IT Business Analyst

  • Oakland
  • Veear
Job Description:
This role will analyze business technology needs for Functional Business Areas and the Cybersecurity organization. The successful candidate will work in the Cybersecurity PMO as a strategic partner and liaison who understands business drivers and desired outcomes to drive digital transformation that aligns with processes, procedures, and systems. The Agile Business Analyst will support the Product Owner and team in completing product ownership tasks. The candidate will work directly with Product Owner, Subject Matter Experts, Project Manager, Scrum Master, and other stakeholders to understand requirements and translate them into user stories and acceptance criteria, and refine product backlog, as required. The candidate document deliverables like governance and standards, business processes, and use cases to support the project. Additionally, the candidate may need to actively engage technical teams, such as Solution and Domain Architects, to provide recommendations on alternative solutions.
An ideal candidate should be able to assimilate domain knowledge quickly and have extensive experience researching and analyzing business requirements, then documenting in the most effective way for the audience. They should have experience working as part of an Agile team and be effective at influencing stakeholders to create the most value for customers.
Qualifications:
  • Bachelor's degree in computer science or engineering or a job-related discipline, or equivalent experience.
  • 4 years of closely related work experience, 3 of which is in business analysis.
  • 2 years of working experience in an Agile environment as a business analyst.

Desired:
  • Experience with Governance, Risk, and Compliance.
  • 5 years of direct business analysis experience.
  • Scaled Agile Framework (SAFe) Certificate.
  • CCBA-certification of Competency in Business Analysis.
  • IT Background (especially cybersecurity and infrastructure components).
  • Experience collaborating with Director and VP-level leadership.
  • Experience serving and meeting the needs of internal and/or external customers.
  • Direct participation in a diverse collection of high complexity projects related to IT security.
  • Experience in Agile methodologies such as Scaled Agile Framework (SAFe), LEAN, Kanban, and Scrum.
  • Utilities background in energy sector.
Knowledge Skills and Abilities:
  • Demonstrated experience of and knowledge in a broad range of IT and cybersecurity areas (e.g., applications, infrastructure, processes).
  • Systems thinking approach to problem solving with strong visualization skills.
  • Practical experience collaborating with stakeholders and others to identify, clarify, and articulate product vision.
  • Ability to demonstrate techniques for effectively interviewing stakeholders, SMEs, and users to understand customer needs and utilize this information to create user stories and generate appropriate business analysis artifacts such as: process flow maps, use cases, value stream maps, etc.
  • Capability to have birds-eye view (i.e., 100k foot view) of a problem as well as be detail-oriented.
  • Must demonstrate excellent communication skills at all levels, written, verbal, visual, and interpersonal.
  • Ability to analyze requirements and proposed solutions independently with limited guidance.
  • Ability to lead medium to high complexity level requirements efforts and coaching or mentor less experienced business analysts.
  • Ability to work effectively with other groups to persuade, exchange ideas and foster cooperation.
  • Demonstrated seasoned experienced-based judgment in applying and adapting techniques with high credibility of the project team members.
  • Ability to conduct and document a gap analysis.
  • Demonstrated familiarity with the following areas: testing, project management, related Lines of Business, software development, NERC regulatory compliance, NIST framework, SOX compliance, operational/disaster recovery, operations, maintenance, etc.
  • Experience conducting and documenting functional decompositions of systems.
Job Responsibilities
  • Manage regular cadence for story definition, story writing, story review, and story prioritization to maintain a well-refined and prioritized backlog of sufficient length to support the team's velocity when required
  • Ensures that stories are written by the team and Product Owner at the appropriate level of detail and size to allow team to deliver value frequently.
  • Clearly understands the needs related to the product by working closely with the Product Owner, SMEs, and other business partners, so they can clearly communicate the product vision and client's needs to the team.
  • Research and analyze requirements to ensure that the appropriate information and context is available for the team to conduct productive story writing sessions.
  • Reviews or creates process and flow maps to understand the business processes and system flows, in order to fully document the required business analysis deliverable.
  • Reduce complex problems to easily understood narratives and informational materials (drawings, infographics, presentations, etc.).
  • Work with the Product Owner and Delivery Lead to ensure that the roadmap is updated and reflects changes in business priority.
  • Evaluate and document alternatives that will provide the most effective valuable solutions to business problems.
  • Identify and document acceptance criteria, story dependencies to help facilitate backlog refinement and prioritization.
  • Provide timely and professional client-focused communications, anticipate client concerns and questions.
  • Provide consulting in information security technology alignment to the client to identify and satisfy the business needs.
  • Review designs and technical specification documents for alignment with business solution.
  • Understand the client's current and future business environment, effectively anticipate, identify, and meet the business needs.
  • Actively contribute to the business cases for Cybersecurity projects and initiatives as a key member of the Cybersecurity PMO.
  • Analyze end-to-end business processes of moderate to high complexity and information needs of the clients in one or more business functional areas.
  • Comply with NERC, SOX, and other standard process requirements.