Business Security Analyst Resume Samples

4.9 (93 votes) for Business Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the business security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
SM
S Mayer
Savanna
Mayer
51986 Aurelio Drive
Boston
MA
+1 (555) 245 3298
51986 Aurelio Drive
Boston
MA
Phone
p +1 (555) 245 3298
Experience Experience
Boston, MA
Business Security Analyst
Boston, MA
Hoppe-Hettinger
Boston, MA
Business Security Analyst
  • Researches, evaluates, and implements Identity and Access Management Systems
  • Provides IAM Consulting for integration with existing IAM systems
  • Maintains knowledge of security laws, principles and practices and identity management best practices
  • Manages communication regarding security tools and the implementation of entitlements
  • Identifies security gaps and suggests solutions to mitigate the risks in accordance with the business owners’ risk tolerance
  • Assists teams in various security and privacy risk mitigation efforts; including incident response
  • May participate in projects or in managing the strategy and roadmap implementation for Access Management
Los Angeles, CA
Business Systems Analyst Iv-security
Los Angeles, CA
Schneider, Ritchie and Gislason
Los Angeles, CA
Business Systems Analyst Iv-security
  • Perform other duties as assigned
  • Develop, recommend and document adjustments to workflow to streamline processes
  • Conduct and/or facilitate user acceptance testing to include developing and executing test cases, communication with project teams, validating and documenting results
  • Provide demonstrations of proposed solutions and technology; drive for team consensus
  • Develop test plans, test criteria, scenarios and documentation; ensure acceptance of delivered solutions
  • Monitor performance of systems to ensure continued systems efficiency
  • Investigate operational problems; recommend solutions to customer
present
Houston, TX
IMS Senior Business Analyst, ERP Security
Houston, TX
Mills LLC
present
Houston, TX
IMS Senior Business Analyst, ERP Security
present
  • Design, coordinate and oversee security testing procedures to verify the security of system applications and manage the remediation of identified risks
  • Coordinate new user setup and existing user change workflow (Security Level 1)
  • Understand technical issues and communicate their implications to management and other business stakeholders
  • Strong commitment to continuous improvement
  • Communicate security standards and policies
  • Design and implement quarterly user security review
  • Collaborate with and provide guidance to peers on the Development team, Power Systems Security admin team, and ERP Solutions & Support team as it relates to ERP security
Education Education
Bachelor’s Degree in Information Technology
Bachelor’s Degree in Information Technology
Syracuse University
Bachelor’s Degree in Information Technology
Skills Skills
  • Solid understanding of Change Management, Audit and Accountability, Configuration Management and Risk Assessment control families in NIST SP800-53 Rev 4
  • Solid understanding of the Risk Management Framework as outlined in NIST SP800-37 Rev 1
  • Solid organizational abilities
  • Strong written, verbal, and interpersonal communication skills
  • Strong team player committed to excellence and adherence with Northrop Grumman values, ethics, and standards of conduct
  • Knowledge of SSA and its operations
  • Solid understanding of Cyber Security
  • Coordinates analysis necessary to identify viable solution sets
  • Advanced Excel knowledge
  • Ability to clearly explain technical concepts using non-technical language.  
Create a Resume in Minutes

15 Business Security Analyst resume templates

1

Business Security Analyst Resume Examples & Samples

  • Provides IAM Consulting for integration with existing IAM systems
  • Manages communication regarding security tools and the implementation of entitlements
  • Develops standards and policies to address regulatory and internal security requirements
  • Assists teams in various security and privacy risk mitigation efforts; including incident response
  • May participate in projects or in managing the strategy and roadmap implementation for Access Management
  • BS. in Computer Science, MIS or related degree
  • Preferred two (2) years of related experience in Information Security and Project Management or an equivalent combination of education, training and experience
  • Knowledge of the following preferred
  • Authentication, Authorization, Provisioning, and directory services
  • Access control and security features of multiple systems and platforms
  • Understanding of regulated industries such as the financial market and the relevant constraints and process requirements recommended for compliance
  • Working SQL knowledge required
2

