The Business Analyst (BA) serves as the IT liaison to functional business process owners to translate and prioritize requirements for project and maintenance work. The Business Analyst is responsible for documenting high level business requirements and translating them into detailed specifications in order to support a portfolio of projects, including capturing and processing business partner requests for change. The Business Analyst also assists the business in determining which requirements can be automated and how they are integrated with other business and technical processes.
The Information Security Analyst - User Management is responsible for supporting the administration and implementation of user management activities and related projects for the Information Security group through daily operational assistance in the areas of user, access, and authorization management.
In this role, the successful candidate will develop strategy to migrate Power applications to contemporary platforms, ie. Cloud and Predix; identify, analyze, and interpret trends or patterns in complex data sets.
In this role, the selected candidate will creates IT solutions/services to solve business and infrastructure needs using appropriate design methodologies in close cooperation with project managers, business analysts and business customers.
In this role, you will coordinate with various project teams to communicate the necessity of security requirements and design constraints; analyze and make recommendations to improve network, system and application architectures, designs, and implementations.
In this role, you will plan, implement, upgrade, and monitor security measures for the protection of computer networks and information. Provides a full range of analytic duties using knowledge of multidisciplinary security concepts, principles and practices applicable to security administration.
In this role, you will assist solution development teams in designing, creating, and implementing secure solutions using formal project, program, portfolio management, Methodology, and/or resource management standards, software, processes, templates and tools that align IT Security to corporate goals.
In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
In this position, you will review and suggest improvements on how to deploy DataCap applications. Map development changes to test scenarios. The experience preferred would include IBM DataCap Taskmaster Application Manager, Rulesets, profiles, workflows, document hierarchy, RuleRunner, NENU, and change management best practices for change deployment. Enterprise content management support.
In this position, you will work with customers to gather requirements and represent those requirements to the development team using Agile practices and processes (namely User Stories and Scrum along with other development artifacts like business process flow diagrams and system level sequence diagrams).
The Information Technology (IT) Compliance Analyst participates in developing and executing the IT Compliance Program with focused regulatory monitoring and testing pertaining to IT, Cyber Security, Payment Card Industry Data Security Standards (PCI-DSS), Technology Infrastructure and the Program Management Office.
The Plant IT Analyst has the responsibility of implementing, maintaining, programming and troubleshooting IT applications in the plant to ensure maximum contribution to productivity, quality and responsiveness.
The IT Security Architect will provide oversight and guidance to ensure that technologies implemented to prevent, detect and respond to cyber-criminal risks and negative consequences are properly built, fit within the overall IT technology stack, and are strategically selected to position the company for the future.