Description

Job Description

Have proven track record for 4-6 years as a business analyst.

Should have experience working with teams located in different time zones including PST, EST, IST and GMT+13.

Should have good analytical skills, can review the documents shared by the client team and create BA deliverables.

Should have first-hand experience in writing and managing user story document, non-functional requirements, traceability matrix etc.

Should be comfortable with the technical requirement discussion and have experience in mapping the requirements to API with JSON as request/response

Should be able to participate in UAT, BUAT and Post-production bug verification along with dev and QA team

Excellent time and stakeholders' management, decision-making, leadership and planning skills with the ability to learn quickly and multi-task in a fast-paced environment.

Work with our products or customer organizations to ensure that we maintain the basic integrity of the solution and that the enhancements, applications and localizations you design align with our overall strategy.

Provide quality deliverables through the following key work items: elicitation of business requirements, publication of cross-functional business flow diagrams, detail of functional and non-functional requirements, and publication of requirements traceability matrix.

Expectation management Stakeholder management Excellent written and verbal communication skills.

Fluency in English, written and spoken Ability to think strategically and execute successfully Dedicated team player, both self-reliant and willing to multitask on various projects

Have the following technical skills: Proficiency in Microsoft Office (Word, Excel, PowerPoint, Visio) Proficiency in the use of Confluence and Jira Agile delivery tools Proficiency in the use of Microsoft Vision Having managed a team of 1-2 Business Analysts.

 

Required Skills

Knowledge of Aha project management tool, OmniGraffle, Flowchart Maker & Online Diagram Software

Capability to understand the new or existing system and business process.

Standardise the requirements gathered across the teams and conceptualise application workflow.

Participate in project planning, execution, and tracking.

Research and come up with solutions for the business problems in co-ordination with other teams

Identifying options for potential solutions and assessing them for both technical and business suitability.

Work in collaboration with the development team to implement the solution.

Working closely with stakeholders and technical team to ensure timely closure of requirements.

Generate frequent status reports to Stakeholders & teams.

Conduct user trials & acceptance tests both in-house and externally to evaluate and enhance the value of the product.

Maintain the business value of the product in all modes of communication.

Identify gaps if any with a proposed functional solution.

Outlining problems, opportunities and solutions for the business.

 

Security Protocols

 

  1. Evaluate and assess the effectiveness of existing security protocols, policies, and procedures.
  2. Design, develop, and implement comprehensive security protocols and measures to protect against internal and external threats.
  3. Conduct regular security assessments, penetration tests, and vulnerability scans to identify and address security vulnerabilities.
  4. Collaborate with cross-functional teams to integrate security protocols into new and existing systems, applications, and infrastructure.
  5. Provide guidance and recommendations to stakeholders on best practices for security protocols and risk mitigation strategies.
  6. Stay informed about emerging threats, vulnerabilities, and security trends, and proactively recommend security enhancements and countermeasures.
  7. Monitor security alerts, incidents, and breaches, and respond promptly to security incidents as needed.
  8. Develop and maintain security documentation, including security policies, standards, guidelines, and procedures.
  9. Conduct security awareness training and education programs for employees to promote a culture of security awareness and compliance.
  10. Participate in compliance audits and regulatory assessments to ensure adherence to security standards and regulatory requirements.

Qualifications:

  • Bachelor's degree in computer science, information security, or related field; Master's degree preferred.
  • Proven experience in designing, implementing, and maintaining security protocols and measures in complex IT environments.
  • In-depth knowledge of security protocols, encryption algorithms, cryptographic techniques, and secure communication protocols.
  • Strong understanding of network security principles, including firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation.
  • Hands-on experience with security assessment tools and techniques, such as vulnerability scanners, penetration testing tools, and forensic analysis tools.
  • Certifications such as CISSP, CISM, CEH, or related certifications preferred.
  • Excellent analytical, problem-solving, and decision-making skills.
  • Effective communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders.
  • Ability to work independently and manage multiple projects simultaneously in a fast-paced environment.

Key Skills
Education

Any Graduate