Cyber Security Defense Business Analyst Resume Examples & Samples

  • Building the foundation for the development effort by capturing the business context - problem, current state, desired future state, objectives, business needs and impacted user groups
  • Developing requirements (business, user and software requirements — functional and non-functional) and establishing traceability to the business vision
  • Managing the requirements through the project lifecycle by establishing and maintaining agreements between the customer and the project team
  • Playing a critical communications role by interacting with user (business domain) and with developers and testing personnel (technical domain)
  • Ensuring the requirements are specified in a manner suitable for the intended audience and are understandable, unambiguous and capable of being implemented and tested
  • Ability to navigate the IT team and business sponsors through a level of ambiguity including business process change; building organization and structure to requirements to drive out and define detailed requirements in an efficient manner
  • Working with the project manager and the business customer(s) to define requirements stakeholders, requirements conflict resolution procedures and the requirements team structure
  • Understanding the software development approach being used and defining how the requirements development will be conducted (i.e. elicitation, analysis, specification and validation)
  • Proficient requirement meeting facilitator, demonstrated experience in facilitating sessions (20 people) using techniques to help define scope and requirements during the lifecycle
  • Writing and reviewing business, user and non-functional/system level requirements in the form of Use Cases, UML, and other similar structured requirements documentation
  • Responsible for ensuring change control and change management procedures are followed within the project team as they relate to requirements
  • Understanding the business and project scope
  • Ensuring that quality business analysis standards are met as prescribed by IT Services through the effective implementation or use of approved processes, methodologies and deliverables
  • Experience with obtaining requirements and documenting use cases with identity management systems
  • Experience working in an information security organization, or direct responsibilities to such an organization
  • Selecting the appropriate methods to elicit and document requirements
  • Defining the procedures on how the requirements will be managed (i.e. base lining requirements, requirements change control and requirements traceability)
  • Selecting the appropriate analysis and specification models and ensuring that requirements are of high quality
  • Assessing change requests related to requirements to assess overall impact
  • Determining ‘fit for purpose’ requirements
  • Direct supervision provided by a Program Leader/Manager or Service Delivery Manager/Team Leader; frequency on a weekly or as needed basis
  • Senior business analyst is expected to act independently to deliver and manage requirements to schedule, budget and scope; support provided as required and requested, and is self-driven and motivated
  • Senior business analyst leads business analyst teams consisting of cross functional, global, and virtual groups; directly supervises staff; assigns responsibility to members; monitors progress
  • Senior business analyst coaches, mentors and supports less experienced business analysts
  • Business analysis role with personal accountability for delivering and managing requirements to time and cost for projects typically up to $5m in value and 12 to 18 months in duration
  • Demonstrated experience writing and reviewing business, user and non-functional/system level requirements
  • Experience in delivering Cyber Security Projects
  • Comfortable dealing with difficult stakeholders and opinionated developers and architects during facilitated sessions and during the development lifecycle
  • Adept at getting sign off of business (functional and supplemental) requirements from user community
  • Experience in selecting and executing elicitation techniques such as Interviews, Exploratory Prototypes, Facilitated Workshops, Focus Groups, Observation, User Task Analysis, Documentation Study and Surveys and overall Process Re-engineering
  • Experience of relationships with senior customer staff
  • Development and deployment of formal business analysis methods and tools to govern and control programs
  • Solid understanding of the following requirements models: Stakeholder Categories, Actor Tables, Glossary, Context Diagram, Data Model, Class Model, Data Dictionary, Event Response Tables, State Diagrams, Business Rules, Decision Tables, Process Maps, Use Cases, and Activity Diagrams
  • Experience with and knowledge of Enterprise class Identity Management Systems, including the understanding of provisioning rules, policies, and entitlements
  • Experience and understanding of the management of privileged accounts in order to obtain clear requirements and document accurate use cases
  • Working knowledge of Role Based Access Control (RBAC)
  • 7 to 10 years in a corporate IT environment
  • 5 to 10 years experience in business analysis or related technical field (application development, deployment/implementation and infrastructure)
  • At least 3 years in an information security related function
3

