In this role, you will participate in process and technology review processes as the owner of the SAP solution. The goal of this position is to provide responsive support to end users while maintaining continued growth in functionality and system integrity.
In this role, you will collaborate with bus partners to define strategy, architecture, integration, implementation and support of SAP and related enterprise app for the finance, accounting and HR departments.
In this role, you will lead a forum of senior business and IT leaders to identify insights development opportunity, develop business case/approval, build a team and lead execution of multiple parallel analytics projects.
The Primary technical responsibilities will include administration of enterprise endpoint management, user experience customization, Microsoft Server Administration, and other major firm-wide legal applications.
In this role, the selected candidate must have technical expertise in one or more IT related fields including networking, Linux administration, Microsoft administration, and/or Cisco network configuration and management.
In this role, you will coordinate the configuration and operation of the Security Information and Event Management system, which acts as a repository and analysis center for information received from elements of the security architecture and other sources which can then be evaluated for anomalies which may indicate miscreant behavior.
In this role, the selected candidate will review project proposal/plan to determine time frame, budget, procedures for accomplishing projects, technical requirements, and allotment of available resources to various phases of projects.
In this role, the selected candidate will develop IT business contacts to place consultants, as well as understand and sell other company services; generate your own leads (leads will be provided by the company only sporadically).
In this role, the selected candidate creates Security requirements and negotiates priority in partnership with peer IT organizations in the identification, assessment, and implementation of security solutions.