Information Architect 14256other related Employment listings - Canonsburg, PA at Geebo

Information Architect 14256

Our client is hiring an information Architect that will be responsible for leading efforts to develop and maintain EIM architectural designs as part of our client's project execution methodology and the sustainment of run-time operations. This involves providing guidance and/or mandate of the Information and MDM Architecture to strategic programs and solution delivery teams.
Requirements:

Participate in the Software Development Lifecycle, with emphasis on the Requirements and Design phases.
Enhance the EIM Operating Model to align, refine or define Information and/or MDM Architecture models that align to strategic program needs and Enterprise Architecture models and principles.
Lead Data Quality analysis and remediation efforts as part of project execution
Define Information Architecture, aligned to business capabilities and applied as guidance and/or mandate for program alignment and solution delivery.
Define MDM Architecture, aligned to business capabilities and applied as guidance and/or mandate or program alignment and solution delivery.
Define Information Architecture component models for and across the phases of the Data Lifecycle, aligned with business capabilities.
Define MDM Architecture component models for and across Metadata, Data Quality, Data Security, Extract patterns, Transformation patterns, Load patterns, covering structured and unstructured information assets, aligned with business capabilities.
Collaborate with EIM Modeler to transform Information & MDM Architecture into EIM conceptual & logical models.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.