Security Business Engagement Security Analyst Resume Examples & Samples

  • Lead and assist in design and delivery of security solutions and services into Barclaycard clients
  • Work within virtual teams of security and technical specialists to ensure quality delivery of world class security solutions into the business
  • Competent to discuss the underlying technology with product developers
  • Understands the security controls/processes required to implement a robust secure application within the credit card space and can clearly articulate the risk associated with the failure of those controls/processes
  • Knowledgeable of the full spectrum of application control techniques
  • Has contributed to the creation of technology-related security best practices and processes
  • Understands security operations from a people, process and technology perspective
  • Understands routine IT security monitoring and administration tools
  • Knows what should be communicated, when and to whom
  • Actively seeks ways to understand, mitigate or reduce risks
  • Appreciation of risk mitigation by both technical and non-technical measures
  • Understands the importance of effective technical documentation in identifying and managing IT security risks
  • Familiar with integration and implementation issues and their architectural implications
  • Explored and evaluated security considerations for multiple technologies
  • Can describe alternative problem-solving approaches and their optimal uses
  • Good communication skills and ability to interface with both technology and management
  • Freely shares information and experiences and seeks knowledge from others
4

Rohq-information Security Continuity of Business & Controls Analyst Resume Examples & Samples

  • Experience in Risk Management, Compliance or Identify and Access Management is preferred
  • Candidate must have a proven track record of working in a global environment
  • Candidate should be a self-starter with strong written and verbal communication skills
  • The candidate will be required to be available for on-call support and remote work as deemed necessary
5

Rohq Gida Information Security Continuity of Business & Controls Analyst Resume Examples & Samples

  • Minimum 2 years experience performing ID administration on the Wintel platforms and Active Directory
  • Good working knowledge of industry standard information security practices
  • Other duties not listed may be required from time to time
6

Information Security & Business Continuity Analyst Resume Examples & Samples

  • Be an advocate and subject matter expert on the Enterprise Security and Control Policies and Standards Program for the Fiserv EMEA Business Unit
  • Participate in Regional guidance and monitoring as appropriate in support of the Enterprise Security and Control Policies and Standards
  • Participate in reviewing all changes to the Enterprise policies and standards. Track and monitor all gaps identified through to remediation
  • Work with Director, Compliance, EMEA, EMEA Leadership Team and Line Managers to communicate relevant changes to standards and policy that may affect their area of the business
  • Manage and oversee all aspects of Business Continuity planning, testing and monitoring within the region
  • Proactively analyse and identify areas of security risk in EMEA and work with Director, Compliance, EMEA, Line Managers and ER&R to mitigate the risk
  • Proactively monitor business unit activities, processes, and new technology implementations to ensure compliance with the Fiserv Security and Control Standards program, and identify areas of existing or new technology which may not be in compliance with enterprise standards, working with Director, Compliance, EMEA, and the technology 'owners' to either develop appropriate plans for remediation or request an exception to the enterprise standards
  • Provide support for any internal or external audits (for example SSAE16) and assist sales/client management with any client specific security requirements, issues, questionnaires or requests as requested to do so
  • Facilitate security oversight reviews, monitoring and analysis in support of security processes in place at the BU
  • Assist with defining and managing regional or business unit specific security related procedures and processes required to support the Enterprise Security and Control Standards
  • Work with application development teams to ensure secure development processes, testing procedures and standards are complied with, and assist in the timely remediation of identified vulnerabilities in the systems and applications offered to clients
  • Collaborate with ERR compliance team members in supporting client audits, internal corporate audits, SSAE16 audits, regulatory examinations and client audit questionnaires
  • A good understanding of
7

