General Description: Responsible for supporting new and existing system initiative efforts. Defines systems capabilities to enable the business to grow and become more productive.
Responsibilities:
· Liaison between business stakeholders and technology teams.
· Transform requests into business requirements and technical specifications. Collaborate with teams to define project scope.
· Document and track product decisions and approach in a product backlog.
· Develop business cases, financial models, project plans, test plans, and test cases.
· Coordinate development, enhancements, system upgrades, validation, User Acceptance Testing (UAT), and delivery.
· Proactively identify issues, risks, and areas of improvement. Escalate and help eliminate impediments to team progress.
· Assist with research solution planning. Recommend software and system changes.
· Manage system conversion activities including data mapping, data analysis, configuration.
· Assist with vendor interactions and reviews to ensure compliance with contractual agreements.
Knowledge, Skills, and Abilities:
3+ years IT, systems analysis, and/or software project experience. Bachelor’s degree or equivalent. Experience with Agile and Scrum methodologies, associated tools, and software development lifecycle. PMP or Scrum Master certification a plus. Working knowledge of SQL, query tools, relational databases, and data analysis. Strong oral and written communication, interpersonal, coaching skillset. Self-motivated, team oriented and hands-on approach. Excellent planning, organization, problem-solving, and analytical skills with a focus on execution, value delivery, and customer service. Able to manage multiple, rapidly changing, high-visibility priorities and projects. Familiarity with insurance or sales applications and workflows a plus.
Cyber Security Job Responsibilities:
Operate in accordance with USI Policies for the Information Security Program (PISP) and USI Standards for the Information Security Program (SISP) Keep up to date with security updates and improvements. Implement improvements as appropriate. Protect systems against unauthorized access by appropriately defining access. Upgrade systems by implementing and maintaining security and technical controls.#LI-JM4
#LI-Remote