[Close] 

Business Analyst - Access Management

- Determine required IT Security business solutions and assist in implementing them
Conduct requirements-gathering activities, using a variety of internal and external data and conducting stakeholder interviews, support Security Engineers
Establishing adequate Requirement work products while taking in account quality, effort and timeline
Identify people and systems impacted by functional and non-functional requirements
Contribute information to IT Project/Program Manager regarding risks and issues
Supporting engineering and test teams with their understanding of the requirements and the resolution of issues
Evaluating existing processes and optimizing them in terms of efficiency and risk mitigation
Finding solutions to business problems as part of the overall strategic roadmap

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.