The Internal Digital Business Analyst will work closely with the project team to gather and document business, functional and technical requirements via stakeholder interviews, workshops and focus group sessions, the Business Analyst will execute requirements analysis activities including documenting business inputs, creating process models, expanding user experience requirements, conducting feasibility studies and drafting business cases.
In this role, you will be responsible for creating and maintaining information technology and information security policies, standards and procedures which safeguard the integrity of and access to enterprise systems, files and data elements.
In this role, the selected candidate will ensure strategic objectives of the risk management program are met including the execution of risk assessment activities, coordination of risk response and program testing and validation.
In this role, you will focus on building and running Security Operations programs and executing on strategic projects including MFA, log monitoring and analysis, incident response, vulnerability and patch management, threat intelligence.
In this role, the selected candidate will assist with the development of policies and technical configuration standards; assist with the development of security training materials and programs for use throughout the firm.
In this role, the selected candidate will perform this job successfully, an individual must be able to perform each essential duty satisfactorily; this position will work closely with various technical teams.
This position is responsible for maintaining consistent and accurate product data within the Product Information Management (PIM) system; enabling data integration with SAP and other software platforms.
In this role, you will support the coordination, planning and execution of the annual IT budget and IT financial management processes; maintain IT asset data base and report on asset values, depreciation, and forecast.
In this position, you will provide network monitoring and log analysis from a variety of network sensors (e.g. firewalls, network taps, SIEM tools or packet capture software) to investigate suspect network activity.
In this role, the selected candidate will be responsible for recommending improvements in procedures, processes, operations and systems; collaborating with Product Management and Engineering to enhance products.