Business Analyst - Mid Level

Job Description:          Supports the derivation, definition, and capture of project, application and/or system requirements during the business or requirements analysis phases which include: identifying possible technical solutions and best value alternatives; identifying and documenting the requirements traceability throughout the project/product lifecycle; and the development of functional and/or technical specifications as required by the Government.          Identify and translate business requirements into functional and system requirements, information requirements, reporting requirements, interface requirements, data formats, operational characteristics, information flows, and security and accreditation considerations.          Develop use cases to capture the various ways that the system will be used and develop a requirements traceability matrix (RTM) specification document, including use cases where applicable and review/assist with development of technical requirements.          Document the relationships between requirements and other development lifecycle artifacts to ensure thorough coverage and functionality of all Government requirements via a published traceability matrix.          Produce a technical design to specify the technical architecture, technical functionality, DODAFs and other technical documentation required by the DoD; user interfaces and interfaces as required by the project/product.          Conduct system analysis support to ensure requirements compliance, identify problems of the existing application, correctly attribute them to automated processes and/or submission data and develop solutions.          Document the software release scope correlating the business requirements to the functional and technical requirements.          Create user interfaces that minimize training requirements, prevent help desk calls, protect the quality of the data and display error messages that guide the user to take the appropriate corrective action.          Implement software assurance into the SDLC to encompass the development and implementation of methods and processes for ensuring that software functions as intended while mitigating the risks of vulnerabilities, malicious code or defects.          Provide end to end software test plan to ensure test coverage of functional and technical requirements.          Provide application verification test plan, when migrating from legacy application to new technology solution. Qualifications Job Qualifications:          Must have a Bachelor's (BA/BS) or if no degree an additional 4 years of experience in addition to the year aforementioned years of experience, if the candidate has no degree.          5+ years of experience performing Business and Data Analysis.          Extremely organized          Proficient in Microsoft Office suit -- MS Project, Word, Power Point, and Excel          Excellent communication and organization skills          Analytically oriented and able to communicate findings both verbally and in writing          Familiarity with project management and software packages          Strong knowledge of UML Use Cases and Activity Diagrams          Knowledge of Compuware, Rational or other requirements software a plus          Strong experience in MS Office products          Strong experience in Visio          Strong understanding of business process and data flows          Strong understanding of System Development, or Application Development Life Cycle          Strong knowledge of Oracle 11g/12c          Familiarity with SQL Plus, SQL Developer or other SQL scripting Tool          Scheduling Tool software experience a plus          Project management/portfolio management software experience a plus          Candidate must by a US Citizen, per client requirements. 1684102
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.