Enterprise Architect

Enterprise Architect (Business Process Modeling) Secret Clearance Security+ Certification Utilizes Business Process Modeling (BPM) to capture business processes of the enterprise in order to analyze current process, support documentation requirements for other processes, train personnel and make improvements to processes. Maintain UNICOM System Architect environment to develop models at all levels of architecture (Operational, Solution Based, Domain Architecture, and Initiative level Architecture) in the DOD Architecture Framework (DoDAF) DoDAF Architecture v2.02 as described in http://dodcio.defense.gov/Library/DOD- Architecture Framework/ & DOD Information Enterprise Architecture (DOD IEA) as well as Business Process Model and Notation (BPMN) to enable the integration of Human Resource (HR) business processes across the enterprise. This includes; tracing artifacts to higher levels of architecture such as the Deputy Chief Management Officer (DCMO) Business Enterprise Architecture (BEA), reacting to external factors such as changes in law, updates and replacement of legacy systems and the integration of capability to support Total Force and the ability to analyze, understand, and leverage opportunities afforded by emerging technologies. Support complex projects applying the organizing principles, methods and tools of enterprise architecture. Provide subject matter expertise in industry, process and/or technology areas and possess capabilities in specific methods including, architect enterprise strategy, enterprise architecture development & management, business process design & re-engineering, investment decision making and support for solution architecture development/management. Support the attainment of business strategy and its alignment with processes and information technology strategy. Requirements Secret Clearance Security+ Certification Proficiency with BPM and UNICOM

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Business Solutions Lead Architect - SAP PP,MM,...
Richardson, TX Lennox International
Mobile User Experience Architect
Irving, TX Allstate
Sr. App Dev Architect -Azure-Houston, TX- $100...
Houston, TX Nigel Frank International US
ServiceNow Gold Partner- Hiring Developers, Ar...
San Antonio, TX Washington Frank
Data Architect Health Plans
Irving, TX CHRISTUS Health
Architecte Logiciel Embarqué (H/F)
Paris, TX Alten