Application analyst

Last updated

In the US, an application analyst (also applications systems analyst) is someone whose job is to support a given application or applications. This may entail some computer programming, some system administration skills, and the ability to analyze a given problem, diagnose it and find its root cause, and then either solve it or pass the problem on to the relevant people if it does not lie within the application analyst's area of responsibility. Typically an application analyst will be responsible for supporting bespoke (i.e. custom) applications programmed with a variety of programming languages and using a variety of database systems, middleware systems and the like. It is a form of 3rd level technical support/help desk. The role may or may not involve some customer contact but most often it involves getting some description of the problem from help desk, making a diagnosis and then either creating a fix or passing the problem on to someone who is responsible for the actual problem area.

In some companies, an application analyst is a software architect.

Overview

Depending on the Industry, an application analyst will apply subject matter expertise by verifying design documents, execute testing for new functionality, and defect fixes. Additional responsibilities can include being a liaison between business stakeholders and IT developers. Also, providing clarifications on system requirements and design for integrating-application teams. An application analyst will interface with multiple channels (depending on scope) to provide demos and application walk-throughs and training. An application analyst will align with IT resources to ensure high quality deliverables utilizing agile methodology for rapid delivery technology enablers. Participating in the change request management process to field, document, and communicate responses feedback is also common within an application analyst's responsibilities.

Application systems analysts consult with management and help develop software to fit clients' needs. Application systems analyst must provide accurate, quality analyses of new program applications, as well as conduct testing, locate potential problems, and solve them in an efficient manner. Clients' needs may vary widely (for example, they may work in the medical field or in the securities industry), and staying up to date with software and technology trends in their field are essential.

Companies that require analysts are mostly in the fields of business, accounting, security, and scientific engineering. Application systems analysts work with other analysts and program designers, as well as managers and clients. These analysts generally work in an office setting, but there are exceptions when clients may need services at their office or home. Application systems analysts usually work full time, although they may need to work nights and weekends to resolve emerging issues or when deadlines approach; some companies may require analysts to be on call.

Analyst positions typically require at least a bachelor's degree in computer science or a related field, and a master's degree may be required. Previous information technology experience - preferably in a similar role - is required as well. Application systems analysts must have excellent communication skills, as they often work directly with clients and may be required to train other analysts. Flexibility, the ability to work well in teams, and the ability to work well with minimal supervision are also preferred traits.

Application analyst tasks include:

Related Research Articles

<span class="mw-page-title-main">Programmer</span> Person who writes computer software

A computer programmer, sometimes referred to as a software developer, a software engineer, a programmer, or more recently a coder, is a person who creates computer software.

<span class="mw-page-title-main">Software bug</span> Error, flaw, failure, or fault in a computer program or system

A software bug is an error, flaw or fault in the design, development, or operation of computer software that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The process of finding and correcting bugs is termed "debugging" and often uses formal techniques or tools to pinpoint bugs. Since the 1950s some computer systems have been designed to deter, detect or auto-correct various computer bugs during operations.

<span class="mw-page-title-main">System administrator</span> Person who maintains and operates a computer system or computer network

A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage meet the needs of the users, without exceeding a set budget when doing so.

Project manager Professional in the field of project management

A project manager is a professional in the field of project management. Project managers have the responsibility of the planning, procurement and execution of a project, in any undertaking that has a defined scope, defined start and a defined finish; regardless of industry. Project managers are first point of contact for any issues or discrepancies arising from within the heads of various departments in an organization before the problem escalates to higher authorities, as project representative.

The following outline is provided as an overview of and topical guide to software engineering:

Systems development life cycle Systems engineering term

In systems engineering, information systems and software engineering, the systems development life cycle (SDLC), also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system. The systems development life cycle concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both. There are usually six stages in this cycle: requirement analysis, design, development and testing, implementation, documentation, and evaluation.

Technical support is a call centre type customer service provided by companies to advise and assist registered users with issues concerning their technical products. Traditionally done on the phone, technical support can now be conducted online or through chat. At present, most large and mid-size companies have outsourced their tech support operations. Many companies provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.

