Provide access management and AD/Windows Systems technical guidance by designing and deploying robust, stable, and manageable services to meet business requirements on a constant stream of new projects and technologies.
The Senior Systems Administrator is responsible for providing support to critical customer-facing applications. In this position you will be applying root-cause operation break fixes and other enthusiastic maintenance activities to keep the application up and running 24x7. This is a professional level position and requires strong execution and analytical abilities.
The Senior Business Systems Analyst is responsible for creating and refining business and systems requirements to address business opportunities and formulating documentation to support the development and implementation of the technical solution.
IT Systems Analysts are responsible for leading, managing, and facilitating activities pertaining to the development and completion of system deliverables. System deliverables include validating artifacts, developing system requirements, and assisting with translation into functional system specifications.
In this role you will research and analyze available test options and determine the best and most cost effective assessment methodologies. The selected candidate will conduct assessment data analyses and preparation for reporting.
Develop or assist in the development of work plans, time schedules, and project task items and schedules and assists with estimating resource needs for analysts, programmers, user personnel, consultants, equipment, and prepares routine project status reports.
Assists in the development of project cost and benefit estimates to establish project worth including the development of alternative considerations. This will result in recommendations for the installation of new systems or equipment, or to change existing systems and equipment
Provide specialist advice and acts as an Information Security liaison between the company and staff agencies through formal and ad-hoc inquiries; influence Information Security risk management strategies and approaches and educates risk owners on best practices.