[Close] 

IT Applications Analyst, Senior

applications, programs and reports. Integrates software, develops external interface and maintains technical documentation. May code individual modules and moderately complex functions. Develops and builds application tables, panels, and reports for projects. Troubleshoots and resolves testing requirements and follows through the full development life cycle. Works with management, consultants, and end users to compile and implement Performs business analysis of system requirements. Formulates and defines systems scope and objectives through research and fact-finding combined with a strong understanding of business systems and industry requirements. Designs and builds more complex changes, extensions and enhancements to existing issues. May take on several components of a project or a complex component of a project. Performs more complex business analysis of system enhancements to applications and interfaces. Defines, tests, debugs, trains, implements, and supports one or more functional areas. Researches business needs, identifies more complex solutions and implements system change requirements. Develops design and testing requirements for new projects as well as existing applications, programs and reports. Educates team members on business processes, and reporting metrics enabled by application modules. Translates business needs into technical requirements. Develops and amends reports as necessary. May take on several components of a project or a complex component of a project. Tracks data migration and ensures data conversion stability and compliance with future data loading requirements. Identifies and implements performance improvement measures.
Bachelor's degree or equivalent related experience. 6 years. Green Belt in Lean Six Sigma within 3 years and/or APCIS (CPIM, CIRM) certification preferred.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

IT Applications Analyst
Pewaukee, WI WEC Business Services
Senior IT Security Analyst
Milwaukee, WI Harley-Davidson, Inc.
IT Sytems Analyst
Neenah, WI TiDi Products, LLC
IT Compliance Analyst
Sussex, WI Quad/Graphics
IT Business Analyst - Human Services Industry
Madison, WI CGI Technologies and Solutions, Inc.