In this role, you will be responsible for
elicit requirements using interviews, document analysis, requirements workshops, surveys, site visits, business process descriptions, use cases, scenarios, business analysis, task and workflow analysis.
In this role, the selected candidate must have a deep experience as an analyst exhibiting strong investigative and problem solving skills, communicating in a clear and succinct manner and effectively evaluating information/data to make decisions.
The Internal Digital Business Analyst will work closely with the project team to gather and document business, functional and technical requirements via stakeholder interviews, workshops and focus group sessions, the Business Analyst will execute requirements analysis activities including documenting business inputs, creating process models, expanding user experience requirements, conducting feasibility studies and drafting business cases.
In this role, the selected candidate will perform this job successfully, an individual must be able to perform each essential duty satisfactorily; this position will work closely with various technical teams.
The Business Analyst (BA) serves as the IT liaison to functional business process owners to translate and prioritize requirements for project and maintenance work. The Business Analyst is responsible for documenting high level business requirements and translating them into detailed specifications in order to support a portfolio of projects, including capturing and processing business partner requests for change. The Business Analyst also assists the business in determining which requirements can be automated and how they are integrated with other business and technical processes.
This role is responsible for providing risk evaluation, threat modeling, and deep technical expertise on projects and technology products. This role will work closely with the Director of Threat and Vulnerability Management to identify, evaluate, and prioritize potential weaknesses in ESIs infrastructure and applications using both manual and automated methods.
In this role, you will support the coordination, planning and execution of the annual IT budget and IT financial management processes; maintain IT asset data base and report on asset values, depreciation, and forecast.
In this role, you will focus on building and running Security Operations programs and executing on strategic projects including MFA, log monitoring and analysis, incident response, vulnerability and patch management, threat intelligence.
The position will require working with end users to design and develop enhancements applications that are critical to the success of the business. In addition, the position will involve supporting existing applications specifically our Telephone Number Administration System, called ANIMate.
This position is responsible for maintaining consistent and accurate product data within the Product Information Management (PIM) system; enabling data integration with SAP and other software platforms.
In this role, the selected candidate will assist with the development of policies and technical configuration standards; assist with the development of security training materials and programs for use throughout the firm.
In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
In this role, you will designs, codes, tests, and implements complex programs and packages. Develops appropriate programs and systems documentation according to established IT standards including the Meijer Methodology.
In this role, you will be responsible for creating and maintaining information technology and information security policies, standards and procedures which safeguard the integrity of and access to enterprise systems, files and data elements.