Technical Business Analystother related Employment listings - Springfield, VA at Geebo

Technical Business Analyst

The Business Analyst II, Information & Knowledge Management is responsible for helping business partners implement technology solutions in a cost-effective way by determining the requirements of a product, project, or program, and communicating them clearly to teams.
The Business Analyst II provides general analytical support across the IT organization, and therefore should understand key business processes, key business drivers, as well as the short and long-term strategies and related technologies.
During development, he/she deals with issues and questions, while providing support in implementing required changes.
The Business Analyst II also performs user testing and supports quality efforts.
Key Responsibilities will include, but are not limited to:
Aligns technology solutions with business strategies comprised of moderate to complex business processes Establishes a strong, positive relationship with business units to identify and document business requirements Participates in planning and prioritization meetings with business representatives Develops a prioritized list of project work including software modifications, report requests, and other business system-related development work to reflect the priorities of the organization Acts as a facilitator within all phases of the application lifecycle except development to assist the collective effort of business units towards their objectives.
Develops training materials; Supports and trains staff and business partners Supports the tier 2 needs of business units by troubleshooting and resolving issues Creates or assists writing process documentation and test plan documents Supports Scrum Master and the Development Team during application implementation and testing Requirements for success:
Bachelor's Degree in a technology-related field required Six or more years' related experience, including:
Experience in requirements gathering process for IT systems Experience writing use cases, workflow diagrams, and user stories with clear acceptance criteria Develop expertise in several vendor products, features, and associated workflows Experience with relational databases, and writing SQL queries Experience leading joint application development (JAD) working sessions with the end users Experience developing support materials, including Job Aids and Knowledge Base Articles Experience with reporting, Power BI is desired Experience with tracking risks, dependencies and uncover hidden assumptions SKILLS/ABILITIES REQUIRED:
Strong understanding of user experience and risk management best practices Skilled in business process engineering and relational database basics Demonstrated knowledge of at least one software development methodology Demonstrated ability to communicate technical/complex information both verbally and in writing Possess a can-do style and a demonstrated interest in understanding the business Strong written and verbal communication skills Effective time management skills, with the ability to juggle multiple competing priorities and respond to emergency situations effectively Strong leadership skills coupled with a drive to innovate Ability to work well both independently and in team, establishing and maintaining cooperation, understanding, trust and credibility Ability to function and to adapt to new goals, practices, etc.
within a dynamic work environment Proactively stays current in requisite skills within job scope, and incorporates knowledge and other feedback into work Consistently demonstrates respect for inclusion, diversity, and ethics .
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.