Accessibility Links
  • Job reference: RMS0162366

Business Sys Analyst II

  • Sector: Engineering
  • Location: Saudi Arabia
  • Job type: Permanent
  • Date posted: 19/11/2015
This vacancy has now been filled.

Click one of the boxes below to view similar jobs or send us your CV.
Send jobs like this to my email    What's this?
The Company:
an Oil Company is seeking a Business System Analyst for Jazan Economic City (JEC)

The Role:
Contribute towards monitoring performance of the strategic projects for JEC
Contribute towards expanding the awareness of JEC and its activities among international peer organizations
Conduct all assigned Planning & Development activities in accordance to JEC project management framework (PMF) including the project governance framework, reporting templates and frequency, the process of risk and issue identification and mitigation, the process of change enablement and communication, project benefit tracking and realization mechanism
Assist the Supervisor in performing cost and benefits analyses on proposed JEC initiatives.
Prepare presentations and other documentation as required to highlight findings of the analyses to JEC Executive Management. Assist the Supervisor in the preparation of the initiatives master-plan based on JEC strategic objectives.
Support the Supervisor in drafting requests for proposals (RFP) to aid in the selection of third parties for the purpose of special projects. Coordinate with third parties to communication requests for amendments to proposals which they have submitted to JEC.
Assist the Supervisor in the preparation of weekly internal project status reports.
Contribute towards the change enablement process to phase in special projects and initiatives.
Assist the Supervisor in the preparation of reports containing information on the performance of the special projects and initiatives to assist the Investor Relations Department
Conduct research to identify organizations regionally and globally that are similar in nature to JEC, and contribute in establishing mutually beneficial relationships.
Identify and develop mechanisms for JEC to promote its activities at an international level and attract interest from organizations and institutions.

Duties listed are representative but not inclusive:

Works with organizations at all levels (i.e., ER, Finance, etc.) in order to maintain an overall corporate management information system which is the primary source from which information is gathered for policy and decision making at corporate level.
Conducts feasibility studies and prepares feasibility reports, conducts stakeout studies and prepares project proposal reports.
Interfaces with EDP/PCD in the design and implementation phases of EDP-based Business Systems and provides support to EDP as the department client.
Prepares the user manuals and associated documentation resulting from Business System implementation.
Prepares conversion plan and user installation plan for the applicable organization and other system users.
Provides the support and advice, and business procedures necessary to maintain the integrity of data which originates within department
Business Systems.
Provides training to operational and staff personnel in order to maximize the effectiveness of Business Systems within the assigned department.
Conducts special studies as assigned.
Maintains contact with the EDP Liaison representative in other departments to exchange ideas and information.

