Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Qvidian Administrator

Expired Job

Oracle Broomfield , CO 80021

Posted 6 months ago

Provides programs to improve operational efficiency, consistency, and compliance in support of the organization*s financial and tactical business objectives. Provides business practices and processes. Develops, communicates, and trains the organization on business practices and processes.

Serve as a liaison with other divisions such as Finance, Contracts, HR, Legal, Shared Services, Accounts Receivable, Purchasing, and Risk Management in an effort to ensure accurate and timely transaction processing. Collect, input, verify, correct, and analyze data to measure key performance indicator actual versus business objectives. Provide updates to management regarding budget to actual, informing them of deviations and opportunities. Provide management with economic impact and compliance issues surrounding key business decisions and/or deals. Communicate Oracle Business Practices to the organization and monitor process and approvals for full compliance. Drive implementation of new processes and procedures.

Job duties are varied and complex utilizing independent judgment. May have project lead role. Attention to detail critical. Ability to collect, organize, and display data in spreadsheet format. Follow-through skills necessary to get information from internal and third parties and have data errors/omissions corrected. For this, relationship management skills strongly desired. Strong written and verbal communication skills to interact with management and possible clients desired. 5 plus years relevant work experience.

Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law.

Remote option role with a preference for either Broomfield CO and Redwood City CA office locations.

The system administrator plays a key role in maintaining the value and usability of the Oracle Qvidian system. The position requires excellent communication and presentation skills, along with strategic systems thinking and maintain a comprehensive understanding of the capabilities of the Qvidian system. The position is responsible for the day-to-day oversight of Qvidian and works with others responsible for providing tools, resources, content and training to support RFx responses and regional and global proposal initiatives. This position will also scale the Qvidian application to meet future business requirements of the organization including automation of selling documents in support of sales initiatives and goals.

  • Responsible for overall application, processand global content management.

  • Works with internal team to ensure Single Sign-On and user roles are configured correctly, administers users and maintainsapplication permissions and content security

  • Deliver and maintain Word-based and

PowerPoint-based specifications for fonts and font attributes, margins, headersand footers for the creation of Oracle style templates.Complete any additional configuration of folderstructure, user roles and other items necessary in maintain Oracle Qvidian as abest practice RFx response collaboration system.

  • Help develop and deploy end-user training.

  • Monitors effectiveness (usage, win rates, SMEengagements, etc.)Responsible for the day-to-day administration ofQvidianWorks closely with and may serve as a back-upfor Proposal and Bid Managers and/or Content Managers

  • Ensures best practices are incorporated into

Oracle Qvidian operating model

  • Serves as escalation point of contact for anytechnical concerns and ensures they are addressed.

  • Contacts Upland Qvidian's customer supportteam for assistance, as needed

  • Managevendor relationship with Upland Qvidian in support of Oracle's technicalassistance and application training requirements, as well as helping toinfluence future Qvidian product development in support of Oracles' businessrequirements through participation in Qvidian beta programs and roadmap events

  • Association of Proposal Management Professionals(APMP) certified Preferred

  • Five plus years of Qvidian system administrationexperience - Preferred

upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Information Security Administrator

