Responsibilities:
* Feasibility Studies & Risk Assessment: Identify the need for feasibility studies and mitigate risks effectively.
* Requirements Gathering: Collaborate closely with Business and IT stakeholders to:
* Gather both functional and non functional requirements.
* Translate them into detailed technical specifications.
* Approach Definition:
* Define methods for requirements gathering.
* Elicit, analyze, document, and validate business requirements.
* Establish strategies for data analysis, migration, and data cleansing.
* Business Process Documentation: Use BPMN (Business Process Modelling Notation) tools to create and document business processes.
* Solution Integration & Migration Strategy:
* Contribute to the solution implementation/migration strategy.
* Identify new scopes and requirements, including parallel operations of as is and to be processes.
* Business Change Impact Assessment: Collaborate with Change Management teams to ensure successful adoption of new capabilities and services.
* Security Impact Analysis: Assess the security risks of new service developments, leveraging existing measures or mitigations, and identify benefit profiles.
* Communication Facilitation: Act as the bridge between business, IT teams, and key contributors throughout the project delivery phase.
* Testing & Validation:
* Define a test approach for identified requirements.
* Participate in solution validation through testing and ensure traceability of results.
* Documentation Updates: Maintain internal and external documentation, including standard operating procedures (SOPs) and training material.
* Operational Readiness: Ensure readiness of the project solution for operation.
* Methodology Utilization: Apply Clients in house methodology for clear and concise documentation creation.
Required Skills & Qualifications
Experience:
* 3 to 5 years as a Senior Business Analyst, capable of producing required work products.
Technical Knowledge:
1. Understanding of Identity Management concepts, such as:
2. Access provisioning/deprovisioning.
3. Role based access control.
4. Joiner/mover/leaver (JML) activities.
5. ServiceNow integrations.
6. Access control models and policies, security protocols and standards (e.g., SAML, Oauth).
7. IAM Tools: Experience in application onboarding.
8. LAM Expertise: Familiarity with Mainframe applications and security sub system data models.
9. Data Analysis Proficiency:
10. Experience with statistical data modeling and visualization tools.
11. Knowledge of data management principles, data