In this role, you will serves as a consultant to functional managers, and business and project teams to identify business requirements based upon business processes for enterprise systems and translate them into system requirements, assignments and tasks.
In this role, you will be responsible to develops and maintains appropriate knowledge of best practices, tools and processes for the design and deployment of custom public-facing web applications, mobile applications, collaboration platforms, and integration / interoperability of those technologies with enterprise business systems (sap/ps).
In this role, you will proactively ensure service continuity and improvement through the review of partner improvement plans, the use of Problem Management, quality tools, and report on your activities.
This position will be responsible for ensuring security throughout our products, including software design and protocols, as well as the security of information stored within and accessed by our systems.
In this role, the selected candidate will be working with and assisting in the development of user requirements and specifications, and understands and incorporates accessibility and universal design elements.
In this role, you will be responsible for analyzing the Banks environment globally for cyber security risks and vulnerabilities.Enlist the assistance of technology experts in other areas of the Bank to assure the correct selection of new technologies for the GIS organization while also assessing those technologies for security risks.
In this role, you will maintain up-to-date family trees for designated families, reviewing family trees in preparation for scheduled follow-up. Communicate with Cyrillic software specialist to identify whether existing trees should be updated or recreated.
In this role, the selected candidate will be responsible for interfacing with clients directly and providing expert guidance to help respond to the incident. This will include elements such as advising clients on specific defensive actions to take, identifying additional indicators of compromise, and depending on the Security Analysts skill set, malware analysis and forensic examination.