In this role, the selected candidate provides analysis, advice and solutions for business units that need to develop or improve their processes or methodologies into existing software systems or newly desired ones.
In this role, you will design, develop, troubleshoot and debug hardware, software systems, and programs. Lead integration planning, coordination of deployment, and operational initiatives on a broad range of concurrent projects, independently and with the project team.
In this role, you will be responsible for timely completion of projects, including timeline development and maintenance; coordinates activities and data collection with requesting internal departments or external requestors.
In this position, you will work closely with business analysts, other development team members and our Mobile Support Team to understand and triage issues sent over from the Mobile Support Team on behalf of the Development team.
The Senior Business Systems Analyst serves as the primary interface between multiple business partners and technology teams to deliver complex, high profile technical solutions that align with business initiatives.
The Senior Program Management Analyst will project sponsor or subject matter expert on system changes (government, prime and internal requests) across multiple systems, including understanding the complex relationships between multiple infrastructures and platforms used to manage the TRICARE contracts. The Senior Program Management Analyst will ensure the successful operation, documentation and maintenance of systems and processes with authority to make independent decisions regarding overall operations.
In this role, the selected candidate will write and maintain functional documentation and specifications for developers, support during the project phase, support the integration activities for data migration and assist users to solve operating problems.
In this role, the selected candidate identifies key business processes, performs evaluations of risk, assesses effectiveness of controls, and promotes continuous improvement across the organization through the deployment of risk response activities.
In this role, the selected candidate will conduct analyses and provide reports for evidence of network penetrations and data theft using firewalls, Windows operating systems, intrusion detection/prevention systems, proxy servers, breach indicators, and log aggregation technology.