Business Security Analyst Resume Examples & Samples

  • Build and operationalize the security governance and controls program to ensure scalability, repeatability, and standardization across geographies, business units, and external partner environment
  • Perform risk assessments over business areas, geographies, and vendors to identify and remediate security gaps
  • Liaison with the business to harmonize and leverage the controls to support compliance related activities from a business perspective, and utilize and enhance existing technologies
  • Analyze and evaluate global business processes and customer solutions compared to regulatory and industry requirements
  • Maintain an understanding of global security regulations and compliance frameworks and standards
  • Lead regulatory review meetings and participate in customer vendor due diligence sessions to discuss Diebold's control environment and to explain risk assessment program
  • Prepare and conduct meetings with clients and peers to ensure project requirements are completed and your portion of the engagement is fully delivered
  • Develop and maintain effective working relationships with customers, business partners, and other team members
  • Promote new business opportunities by identifying issues and potential solutions
  • Work with third party assessors that evaluate Diebold against compliance frameworks such as SOX, PCI, GLBA, etc
  • Lead third party audits and examinations over global Diebold facilities, external business solutions, and customer solutions
  • Bachelor's degree in security, information technology, audit, accounting, or finance is required or equivalent experience. Master’s degree preferred
  • One or more years of progressive experience in Information Security or implementing security controls
8

CIO Business Analyst Co-op-information Security Resume Examples & Samples

  • Assisted with a key Business Banking Project managing a “Request for Proposal” process, collating score card data, and attending vendor demonstrations
  • Manage Vendor licenses and have communication with the vendors (like Bloomberg, Murex, S&P, DataScan, ACI, etc.)
  • Interact with Legal on contract status
  • Create business case and SAP requests for funding
  • Track funding against Budget
  • Currently Enrolled in an accredited degree program in a major that can be relatable to our business: (Finance, Economics, Math, Business, MIS, Engineering, etc.)
  • Cumulative GPA is 3.0 or above
  • Clear explanation why a role with SBNA CIO office would help with career aspirations
  • Highly motivated and results oriented with a desire to exceed expectations
  • Demonstrates intellectual curiosity and courage in their leadership style
  • Crisp communication skills with the ability to express facts and ideas clearly both verbally and in writing, interacting professionally, transparently and effectively with people at all levels
  • Strong critical thinking and analytical skills with the ability to develop solutions to complex challenges
  • Ability to multi-task as required
  • Ability to work independently on special projects
9

Security Solutions Business Analyst Resume Examples & Samples

  • Acting as a liaison with other Credit Suisse team to elicit their security requirements for Data Protection and Application Security Products
  • Acting as the voice of the customer within the solution delivery process
  • Delivering written Requirements Specification documents that describe solution-agnostic requirements in necessary and sufficient detail
  • Business case development and increase the overall knowledge and awareness of Secure products and services
  • Ensuring that individual security solutions form an effective, holistic security mechanism
  • Documenting the conceptual, physical and logical configuration of vendor products, in-house solutions and other technical components with necessary and sufficient detail
  • Responsibility for audit and compliance areas such as oversight and delivery of internal and/or external audit actions ensuring timely and high quality delivery as well as resolution of audit and compliance actions/issues
  • Provide technical product expertise for assigned products from portfolio; identify and develop new requirements and services to ensure ever increasing value from product and services portfolio
  • Overall 5+ years of experience which span one or more IT disciplines like: BA, solution providing, consultancy (technical or process), engineering or support
  • Overall knowledge on security concepts: data protection, application and cloud security
  • Extremely high standard of written communication
  • Formal training or Certification (e.g. BCS, ISEB) in Business Analysis is an advantage
  • Security certification is an advantage: CISSP, CISA, CSSLP
10

