.
Responsible for supporting and designing automation test scripts and script less test scenarios through component based test automation framework and enable functional testers in maximizing automation utilization.
Develops security processes and procedures, and supports service-level agreements (SLAs) to ensure that security controls are managed and maintained; supports the development and management of next generation firewalls.
Proactively monitor and administer network systems connected to Companys computing environment. The technologies include, but are not limited to routers, switches, wireless access points, firewalls, load balancers, voice, and video systems.
This position is responsible for leading incubation of new processes; supporting inventory of current processes and Process Central operations; aiding delivery teams to coach project teams on change control governance; aligning with key stakeholders to ensure end to end process continuity and governance of change control; leading and driving the Crowdsourcing campaign.
The Information Security Analyst will perform allprocedures necessary to ensure the safety of information systems assets and toprotect systems from intentional or inadvertent access or destruction, whileunder limited supervision.