Writes ETL (Extract / Transform / Load) processes, designs database systems, and develops tools for real-time and offline analytic processing. Troubleshoots software and processes for data consistency and integrity. Integrates large scale data from a variety of sources for business, technology, and risk stakeholders to generate insight and make decisions. Translates requirements into design specifications and code. Responsible for writing complex programs, ad hoc queries, and reports. Ensures that all code is well structured, includes sufficient documentation, and is easy to maintain and reuse. Partners with internal clients to gain an enhanced understanding of security functions and informational needs. Gains expertise in tools, technologies, and applications/databases in specific to the firm’s USP program. Possesses a deep understanding of security vulnerability analysis, risk scoring, and prioritization, incorporating threat intelligence, exploitability, and environmental context. Leads all phases of solution development. Explains technical considerations at related meetings, including those with internal clients and less experienced team members. Tests code thoroughly for accuracy of intended purpose. Reviews end product with the client to ensure adequate understanding. Provides data analysis guidance as required. Designs and conducts training sessions on tools and data sources used by the team and self provisioners. Provides job aids to team members and business users. Tests and implements new software releases through regression testing. Identifies issues and engages with vendors to resolve and elevate software into production. Participates in special projects and performs other duties as assigned.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Career Level
Mid Level