Business Analyst - Information Security
- Employer
- Barclay Simpson.
- Location
- London, United Kingdom
- Salary
- Competitive
- Closing date
- 11 Aug 2022
View more
- Sector
- Consultancy
- Job Role
- Information Security Officer
- Job Type
- Contract
You need to sign in or create an account to save a job.
Job Description
Information Security Business Analyst required for UK based regulator. The role will be focused on an Endpoint Protection (EPP) programme.
Key Responsibilities
Information Security Business Analyst required for UK based regulator. The role will be focused on an Endpoint Protection (EPP) programme.
Key Responsibilities
- Defining the business analysis approach for programmes and projects in alignment with the Business Analysis Framework, ensuring that BA output on the project is fit for purpose, represents value for money, is correctly sized and is delivered on time.
- Facilitating the identification of and documenting the business requirements and working with colleagues from Procurement and Technology Solutions (BTS) Division and across the business to agree suitable solutions.
- Completing Business Analysis deliverables on large and complex programmes, producing comprehensive and accurate documentation (eg process mapping, data flow diagramming, user cases, customer journey mapping), facilitating workshops with the business utilising a variety of business analysis methods embracing gap analysis, requirements gathering and validation.
- Establishing and maintaining agreement between the business customer and solution provider on requirements including traceability management across the full project life cycle.
- Able to manage uncertain or difficult environments, providing challenge as and when required.
- Experience in business architecture, wider business design functions or service design/transition.
- In addition to the experience required within the procurement business domain as outlined above,
- the additional areas below would be desirable for specific projects:
- Defining outcome-based requirements.
- Experience in cloud-based access and identity management tooling engagements.
- As an ideal candidate will have good knowledge working of cyber security.
- Industry certification is highly advantageous.
- Endpoint Protection
You need to sign in or create an account to save a job.
Get job alerts
Create a job alert and receive personalised job recommendations straight to your inbox.
Create alert