Business Security Analyst Resume Examples & Samples

  • Ambassador and Evangelist for the Information Security Program. Leadership in execution of the Information Security Program. 10%
  • Monitor, Schedule and Communicate Information Security Tasks, Events and Trends.Documentation of the Information Security Program (Security Policies, Security Guidelines, Best Practices, Checklists, etc.).Documentation of the Information Security Program (Security Policies, Security Guidelines, Best Practices, Checklists, etc.) 10%
  • Security Infrastructure (including IDS, IPS, Secure OS, Anti-Virus, Encryption,Firewall, etc.) Engineering. Security Infrastructure Implementation and Operations 5%
  • Threat and Vulnerability Management (including alerting services, digital signing, application security, and investigations) 20%
  • Operational Assurance and reporting (Network and Application Penetration Testing, Host-based IDS, Forensics, Incident Handling, Auditing, Content management Network Access Control, SLAs, etc.) 20%
  • IT and Business Unit collaboration for security architecture, engineering, implementation and operations 10%
  • Other related duties as assigned 25%
  • Ability to clearly explain technical concepts using non-technical language.  
  • 5-8 years information security experience in a large and complex business environment
  • 2-3 years experience remediating information security risks as part of vulnerability assessment and remediation program
  • Proficiency with MS-Office applications including Word, PowerPoint, Excel, Visio and Project. Knowledge of security methodologies, policies, standards and best practices
  • Knowledge of information technology systems, infrastructure and operations
  • Ability to draft and implement operational procedures and documentation
  • Collaborates effectively with cross-functional entities across the enterprise
  • Organizational direction, time management, problem-solving, prioritization, goal setting, leadership and motivation, negotiation, interpersonal relations, verbal/written communications and human resource management
  • General understanding of the client lifecycle functions, including sales, implementation and ongoing services
  • French and English fluent   
11

Security Solutions Business Analyst Resume Examples & Samples

  • Provide technical product expertise for assigned products from portfolio; identify and develop new requirements and services to ensure ever increasing
  • LI-AT1*
  • LI-MS1*
12

Business Security Analyst Resume Examples & Samples

  • 3 years’ experience in developing, implementing, or evaluating IT security policies and procedures, system security plans, change management policies and procedures, configuration management plans, security audit plans, and security risk assessment plans
  • 2 years’ experience working on cybersecurity engagements with the Federal government
  • Able to obtain a public trust clearance
  • “Big Four” security audit and management consulting experience supporting Federal government contracts
  • Experience in FISMA, FISCAM, NIST Cybersecurity Framework, NIST information security standards and guidance including FIPS 199, FIPS 200, NIST SP800-53 Rev 4, and NIST SP 800-53A
  • Solid understanding of Change Management, Audit and Accountability, Configuration Management and Risk Assessment control families in NIST SP800-53 Rev 4
  • Solid understanding of the Risk Management Framework as outlined in NIST SP800-37 Rev 1
  • Solid understanding of Cyber Security
  • Knowledge of SSA and its operations
  • Solid organizational abilities
13

Security Business Systems Analyst Resume Examples & Samples

  • Conducts the analysis and documentation of business needs and requirements for assigned business clients and/or systems. Employs consulting techniques such as performing gap analysis between current and desired processes and systems, root cause analysis, defining project scope, coordinating cost/benefit analysis, and ensuring the appropriate areas in IT are involved
  • Develops the functional system design and translates into functional specifications that includes user procedures, flowcharts, reporting, screen definition, logical system flow and implementation plans. Participates in structured walkthroughs and peer reviews of deliverables. Familiar with technology and business use of technology on various platforms
  • Performs the function of a project leader or participates as a business lead, project team member or subject matter expert as assigned. Oversees various system projects of a moderate complex nature. Employs the latest project management techniques and complies with the Banner Bank’s Development Methodology
  • Ensures that new or modified processes and systems meet project objectives and business requirements. Collaborates with technical and business team members to define and review test plans as needed. Coordinate with technical team and clients to perform acceptance testing
  • Performs research and provides information, advice and cost-effective recommendations for business process improvements based on industry best practices and trends, as they relate to the assigned clients’ business objectives
  • Conducts feasibility studies of proposed projects with vendor analysis and design reviews
  • Identifies and resolves production issues using basic research, analytical and problem solving skills. Acts as primary contact for assigned business area
  • Assists in the development of the assigned clients’ list of desired projects and business initiatives
  • Coordinates the preparation and ongoing review of Service Level Agreements (SLA) for assigned areas as required
  • Provides for and/or participates in user training for assigned areas as required, including coordinating documentation, training material and delivery of training
  • Assists in the management of IT vendor relationships for third party application and data products that are in direct support of the functional areas
  • Assists in internal process improvements of department standards, methodologies, project management, change control and quality assurance standards
  • Guides and advises less experienced business analysts
  • Continues professional development through attendance at meetings, professional seminars and conferences
  • Complies with policies, procedures, security requirements, and government regulations
  • Excellent interpersonal skills and customer service orientation combined with ability to communicate across business lines at all levels
  • Strong research, analytical and organizational skills
  • Strong technical and problem-solving skills
  • Ability to handle multiple projects and meet concurrent deadlines in a rapid development environment
  • Ability to direct others
  • Bachelor’s degree in computer science, business management, or equivalent, required
  • Five years of previous experience in a functional business area, information technology, finance systems or applications, relationship management or business process re-engineering required
  • Working knowledge of Microsoft products including Word, EXCEL, PowerPoint, MS Project and Visio
  • Knowledge of systems development diagramming techniques such as Entity-Relationship, Use Case, Process Modeling and Data Flow Diagramming
  • Previous experience managing projects for technical and business solutions preferred
  • Certified PMP (Project Management Professional), CBAP (Certified Business Analyst) or CCBA (Certified Competency in Business Analysis) a plus
  • Knowledge of federal and state laws/regulations relative to the IT Industry
14

