The Business Analyst (BA) serves as the IT liaison to functional business process owners to translate and prioritize requirements for project and maintenance work. The Business Analyst is responsible for documenting high level business requirements and translating them into detailed specifications in order to support a portfolio of projects, including capturing and processing business partner requests for change. The Business Analyst also assists the business in determining which requirements can be automated and how they are integrated with other business and technical processes.
In this role, the selected candidate will design, build, test and implementation of roles, duties and privileges as needed in AX. Creating and maintaining security approval documentation for audit purposes.
To help you find the most relevant
jobs, we've come up with an approximate compensation for this
position. This is based on similar jobs with compensation
$80K to $100K -Bedford Park, IL
In this role, the selected candidate will be leading the collection, analysis, documentation, and coordination of a client's business requirements to support the delivery of projects and minor/major releases; collaborating with business partners within one or more business functions to align technology solutions with business strategies; supporting one or more highly complex business processes and demonstrating an in depth knowledge of a business area, in the context of the business client's function, to identify and communicate how IT solutions can help.
The selected candidate will be responsible for excellent written and oral communication skills with the ability to effectively communicate with information technology professionals as well as senior management and auditors, assessors, and consultants.
In this role, the selected candidate will be responsible for vulnerability remediation and continuous monitoring of the enterprise infrastructure. You will meet with and educate other technology teams and business partners on security incidents, and vulnerability remediation guidance related to on demand, regular vulnerability scans, and penetration testing results.
In this role, you will manage an Information Security team that research engineer, develop, implement, communicate, monitor, and maintain the information security (authentication, perimeter security, security & compliance tools, etc), & directory technology systems (software & hardware) and security policies / procedures.
In this role, you will review security events to identify and prioritize potential threats, identify trends and configure security solutions to identify threats, perform incident response, issue resolution, and assess and communicate security risk to the enterprise. Provide support by monitoring real-time security alerts, identifying and prioritizing potential threats.
In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
In this role, you will assist solution development teams in designing, creating, and implementing secure solutions using formal project, program, portfolio management, Methodology, and/or resource management standards, software, processes, templates and tools that align IT Security to corporate goals.
This role is responsible for providing risk evaluation, threat modeling, and deep technical expertise on projects and technology products. This role will work closely with the Director of Threat and Vulnerability Management to identify, evaluate, and prioritize potential weaknesses in ESIs infrastructure and applications using both manual and automated methods.
In this role, the selected candidate will be responsible for ensuring all systems are aligned with the IT long term strategy; identifying, recommending and implementing complex configuration solutions and implementing full cycle configuration to meet business needs, while creating and updating associated documentation.
In this role, the selected candidate will deliver consulting services to clients to help them achieve IT Security-related business goals; work with a variety of people from different internal organizational units, bringing them together to manifest controls that reflect workable compromises as well as proactive responses to current and future security risks.
In this role, you will collaborate with the business to document the requirements for financial accounting principle and standards, profit and loss as well as cash flow including subscription and redemption and fee import and accruals.