In this role, the selected candidate will implement processes to document and monitor the network portfolio using a risk based approach; lead new and recurring network security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, the selected candidate will validate both proposed and developed solutions to ensure the solution addresses the business need; identify and facilitate key decisions throughout the development effort, and ensure they are communicated to stakeholders.
In this role, you will develop online reports and reporting dashboards for business stakeholders, including advertising/marketing, digital channel strategists, site optimization teams, and others across the enterprise.
In this role, you will be responsible for preparing and delivering the Senior Leadership Team operational project GO/NO GO information and will make recommendations based on the Service Transition Audit and risk assessment.
In this role, you will manage lead assignments for the sales organization, assist with research items in the database, supporting the senior analysts with database inquiries and providing basic reporting requests.
In this role, the selected candidate will analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.
The business/systems analyst will have strong analytical and problem solving skills and some technical skills. The analyst should have excellent communication skills, both spoken and written, and will work directly with the customer and developers.
The Information Security Policy Analyst is responsible for the creation of presentations, highlighting benefits of new and updated documents and communication messages, intended for EY leadership, stakeholders and general staff.
The business analyst manages the requirements development process through the elicitation, analysis, specification and verification of multiple levels of requirements (business, user, solution, and data) and supports the ongoing management of the requirements.