Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Global Business Intelligence Architect

Job Title: Global Business Intelligence Architect
Contract Type: Permanent
Location: Western Europe,Zurich
Industry:
Salary: £95726.28 - £119657.85 per annum + bonus + benefits
REF: JS-CM-BINS2_90975
Contact Name: Colin McGill
Contact Email: colinm@montash.com
Job Published: over 3 years ago

Job Description

Global Enterprise Business Intelligence Architect

KEY SKILLS: Business Intelligence, BI and Data, BI Architect, SAP BW, SAP HANA/BO, IBM DB2, Microsoft SQL, Informatica Powercenter, Microstrategy, SAS, Business Objects, BI Architecture, BI Architect, Business Intelligence Architecture,

Montash are retained to search for an Enterprise Business Intelligence Architect to join a Global Insurance giant in their Group Architecture Practice. You will be responsible for driving and defining the group wide architecture strategy and driving the innovation footprint with the big data and analytics piece.

Responsibilities:

  • Aligning BI Reference Architecture with Business Strategy
  • Making sure BI Reference Architecture complies with Data
  • Evangelise BI architecture across all stakeholders
  • Develop BI Architecture Guidelines to improve effectiveness and efficiency of BI project implementation as well as BI operational effectiveness
  • Educate and Support the BI COE organization in adopting the BI Reference architecture during system design
  • Ensure proposed solutions designed by solution architects are compliant with the BI Reference Architecture best practices
  • Support Improvement of the solution governance process to in order to guarantee the best solution quality and foster global standardization and simplification of the BI application landscapes
  • Regularly review/evolve the BI IT standards by contributing to technology evaluations and roadmaps
  • Track Architecture and Technology trends and directions in the BI space

Key Skills:

  • Over 8 years of relevant BI experience, with strong technical background in one or several of the following stacks: SAP HANA/BO, IBM DB2, Microsoft SQL, Informatica Powercenter, Microstrategy, SAS
  • Solid experience in Data architecture (data modelling, data management) for enterprise-wide, complex BI platforms
  • Experience in agile delivery methods (e.g. Scrum) preferred
  • Strong communication, presentation and relationship management skills at different levels and in a multicultural environment
  • Experience working in a complex global environment.
  • Fluent in English (spoken and written). Further languages nice to have
  • Deep understanding in BI tools (including SAP HANA/BO, IBM DB2, Microsoft SQL, Microstrategy, Informatica, SAS, etc
  • It would also be beneficial to have understanding of IT Infrastructure, Network Infrastrcuture, IT management tools (e.g. PlanningIT, ServiceeNow), Collaboration platforms (i.e. Sharepoint), and SAS, SPSS, R or any other analytical tool

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...