Business Analyst - Data Modeling

Company Name:
Title: Business Analyst - Data Modeling
Location: United States-Michigan-Allen Park
Job Number: 75776
Step Up, Stand Out: Advance
By joining Ciber, you can turn your innovative ideas into world class solutions for some of the world's most dynamic companies. With global reach and deep technical experience, Ciber is big enough to keep you working with household names, but small enough for you to stand out and advance.
Choose a career at Ciber and enjoy an environment where being challenged and rewarded is a part of daily life.
Ciber's IT project management and business analysis practice provides superior talent, capabilities, dedication and consulting acumen. Ciber has brought PMO discipline and efficiency to more than 400 clients. Our team includes IT professionals with healthcare, manufacturing, energy and other industry backgrounds. We leverage our large knowledge base and technical resources to deliver quality project management initiatives that seek to reduce costs, increase performance and maximize efficiency for client organizations.
to Watch Video click
here .
Ciber, Inc. is an Equal Opportunity Employer Minorities/Females/Protected Veterans/Disabled.
Role Description :
The business analyst will need to be able to interact directly with business customers and system analysts to gather, document and review business requirements and manage the portfolio data model across 5 main applications
This position will need to:
Work alongside the business SMEs to understand, decompose and document current state business processes and data requirements in technical detail.
Identify and document modifications to existing data models across the portfolio
Assess upstream and downstream impacts of the data model changes across the portfolio
Submit, track and coordinate database changes to dev, qa, edu and prod database environments once the data model has been updated.
The database changes must be tightly managed to support the application development and promotion cadence across the portfolio.
Skills Required :
Exceptionally strong data modeling knowledge and experience
In-depth experience documenting business processes in a workflow / process modeling tool.
Good Communication Skills and ability to utilize desktop tools to accelerate communications (Wikis, IM, NetMeeting, MS-Office apps, etc.)
Experience Preferred:
Business Process Re-engineering and Methodology Business Analyst Experience
Experience with Java, SQL, JavaScript, HTML, XML, and XSLT Iterative (USDM)
Project Management Experience Process Modelling skills using standard notations like BPMN, BPEL
Experience in Organizational Change Management
Experience of UML/Use Case Modelling
Experience of 6-Sigma methodology for process analysis and improvement
Knowledge of SCM and Code Review Practices
Knowledge of Web Services, http and SOA
Good Communication Skills and ability to utilize desktop tools to accelerate communications (Wikis, IM, NetMeeting, etc.)
This resource must have the ability to manage large amounts of information and must be willing to take ownership of detail.
Unless the resource has natural ability to pay attention to detail and finds such roles rewarding, they will likely not succeed in this role.
Education Required:
Bachelors Degree - Computer Information Systems or related technical degree
This position requires the successful completion of a background investigation and/or drug screen.
Ciber is a leading global IT consulting company with some 6,500 consultants in North America, Europe and Asia/Pacific, and approximately $1 billion in annual business. Client focused and results driven, Ciber partners with organizations to develop technology strategies and solutions that deliver tangible business value. Founded in 1974, the company trades on the New York Stock Exchange (NYSE: CBR).
For more information, visit

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.