IT Business Analyst

Business Analyst - Job Listing.png

IT Business Analyst

Weehawken, New Jersey

December 3rd 2018



Do you have strong data analytics skill and system analysis background to deliver the strategic UNIX AD Integration projects within the UNIX Directory space? Are you able to support and manage infrastructure security projects efficiently?

We’re looking for someone like that who can help us:

  • Engage business application owners and understand their system requirements and system impact

  • Translate business IT requirements into technical design specifications

  • Conduct agile requirement-gathering activities, like workshops and one on one interviews

  • Gather user access and entitlement data, organize and map it to future state data models in preparation for entitlement system migration.

  • Create Role-Based Access Control models facilitating the integration of UNIX systems into Active Directory.

  • Support the business IT system migration to the new UNIX AD ecosystem through the application migration and new entitlement onboarding

  • Assist in user acceptance testing, quality control and general project management

  • Generate regular program reports, metrics and issue logs for stakeholder and management reviews

Your Team:

You'll be working in a Security Engineering organization in Weehawken NJ supporting the UNIX Directory team. Within the team we are tasked to deliver the next generation UNIX security ecosystem utilizing Active Directory. Your role will be to deliver data-based analysis and come up with the right data model to facilitate the design and the migration of the new UNIX ecosystem.



  • 5 Years+ experience in IT engineering projects in the UNIX LDAP or Active Directory space

  • Experience in UNIX LDAP directory and Active Directory and their associated authentication mechanisms and access control model.

  • Experience with infrastructure access and authentication in a large UNIX and Windows environment

  • Knowledgeable in Azure or AWS system security and access control model

  • Understanding of UNIX authentication protocol like Kerberos.

  • Understanding of Role-based Access Control model (RBAC) in the application and infrastructure access settings


You Are:

  • Comfortable to communicate effectively across a matrix organization including Infrastructure, Security, Business IT teams.

  • Capable to work independently, handle multiple tasks and projects and adapt to a constantly changing environment.

  • Confident to take over end to end responsibility for the work delivered by you and your team.

  • Proactive, comfortable working in dynamic environments with fast-paced deliveries and changing requirements.

Print Friendly and PDF

Job ID: A2218