Oversee the assigned department's/organization's computer security program ensuring compliance with the Company's Information Security Policy.
Manage the internal processes and procedures to comply with Information Security Policy in the organization(s), which he/she supports.
Communicate recently approved additions, deletions or amendments to the information Security Policy to department management and users.
Document and report non-compliance or misuse of granted privileges and services as required by incident Reporting Processes and supporting Information Protection Standards and Guidelines (IPSAG).
Conduct business risk assessments related to computing resources within his/her area of responsibilities and take appropriate remedial action, including notifying his/her management and Computer Security Administration (CSA) regarding security risks, or IT regarding operational risks.
Enhance department level access requirements documentations, and ensure the availability of applicable support systems and related processes to assign, monitor and delete when such accesses are no longer required.
Ensure removal of access assigned for resigned, transferred or terminated employees immediately.
Maintain department data classification as per GI710.002 Classification and handling of Sensitive Information requirements and take appropriate action(s) in order to comply with sensitive and confidential data.
Obtain department head approval for access requirements especially for critical resources and maintain records of such approvals.
Manage Active Directory resources for users under his/her area of responsibility:
Enables and resets user's Domain account.
Manage Email Exchange security groups and profiles for users binder his/her area of responsibility.
Monitor permissions to use network resources, e.g. shared folders, and printers
Monitor SAP users' access and roles for users under his/her area of responsibility.
Monitor and process temporary administrator rights requests to install, maintain and/or delete approved programs, hardware.
Conduct computer security awareness to users in which he/she supports. Also, report any computer or system misuse or other irregularity. He/She must be able to do several awareness presentations to his/her organization during the operational year, or as required.
Coordinate Business Continuity requirements for his/her organization in order to comply with the approved corporate Business Continuity requirements.
Ensure periodic physical inventory verification, at least once every six (6) months, of ail assigned end-user devices under his/her custody. Reconcile a Physical Inventory Report, which needs to be reviewed and approved by the Division and Department Heads. Inventory discrepancies shall be investigated, and any lost or stolen device(s) shall be reported to Industrial Security Operations for appropriate
follow-up action. A record of follow-up is maintained for future reference and inventory reconciliation.
Ensure accurate inventory database records for his/her department's applications, software, hardware and network devices, and identify ownership of the inventory items by updating the corporate IT Asset Management System to comply with the requirements of GI 299.010:
Request physical ID for equipment that does not have one through SAP PRC.
Update the end-users' location and contact information for devices within his/her area of responsibility.
Manage and coordinate the requesting of IT computer resources.
Ensure that all software and data on all surplus computer equipment are sanitized prior to disposition using Company-authorized software.
Manage and maintain IT shared assets under his/her area of responsibility.
Ensure that employees who are no longer working in his/her areas of responsibility are cleared and signed-off according to company policies and procedures. The scope includes all IT-issued end-user devices under I-his/her custodianship.
Report to and advise department head regarding information security concerns and issues.
Participate, if requested by Corporate Security Services, in investigations of breaches of Company's Policies and Standards within the organization(s) he/she supports:
Liaise with Computer Security Administrator, information protection organizations, and Access Control Groups (ACGs), as needed.
Represent his/her organization in computer security related issues and incidents as directed by management.
Be the focal point of contact and perform support procedures when a penetration test or compliance assessment is performed within his/her organization.
Actively participate in computer security training, including attending computer security seminars and conferences, as available and attending Computes Security and Technical Training:
Train users within areas of responsibility/organization code(s) to use Identity Management (IDM) for changing passwords and Active
Directory for group membership in the domains.

Essential Skills / Qualifications:
Bachelors Degree in business management or similar
7+ years experience in an institution/development project of a similar size and nature is desirable
Expert in Data Analysis, Business Planning and Project Management
Highly effective External Awareness, Communication Skills, International Collaboration and Business Development
Advanced Analytical Thinking & Problem Solving, Continuous Improvement and Self Development
Execution Excellence with Initiative and Enthusiasm, Innovative and Ideas Driven
Strategic Business Acumen and Stakeholder Orientation

Desirable Skills / Qualifications:
Bachelor Degree in Engineering, Business Administration, Computer Science, Management Information Systems (MIS), or Physical
Seven (7) years' diversified experience in Computer Systems Analysis or/and systems engineering.
Ability to communicate effectively, both orally and written, in English.
Demonstrated abilities in problem analysis and resolution.
Additional Requirements when assigned as CSL: A. Certified ISO27001 Lead Auditor or equivalent.
Similar jobs
Barry Jones
Projects Manager Location London Duration permanent The Role: Are you looking for your next meaningful move to...
Sylvanna Berkowitz
Q400 Pilot Location Anchorage, Alaska Duration 12 months The Role: 12 month contract This is an intermittent role -...
Satyajit Rajkumar
Interface Manager- LRT Project Location Singapore Duration 2-3 years The Role: Based in Singapore on 2-3 years contract...

Back to Top

By clicking "Save" you consent to
receiving matching jobs based on the
job/page you are viewing by email from
Fircroft, as detailed in our privacy policy
Fircroft would like to keep you up to date with our current vacancies and latest company updates via email. Occasionally Fircrofts marketing may contain 3rd party or affiliate information, however we will not share your personal data with any 3rd parties without your consent. From time to time, we might contact you to get your views on the service you have received. To help you get the best out of Fircroft, we may personalise them based on your location and how you use
Fircroft would like to keep you up to date with the latest company updates and vacancies via SMS / Text messages
Your consent options above means that Fircroft cannot contact you about any new or alternative career vacancies. If you want Fircroft to only contact you about the role(s) you have applied for please continue, however if you would like to be considered for other positions please allow us to contact you by changing one or more of the above consent.