The Analyst oversees execution and maintenance of processes that support existing Quality System applications and their associated processes. This role helps to support business partners with the utilization of the application.
The Integration Analyst will be required to make recommended modifications to the software and successfully complete desired programmatic changes allowing for the customized software solutions necessary to satisfy the requirements of the government customer.
The Third Party Security Assurance Analyst is responsible for performing security assessments, coordinating level two assessments with Security Architects and Application Security Testers, validating compliance with Payment Card Industry (PCI) and driving remediation of Findings from completed assessments.
The Business Systems & Data Analyst is a lead position in the analysis, definition, and automation of business processes for the Association. S/he performs overall analysis and design for the development of business intelligence (BI) and advanced analytics systems, including gathering user requirements, performing systems design and analysis, and architecting data stores for business intelligence applications and reporting.
Operate and improve the end-to-end vulnerability management process, including aspects of asset inventory, contextual approach to scanning, conducting risk and vulnerability assessment, and providing reporting and remediation guidance.
Responsible for providing technical and organizational support for JCFS Financial IT Systems; specifically the Deltek Costpoint Application. Provides support to the development and organization of enterprise-wide financial databases and implements new technologies.
Supports Developers & Automation Engineers scripting the automated tests at ALL levels of the test pyramid (i.e. Unit, Integration, and End-to-End system tests); may participate in the automated test code reviews.
Collect data from Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs).