Photon
Photon, a global leader in digital transformation services and IT consulting, works with 40% of the Fortune 100 companies as their digital agency of choice.
Responsibilities:
1. Have a proven track record for 4-6 years as a business analyst.
2. Experience working with teams located in different time zones including PST, EST, IST, and GMT+13.
3. Good analytical skills to review the documents shared by the client team and create BA deliverables.
4. First-hand experience in writing and managing user story documents, non-functional requirements, traceability matrix, etc.
5. Comfortable with technical requirement discussions and experience in mapping the requirements to API with JSON as request/response.
6. Participate in UAT, BUAT, and Post-production bug verification along with the development and QA teams.
7. Excellent time and stakeholder management, decision-making, leadership, and planning skills with the ability to learn quickly and multi-task in a fast-paced environment.
8. Work with products or customer organizations to ensure the integrity of the solution and alignment with overall strategy.
9. Provide quality deliverables through key work items: elicitation of business requirements, publication of cross-functional business flow diagrams, detailing functional and non-functional requirements, and publication of requirements traceability matrix.
10. Manage expectation and stakeholders effectively.
11. Excellent written and verbal communication skills.
12. Fluency in English, written and spoken.
13. Ability to think strategically and execute successfully.
14. Dedicated team player, both self-reliant and willing to multitask on various projects.
Technical Skills:
1. Proficiency in Microsoft Office (Word, Excel, PowerPoint, Visio).
2. Proficiency in the use of Confluence and Jira Agile delivery tools.
3. Proficiency in the use of Microsoft Visio.
4. Experience managing a team of 1-2 Business Analysts.
Additional Skills:
1. Knowledge of Aha project management tool, OmniGraffle, Flowchart Maker & Online Diagram Software.
2. Capability to understand new or existing systems and business processes.
3. Standardize requirements gathered across teams and conceptualize application workflow.
4. Participate in project planning, execution, and tracking.
5. Research and propose solutions for business problems in coordination with other teams.
6. Identify options for potential solutions and assess them for both technical and business suitability.
7. Collaborate with the development team to implement the solution.
8. Work closely with stakeholders and the technical team to ensure timely closure of requirements.
9. Generate frequent status reports to stakeholders and teams.
10. Conduct user trials and acceptance tests both in-house and externally to evaluate and enhance the product's value.
11. Maintain the business value of the product in all modes of communication.
12. Identify gaps, if any, with a proposed functional solution.
13. Outline problems, opportunities, and solutions for the business.
Security Protocols:
1. Evaluate and assess the effectiveness of existing security protocols, policies, and procedures.
2. Design, develop, and implement comprehensive security protocols and measures to protect against internal and external threats.
3. Conduct regular security assessments, penetration tests, and vulnerability scans to identify and address security vulnerabilities.
4. Collaborate with cross-functional teams to integrate security protocols into new and existing systems, applications, and infrastructure.
5. Provide guidance and recommendations to stakeholders on best practices for security protocols and risk mitigation strategies.
6. Stay informed about emerging threats, vulnerabilities, and security trends, and proactively recommend security enhancements and countermeasures.
7. Monitor security alerts, incidents, and breaches, and respond promptly to security incidents as needed.
8. Develop and maintain security documentation, including security policies, standards, guidelines, and procedures.
9. Conduct security awareness training and education programs for employees to promote a culture of security awareness and compliance.
10. Participate in compliance audits and regulatory assessments to ensure adherence to security standards and regulatory requirements.
Qualifications:
1. Bachelor's degree in computer science, information security, or related field; Master's degree preferred.
2. Proven experience in designing, implementing, and maintaining security protocols and measures in complex IT environments.
3. In-depth knowledge of security protocols, encryption algorithms, cryptographic techniques, and secure communication protocols.
4. Strong understanding of network security principles, including firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation.
5. Hands-on experience with security assessment tools and techniques, such as vulnerability scanners, penetration testing tools, and forensic analysis tools.
6. Certifications such as CISSP, CISM, CEH, or related certifications preferred.
7. Excellent analytical, problem-solving, and decision-making skills.
8. Effective communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders.
9. Ability to work independently and manage multiple projects simultaneously in a fast-paced environment.
#J-18808-Ljbffr