Atrilogy

Posted Yesterday

VIEW JOBS 1/15/2019 12:00:00 AM 2019-04-15T00:00 <div>Atrilogy Solutions Group’s direct client is seeking an <strong>Information Security Administrator</strong> to join their team in <strong>Broomfield, CO</strong> on a <strong>contract to hire</strong> basis. This candidate will oversee the day-to-day administration of information security tools and devices, as well as first-level and second-level support for security information and event management (SIEM). This is a hands-on role that requires a high level of technical expertise. The person in this position is responsible for a broad range of tasks, which may include significant responsibilities for the security administration of a wide variety of IT systems across the enterprise.<br />  <br /> The individual in this position will monitor network traffic for security events and performs triage analysis to identify security incidents. This position responds to computer security incidents by collecting, analyzing and preserving digital evidence to ensure incidents are recorded and tracked in accordance with SOC requirements. SOC Tier 2 Analysts work closely with IT and ERM to assess risk and provide recommendations for improving our security posture.<br />  <br /> <strong>Education and Experience:</strong><br />   <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Bachelors or equivalent experience</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">5+ years project related experience</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Deep packet and log analysis</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Some Forensic and Malware Analysis</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Cyber Threat and Intelligence gathering and analysis</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">The ability to take lead on incident research when appropriate and be able to mentor junior analysts.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience managing cases with enterprise SIEM like QRadar, LogRhythm and NTT.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Working knowledge of any of the following tools is required: Nessus, Varonis, Wireshark, Nexpose, Qualys,</li> </ul> Cylance Endpoint, Security Analytics, Snort,  NMap, NIKSUN, Wireshark or other information security tools.<br />  <br /> <strong>Desired Experience/Certifications:</strong><br />   <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">One or more certifications, including but not limited to: GCIH, GCIA, GCFE, GREM, GCFA, GSEC, CEH, CISSP, CCNA (Security), Security + or equivalent.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Ability/experience in training and supervising junior analysts.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Direct, hands-on experience or strong working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Verifiable experience reviewing application code for security vulnerabilities</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Direct, hands-on experience or a strong working knowledge of vulnerability management tools <ul style="list-style-type:circle;"> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Full-stack knowledge of IT infrastructure:</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Applications</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Databases</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Operating systems — Windows, Unix and Linux</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Hypervisors</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">IP networks — WAN and LAN</li> </ul> </li> </ul> <br /> <strong>Essential Functions Include:</strong><br />   <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Point of contact with MSSP and integrating logs and alerting configuration</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Conduct research on emerging security threats.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Provides correlation and trending of cyber incident activity.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Develops threat trend analysis reports and metrics.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Supports SOC analysis, handling and response activity.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Maintains situational awareness reports for advanced threats such as Advanced Persistent Threat (APT) and Focused Operations (FO) incidents.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Ensure that a complete, accurate and valid inventory of all systems, infrastructure and applications is conducted that should be logged by the security information and event management (SIEM) or log management tool.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, and counterparts within the network operations center (NOC).</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">With guidance from the CISO, or the individual responsible for overall security direction, and in conjunction with SOC colleagues, establish procedures — including escalations — for when IOCs are discovered.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Conduct code reviews of applications to determine security flaws or other issues that would impact the confidentiality, integrity or availability of the system.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Coordinate with DevOps teams to advocate secure coding practices and escalate concerns related to poor coding practices to the CISO or the individual responsible for the overall security direction.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Coordinate with the privacy officer to document data flows of sensitive information within the organization (e.g., PII or ePHI) and recommend controls to ensure this data is adequately secured (e.g., encryption, tokenization, etc.).</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Validate IT infrastructure and other reference architectures for security best practices, and recommend changes to enhance security and reduce risk where applicable.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Validate security configurations and access to security infrastructure tools, including firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), anti-malware/endpoint protection systems, etc.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Review network segmentation to ensure least privilege for network access.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Conduct reviews of and oversee the change management function for security rulesets for the organization's firewalls.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Validate that security and other critical patches to firmware and operating systems are configured and deployed in a timely fashion.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Liaise with the vendor management team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property, PII, ePHI, regulated or other protected data, including: <ul style="list-style-type:circle;"> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">SaaS providers</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Cloud/infrastructure as a service (IaaS) providers</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Managed service providers</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Payroll providers</li> </ul> </li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Evaluate the statements of work from these providers to ensure that adequate security protections are in place. Assess the providers' SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required "user controls," and report any findings to the CISO and vendor management teams.</li> </ul>  <br /> For immediate consideration please submit your resume in Word format, along with daytime contact information.  <strong>LOCAL CANDIDATES ONLY PLEASE</strong> unless you are willing to relocate yourself at your own expense. All submittals will be treated confidentially. Selected candidate may be asked to pass a comprehensive background, credit and/or drug screening.  Principals only, no third parties please. <div> <hr align="left" size="3" width="100%" /></div> <br /> Established in 2000, Atrilogy Solutions Group, Inc. provides organizations of all sizes with high-quality, cost-effective information technology (IT), business process and health care consulting and staffing services.  Our industry-leading service model combines experienced project managers with seasoned technical and functional consultants to eliminate client uncertainty and deliver superior value and results.<br />  <br /> Clients turn to Atrilogy for expertise in: <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">IT staffing and placement (Project Managers, Agile/Scrum Masters, Business Analysts, DBA’s, Software Engineers, Mobile Developers (iOS, Android), DevOps, Automation, QA, Systems & Network Engineers, Cyber Security / Information Security Specialists)</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">All major ERP & CRM packages (including Oracle, Workday, PeopleSoft, JD Edwards, Lawson, SAP, Dynamics AX, Salesforce, Microsoft CRM, NetSuite)</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Business Intelligence, Data Warehousing, and Big Data Integration</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Creative (Interactive Project Manager/Art Director, Information Architect, UI/UX Designer, Web/Graphic Design)</li> </ul>  <br /> Atrilogy has been recognized by Inc. magazine as one of the nation’s fastest-growing, privately-held companies. Headquartered in Irvine, California, Atrilogy also has offices in Denver, Phoenix, Atlanta, and Dallas with satellite offices in Boston, Jersey City, Las Vegas, Seattle, and Delhi, India.<br />  <br /> Atrilogy Solutions Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, gender expression, national origin, protected veteran status, or any other basis protected by applicable law, and will not be discriminated against on the basis of disability.<br />  <br /> In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.</div> Atrilogy Broomfield CO

Qvidian Administrator

Expired Job

Oracle