REQUIRED BY cic GUIDELINES noc 2171:
Main duties
The following is a summary of the main duties for some occupations in this unit group:
• Information systems business analysts and consultants confer with clients to identify and document requirements, conduct business and technical studies, design, develop, integrate and implement information systems business solutions, and provide advice on information systems strategy, policy, management, security and service delivery.
• Systems security analysts confer with clients to identify and document requirements, assess physical and technical security risks to data, software and hardware, and develop policies, procedures and contingency plans to minimize the effects of security breaches.
• Information systems quality assurance analysts develop and implement policies and procedures throughout the software development life cycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.
• Systems auditors conduct independent third-party reviews to assess quality assurance practices, software products and information systems.
===== = == = = = = = = = = = = = = = = = = =
My version is it okay? :-X
• Interacting with the clients from service delivery for requirement gathering
• Identifying the use cases to transform them into logical and technical views thus creating a Business requirement document.
• Customizing the business area and ensuring the system acts accordingly to the constraints of the use Case
• Prepare ,update and present the support documentation for the existing and new interfaces for the support purpose
• Assisting team members in preparing the Standard operating procedures taking into account the impact and risks relating to the security of the ERP tool.
• Constantly maintaining the quality of the tool by performing exploratory, user acceptance and integration testing to ensure the tool runs smoothly, effectively and efficiently without taking any downtime.
• Interacting with the auditors and covering them through the overall process, functionalities of the tool, customizations deployed and maintenance aspects relating to information security.
Main duties
The following is a summary of the main duties for some occupations in this unit group:
• Information systems business analysts and consultants confer with clients to identify and document requirements, conduct business and technical studies, design, develop, integrate and implement information systems business solutions, and provide advice on information systems strategy, policy, management, security and service delivery.
• Systems security analysts confer with clients to identify and document requirements, assess physical and technical security risks to data, software and hardware, and develop policies, procedures and contingency plans to minimize the effects of security breaches.
• Information systems quality assurance analysts develop and implement policies and procedures throughout the software development life cycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.
• Systems auditors conduct independent third-party reviews to assess quality assurance practices, software products and information systems.
===== = == = = = = = = = = = = = = = = = = =
My version is it okay? :-X
• Interacting with the clients from service delivery for requirement gathering
• Identifying the use cases to transform them into logical and technical views thus creating a Business requirement document.
• Customizing the business area and ensuring the system acts accordingly to the constraints of the use Case
• Prepare ,update and present the support documentation for the existing and new interfaces for the support purpose
• Assisting team members in preparing the Standard operating procedures taking into account the impact and risks relating to the security of the ERP tool.
• Constantly maintaining the quality of the tool by performing exploratory, user acceptance and integration testing to ensure the tool runs smoothly, effectively and efficiently without taking any downtime.
• Interacting with the auditors and covering them through the overall process, functionalities of the tool, customizations deployed and maintenance aspects relating to information security.