Provides first and second tier support to ISETS end users for Child Support applications and hardware; interacts with Application third tier team to restore service and/or identify and correct core problems.
Business Consultant provides direction and business related leadership to high-priority projects. Provides significant business knowledge and analytical capability to ensure efficient business process design, requirements definition, and problem determination and resolution.
As a key member of the Finance and accounting team within IT-Enterprise Shared Services, this individual will be responsible for certain phases of the application development lifecycle (business requirements gathering, application functional design, architecture, documentation, and coordinating user acceptance testing) for changes directly impacting the Finance and accounting area.
The candidate will have a solid understanding of business processes and the design of associated supporting systems and will be responsible for understanding the vision and goals of the business and representing this vision to the Sprint Team.
Perform data analysis to support evaluation of system defects or to develop requirements for new functionality; triage and troubleshoot complex user-reported system defects; assist in various system trouble shooting and balancing and correction efforts including analysis, verification and validation of issues and fixes.
Data and Analytics professionals define strategies, develop and deliver solutions that enable the collection, processing and management of information from one or more sources, and the subsequent delivery of information to audiences in support of key business processes.
Business Consultant provides direction and business related leadership to high-priority projects. Provides significant business knowledge and analytical capability to ensure efficient business process design, requirements definition, and problem determination and resolution
Develop, review and approve security polices and resource classification schemes; maintain all information security standards, procedures and guidelines, including compliance monitoring procedures and documentation.