The Business System Analyst are individual contributors to the development, maintenance and enhancement of business applications, providing specialized technical or business knowledge to system projects.
Responsible for approving the extension of credit and/or making recommendations to the person(s) making the final lending decisions on renewal and extension loans to approve or deny the extension of credit.
Defines and performs systems analysis and development tasks to improve workflow and operating efficiency. Makes recommendations to standardize procedures and processes and to introduce new technology or improve existing technology.
In this role, the selected candidate will maintain responsibility for property management, accountability, and logistics at a US Army Reserve Mission Training Complex; determine overall support requirements for military systems.
The Model Validation Quantitative Analyst will assist with the enterprise-wide oversight responsibility for all aspects of model risk including model governance, model validation and model performance monitoring. This Analyst validates and approves qualifying models used across different areas of the enterprise and is responsible for model risk ratings, model inventory management, model disclosures, model usage tracking and controls.
The Electrical Support role is the key person in Quality to support the plant for First-Time pass rates. They ensure vehicles are free of electrical defects helping to meet DRR, DRL, Compass, and Warranty metrics.
In this role, the selected candidate will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
Work with functional resources to develop project business cases and the financial analyses to support the business cases;contribute thought-leadership for process improvements and participating in implementation strategy development.
Provide Information Security expertise and guidance to business group leaders and IT owners to evaluate and articulate application security requirements; identify potential security risk factors and business impact.