Systems Software Analyst Resume
SUMMARY:
I am an experienced and established IT professional with an emphasis in Systems Software Analysis, Business Systems Analysis and Security Analysis for a variety of industries. I am detail - oriented, a strong team player, have excellent customer service skills, can use various technologies, tools, and has both excellent verbal and written communication abilities.
TECHNICAL SKILLS:
Language: JCL, Cobol, Visual Basic, Access, Pascal, RPG2, SQL, and C+
Environment: Platforms: IBM Mainframe, Hewlett Packard Mini, UNIX, PC s, and Windows 7
Network/Operating: ACF2, TSO, IMS, CICS, DB2, NACOS, MVS, CA7, COe, LAN, WAN, Windows 95/98, 2000, XP, NT, DOS, UNIX and others
Application Tools: SharePoint, Oracle, Remedy, Active Directory, Shell Scripting, Peregrine, Lotus Notes, Visio, and Microsoft Office applications
Methodologies Used: System Development Life Cycle (SDLC), Unified Modeling Language (UML), Waterfall, Agile
PROFESSIONAL EXPERIENCE:
Confidential
Systems Software Analyst
Responsibilities:
- Gathering requirements to ensure a thorough understanding of the business requirements
- Analyzes and revises existing system logic difficulties and documentation for the user(s)
- Facilitated and participated in Joint Application Development (JAD) using Agile and participated in the scrum team to ensure a thorough understanding of the business requirements and functions as a liaison between USPS and their vendors
- Supported both pre and post implementations for the United States Postal Systems (USPS) applications. This entailed strong analysis and communication skills, and documenting the problem via Remedy
- Translates client requirements into technical specifications or Use Cases and creates logical and innovative solutions to complex problems
- Create User stories using System Integration Testing (SIT) Scripts and Customer Acceptance Testing (CAT) noting and resolving errors
Confidential
Systems Engineer
Responsibilities:
- Implement new or modified software on the ATM s for various banks
- Participated in Joint Application Development (JAD) to ensure a thorough understanding of the business requirements and function as a liaison between the Stakeholders, Subject Matter Experts, Developers, and the Implementation Team
- Work with the engineering team, network support personnel, and customers to resolve any open issues
- Participated with customers and IT personnel to mock - up their web page(s) using Sketch
Confidential
Systems Engineer/Analyst
Responsibilities:
- Provide engineering support and technical analysis to system architects developing As-Is and
- To-Be architectures for Air Force systems using Unified Modeling Language (UML)
- Create architectures for Air Mobility Command (AMC) initiatives and store in SharePoint
- Supported both pre and post implementations for AMC applications. This entailed strong analysis skills to determine the next step and strong communication skills
- Facilitated and participated in Joint Application Development (JAD) and participated in the scrum team to ensure a thorough understanding of the business requirements
- Exhibited strong planning, scheduling, coordination and management skills
- Translates client requirements into technical specifications or Use Cases and creates logical and innovative solutions to complex problems
- Gather business requirements using Agile and collaborate with IT groups to implement or support business process plans for various architectures
- Format deliverables in accordance with DoDAF standards and templates
- Provide support for As-Is analysis by extracting business rules from existing system code use spreadsheet with progress charts for reporting to customer, and contribute in status and planning meeting with customer
Confidential
Business Analyst
Responsibilities:
- Actively participated in the planning, designing, integration and testing, implementing, maintaining and supporting applications software that is delivered on time and within budget utilizing Agile and participated in the scrum team SDLC methodology
- Exhibited strong analysis and communication skills while diagnosing the problem, determined the next step and documented the problem along with the resolution for production, security and telecommunications issues
- Document security procedures and IT procedures, Disaster Recovery plans and participated in Compliance Management verifying that IDs meet government regulations
- Performed analysis and effectively presented identified opportunities to management and/or IT members, with recommendations for process improvement plans
- Gathering, disseminating and documenting business requirements as well as participating in system testing or UAT testing
Confidential
Business Security Analyst
Responsibilities:
- Responsible for gathering, analyzing, and evaluating information regarding the processes, evaluated the conclusions, and offered recommendations
- This entailed strong analysis and communication skills, and documenting problems via Remedy
- Responsible for monitoring security applications by pulling daily logs of unauthorized users, monitoring the incident response tickets thereby enforcing best security policies and practices
- Actively participated in the planning, designing, integration and testing, implementing, maintaining and support of software that is delivered on time and within budget
- Participated in a qualitative analysis designed to measure the effectiveness and efficiency of their current security measures. This involved the planning, analysis, research, and written recommendation(s) to management
- Participated in Disaster Recovery Plan and Compliance Management verifying that IDs and functional IDs were in compliance with Sarbanes-Oxley (SOX) Audit
- Executed Shell Scripting to create, modify, or delete multiple logon IDs
- Monitored audit logging system reports as requested. This required providing support and technical assistance as applicable, coordinating follow-up for technical problems, researching and providing responses to technical questions, and disseminating information to the appropriate parties
- Responsible for monitoring adherence to established security regulations, policies, procedures, and providing quality recommendations to ensure compliance using best practices
- Functioned as Team Leader for the group
- Actively participated in Information System Auditing
- Facilitated and participated in meetings with business owners as well as Operations team
- Documented Disaster Recovery procedures ensuring HIPAA standards were followed
- Conducted interviews with supervisors, subject matter experts, and employees to obtain information to realize System Development Life Cycle (SDLC) objectives
- Train Operations team members, as projects are completed and enhancements made communicating the business efficiency of these improvements