The IT Production Support Analyst role requires an individual with excellent interpersonal skills, as well as a strong understanding of various IT systems (both hardware and software) in order to provide excellent customer service.
In this role, the selected candidate will serve on or may lead teams in clearly defining requirements, deliverables and timeframes; escalate issues and make recommendations to resolve them to the appropriate audience.
In this role, the selected candidate will manage multiple functions including operational process improvement efforts, resolution of global supply chain challenges, on-time delivery commitments, forecasting, business analysis, and change management.
The Chief Information Security Officer (CISO) protects the information assets of IP & Science through managing risk, deploying effective cloud security risk framework and ensuring appropriate compliance.
In this role, the selected candidate will serve on or lead teams in clearly defining, with the customer, requirements, deliverables and timeframes; escalate issues and make recommendations to resolve them to the appropriate audience.
In this role, the selected candidate will be responsible for developing requirements and supplemental specifications for new applications, processes, and initiatives; and analyzing change requests/enhancements in existing applications.
The primary responsibilities will include: eliciting business requirements from business users and subject matter experts, define and document requirements, write functional specifications, and perform business process design in conjunction with operations teams.
The chief information security officer (CISO) is responsible for Implementing, enhancing and overseeing an information security program for the companys Top Financial Services client, including information security policy and the coordination of information security efforts across the organization.
In this role, you will performs risk assessments, technical security reviews, and vendor security assessments. Works with security operations to collect evidence and documentation into a management report containing issues, determine recommendations and remediation.
In this role, the selected candidate will be responsible for interfacing with clients directly and providing expert guidance to help respond to the incident. This will include elements such as advising clients on specific defensive actions to take, identifying additional indicators of compromise, and depending on the Security Analysts skill set, malware analysis and forensic examination.