Epic Security Business Systems Analyst Resume Examples & Samples

  • Epic Certification in one OR more applications required
  • Epic Security experience required
  • 3 years of Epic Security experience preferred
  • Epic Security Coordinator Proficiency/Certification desired
15

Business Systems Analyst Iv-security Resume Examples & Samples

  • Analyze and document business requirements and operational processes
  • Develop and coordinate issue resolutions; monitor results for long term viability
  • Develop test plans, test criteria, scenarios and documentation; ensure acceptance of delivered solutions
  • Investigate operational problems; recommend solutions to customer
  • Monitor performance of systems to ensure continued systems efficiency
  • Provide demonstrations of proposed solutions and technology; drive for team consensus
  • Represent the business unit in identifying, analyzing and communicating system solutions
  • Research emerging technologies and recommend solutions that align with business goals
  • Apply and communicate changes and new trends in systems/technology
  • Conduct and/or facilitate user acceptance testing to include developing and executing test cases, communication with project teams, validating and documenting results
  • Develop, recommend and document adjustments to workflow to streamline processes
  • Discover issues and determine scope, scale and impact
  • Troubleshoot system issues
  • Experience in leading large projects/initiatives which have business risk and impact
  • Extensive experience in researching, compiling, and documenting data, business processes, and workflow
  • Drive problem resolution including determining root cause, scope and scale of issues
  • Advanced research, analytical, and problem solving skills
  • Ability to work collaboratively in teams, build strong relationships, gain confidence, and effectively communicate
  • Advanced skill following, interpreting and applying relevant data/instructions to guidelines, procedures, practices and regulations
  • Proven experience of variety of software and integrated complex systems in a fast-paced environment
  • Significant experience in translating business requirements into technical solutions
  • Proven ability to manage time productively while rapidly adapting to changes in priority
  • Strong expertise with Microsoft Office Products (Word, Excel, PowerPoint, Visio, Project)
16