A systems integrator is a person or company that specializes in bringing together component subsystems into a whole and ensuring that those subsystems function together, a practice known as system integration. They also solve problems of automation. Systems integrators may work in many fields but the term is generally used in the information technology (IT) field such as computer networking, the defense industry, the mass media, enterprise application integration, business process management or manual computer programming. Data quality issues are an important part of the work of systems integrators.

Business analysis is a professional discipline of identifying business needs and determining solutions to business problems. Solutions often include a software-systems development component, but may also consist of process improvements, organizational change or strategic planning and policy development. The person who carries out this task is called a business analyst or BA.

Software project management is an art and science of planning and leading software projects. It is a sub-discipline of project management in which software projects are planned, implemented, monitored and controlled.

The Institute for Defense Analyses (IDA) is an American non-profit corporation that administers three federally funded research and development centers (FFRDCs) – the Systems and Analyses Center (SAC), the Science and Technology Policy Institute (STPI), and the Center for Communications and Computing (C&C) – to assist the United States government in addressing national security issues, particularly those requiring scientific and technical expertise. It is headquartered in Alexandria, Virginia.

Computer repair technician Person who repairs and maintains computers and servers

A computer repair technician is a person who repairs and maintains computers and servers. The technician's responsibilities may extend to include building or configuring new hardware, installing and updating software packages, and creating and maintaining computer networks.

Configurable Network Computing or CNC is JD Edwards's (JDE) client–server proprietary architecture and methodology that implements its highly-scalable enterprise-wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware platforms. Now a division of the Oracle Corporation, Oracle continues to sponsor ongoing development of the JD Edwards Enterprise Resource Planning (ERP) system. While highly flexible, the CNC architecture is proprietary and, as such, it cannot be exported to any other systems. While the CNC architecture's chief claim to fame, insulation of applications from the underlying database and operating systems, were largely superseded by modern web-based technology, nevertheless CNC technology continues to be at the heart of both JD Edwards' OneWorld and EnterpriseOne architecture and will play a significant role Oracle's developing fusion architecture initiative. While a proprietary architecture, CNC is neither an Oracle nor JDE product offering. The term CNC also refers to the systems analysts who install, maintain, manage and enhance this architecture. CNCs are also one of the three technical areas of expertise in the JD Edwards Enterprise Resource Planning ERP which include developer/report writer and functional/business analysts.

The Department Of the Navy Acquisition Intern Program is a civilian professional hiring program. The Naval Acquisition Career Center manages several hundred interns at any given time.

Supportworks

Supportworks is an issue tracking system designed for use in help desk and information technology (IT) environments. Two branches of the software are developed concurrently, Supportworks ITSM, a certified ITIL compatible IT service management (ITSM) solution, and Supportworks Helpdesk Professional.

Information security operations center Facility where enterprise information systems are monitored, assessed, and defended

An information security operations center is a facility where enterprise information systems are monitored, assessed, and defended.

Geographic information systems (GIS) play a constantly evolving role in geospatial intelligence (GEOINT) and United States national security. These technologies allow a user to efficiently manage, analyze, and produce geospatial data, to combine GEOINT with other forms of intelligence collection, and to perform highly developed analysis and visual production of geospatial data. Therefore, GIS produces up-to-date and more reliable GEOINT to reduce uncertainty for a decisionmaker. Since GIS programs are Web-enabled, a user can constantly work with a decision maker to solve their GEOINT and national security related problems from anywhere in the world. There are many types of GIS software used in GEOINT and national security, such as Google Earth, ERDAS IMAGINE, GeoNetwork opensource, and Esri ArcGIS.

<span class="mw-page-title-main">Software development security</span>

Security, as part of the software development process, is an ongoing process involving people and practices, and ensures application confidentiality, integrity, and availability. Secure software is the result of security aware software development processes where security is built in and thus software is developed with security in mind.

This glossary of computer science is a list of definitions of terms and concepts used in computer science, its sub-disciplines, and related fields, including terms relevant to software, data science, and computer programming.

References