IT / Finance Responsibilities Identifying, investigating, and analyzing problems faced by business; propose recommendations that will positively impact the business Investigating and analyzing alternative solutions and propose a way forward to effectively deal with them Investigating and proposing process optimization opportunities
Analyst is responsible for monitoring, detecting, investigating, and responding to cybersecurity incidents and to identify potential threats or incidents. Investigate suspicious activities, security breaches, and recovery efforts. Document security incidents, investigations, and remediation efforts in accordance with
risk-related queries within the business, encompassing investigation, mitigation, and reporting. An analytical mindset and highlight suspected fraudulent activity. Investigate suspected fraud cases with forensic methodology feedback to internal and external stakeholders. Investigate / resolve customer disputes / cases. Escalate
risk-related queries within the business, encompassing investigation, mitigation, and reporting. An analytical mindset and highlight suspected fraudulent activity. Investigate suspected fraud cases with forensic methodology feedback to internal and external stakeholders. Investigate / resolve customer disputes / cases. Escalate
Developing interactive dashboards and reports. Investigate data issues and solutions and provide ongoing
systems support and feedback. Duties will include investigating/troubleshooting tracking unit/camera issues
problems. Providing monitoring / support / investigation / maintenance on deployed devices and products that verbal and written reports of application investigations and resolutions are accurate and clear. The
requirements and manage development backlog Review and investigate feasibility of new products Follow documentation competent to assist clients. Technical Assistance Investigate returned/faulty devices to find root-cause, identify
quality, efficiency and availability.
improvement and risk. • Plan and perform special investigation base on customer requirements. • Technical training Data presented to client. Special Investigations: • Special investigations planned and performed based on