Business Security Analyst Resume Examples & Samples

  • 6-8 Years Business Analyst Experience (Must have experience writing requirements BRD or FRD)
  • Experience with or exposure to technologies related to IT security services such as Identity and Access Management, Data center, desktop and network security
  • Insurance Industry Background
  • Owns the analysis and understanding of medium to complex initiatives
  • Documentation of business and technical requirements
  • Drives the business requirements gathering process, including the creation of deliverables
  • Conducts detailed research required to ensure requirements meet project objectives
  • Coordinates analysis necessary to identify viable solution sets
  • Follows the company's business requirement's documentation (BRD) process
  • Creates and delivers work estimates to client(s)
  • Delivery of solution design and technical documentation
  • Coordinate the development, testing and implementation of IT solutions and services
  • Identifies and recommends improvements to BSD processes
  • Verification and validation of requirements, obtaining approvals on solution requirements and traceability
  • Lead the validation of requirements against defined business needs, maintaining requirements for future reuse, traces requirements from business case to implemented solution
  • Manage the deployment of tools and methodologies to identify process and operational efficiencies in business current and future state models
  • Understand and create business cases to implemented solutions
  • Organizes and synthesizes large amounts of information provided by stakeholders
  • Creates various types of UML (Unified Modeling Language) diagrams
17

Information Security & Continuity of Business & Controls Analyst Resume Examples & Samples

  • 3+ years of working experience
  • Sound technical understanding
  • Background in tech control, infrastructure, or quality reviews
18

IMS Senior Business Analyst, ERP Security Resume Examples & Samples

  • Design, coordinate and oversee security testing procedures to verify the security of system applications and manage the remediation of identified risks
  • Coordinate new user setup and existing user change workflow (Security Level 1)
  • Design, implement, and maintain Role Based and Business Unit security for JDE EnterpriseOne
  • Collaborate with and provide guidance to peers on the Development team, Power Systems Security admin team, and ERP Solutions & Support team as it relates to ERP security
  • Design and implement quarterly user security review
  • Understand technical issues and communicate their implications to management and other business stakeholders
  • Formal systems education/training required
  • B.S. degree in Business, related field, or equivalent experience required
  • Minimum 5 years business process experience
  • Highly motivated to build a thorough knowledge of user functions
  • Excellent problem solving, organizational, and communications skills
  • Strong commitment to continuous improvement
  • Excellent business analysis and project management experience required
  • Advanced knowledge of PC applications
  • Able to work with stakeholders at any level in the corporation
  • Driven to continue technology education
19

Senior IT Business Risk / Security Analyst Resume Examples & Samples

  • Four year college degree in Information Systems or Technology related field required
  • Four to five years IS audit experience, or four to five years technical experience preferred
  • Professional Certification (CISA, CISSP, CISM) or advanced degree preferred
  • Healthcare experience preferred
  • Strong analytical skills, interpersonal, organizational and oral/written communication skills
  • Self-directed, and able to work independently
  • Proven ability to meet goals and work at a high performance level
  • Ability to work within a team environment and interacting with management
  • Knowledge of ACL, UNIX, Windows, LAN, WAN, Oracle, SQL, SDLC, Firewalls, Routers, COBIT, SOX 404, network security, IT general controls, application and database controls
20

Security Transformation Business Analyst Resume Examples & Samples

  • Designing and building security technology solutions aligned to a global central service environment
  • Delivering enterprise security technology
  • Working with multiple stakeholders across functional and technical skillsets
  • Managing project implementation of core security technologies
  • Building & maintaining relationships across the network of firms to effectively deliver Security Transformation activities on behalf of the team
  • Encouraging improvement and innovation within Security Transformation; and,
  • Nurturing and developing less-experienced staff through coaching and written/verbal feedback
  • Engineering with enterprise security technology
  • Driving and executing the delivery of global security solutions for member firm adoption
  • Contributing to the development of new subject matter/technical domain expertise
  • Resolving complex problems by continuously applying significant independent judgment and by collaborating with others
  • Influencing others through a small team of direct reports, through work on projects and in teams, and/or through leading portions of larger projects
  • Mapping long term business requirements to complex security architecture frameworks
  • Encouraging improvement, innovation, nurturing, and developing less-experienced staff through coaching and written/verbal feedback
  • Engaging with teams from project inception to understand goals and create project plans
  • Reporting at team and leadership levels on project status, execution of project based on cost, service level, and performance
  • Developing and distributing internal project communications and participating in the development and review of Firmwide project communications
  • Identifying areas of change management and suggesting innovative ways to address it
  • Working with leaders/owners of the process or service to be knowledgeable of current practices and identifying areas for improvement; and,