The Systems Security Analyst III will help lead the Security Operations departments project activities, provide expert opinion in the selection and implementation of security tools, and work closely with members of the Risk, Infrastructure and Development teams as well as third party vendors to ensure appropriate assessment and remediation of information risk.
The Analyst will be a member of the core project team for the implementation of new processes and technology for global Requisition to Payment (Procurement) by assisting in the analysis of current and to be processes, participating in design teams, working with multiple suppliers, and preparing communications and documentation.
In this role, the selected candidate will prepare detailed specifications, requirements, scope documents and logic flowcharts for the development and implementation of moderately complex application programs.
In this role, you will work on or assists with basic tasks for the deployment of new solutions and enhancements/fixes to existing solutions. This includes, but is not limited to: trouble-shooting, problem-solving, issue resolution, user interaction, training, defining systems scope, gathering requirements, documenting design & functional specifications, research and fact-finding, configuration, testing, reporting, cutover, IS and business user coordination.
In this role, you will develop or assist in the development of work plans, time schedules, and project task items and schedules and assists with estimating resource needs for analysts, programmers, user personnel, consultants, equipment, and prepares routine project status reports.
In this role, you will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction and provide the technical support necessary to evolve/sustain Cyber infrastructure as well as data and processes.
A CACS (and/or CAS) Business Analyst will be responsible for working directly with clients to define the functional requirements associated with a CACS implementation, upgrade, and/or consulting engagement.
In this role, you will be responsible for achieving in-depth knowledge of Epic billing application software (Resolute) to serve as a bridge between end-user needs and the appropriate system build and configuration to support them.
Document project requirements using appropriate tools and techniques, including interviews, document analysis, workshops, surveys, site visits, business procedure documentation, use cases, scenarios, and business process analysis.
In this role, you will serve as a subject matter expert and gathers requirements, researches, and analyzes system details, parameters, or options to implement business rules, product offerings or changes to existing systems/applications.
In this role, the selected candidate will identify security issues for remediation and performs system/network STIG implementation and verification, software certificate of netwrothyness verifications, software and hardware management, system integration assitance and patching/auditing through HBSS, SCCM, SCOM, and SPLUNK.