--- Log opened Mon Feb 03 00:00:55 2020 06:47 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has joined #se2600 07:39 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has quit [Ping timeout: 248 seconds] 09:21 -!- TheDukh [~thedukh@66-38-50-114.pool.dsl.duo-county.com] has joined #se2600 09:47 -!- TheDukh [~thedukh@66-38-50-114.pool.dsl.duo-county.com] has quit [] 09:50 -!- TheDukh [~thedukh@66-38-50-114.pool.dsl.duo-county.com] has joined #se2600 10:23 <@Corydon76> http://captcha.nsa.gov/ 10:23 < PigBot> Google (at captcha.nsa.gov) http://tinyurl.com/uvp6l6n 10:26 <@Evilpig> wtf 10:26 < TheDukh> that's odd 10:28 < aestetix> not sure if I wanna click on a nsa.gov link 10:28 <@Evilpig> you do 10:28 < aestetix> huh that is strange 10:28 <@Evilpig> Corydon76: where did you come across this gem? 10:29 < aestetix> I searched for the only logical thing: penis 10:29 < aestetix> so now the nsa has a penis in its logs 10:32 < TheDukh> To add to the many already in there 10:34 <@Corydon76> It got posted by James Church on Facebook 10:35 <@Evilpig> one of our netsec guys just ran it through https://any.run/ and said it didn't immediately throw any red flags 10:35 < PigBot> ANY.RUN - Interactive Online Malware Sandbox (at any.run) http://tinyurl.com/y4xazzx3 10:40 < TheDukh> Have you all heard anything about Gitlab? 10:41 < aestetix> TheDukh: what about it 10:45 <@Evilpig> ^ yeah, that 10:45 <@Evilpig> we run gitlab internally 10:52 < TheDukh> Just in general. few jobs for it popped up on my feed this am and was curious about it 11:03 <@Evilpig> it works okay. no real complaints about it. the group management controls aren't super friendly but generally it works 11:29 < aestetix> I like it 11:29 < aestetix> You can also self host, which makes it better than github 11:31 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 11:32 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has joined #se2600 11:34 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 265 seconds] 11:36 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 11:39 -!- K`Tetch_ [~no@unaffiliated/ktetch] has quit [Ping timeout: 268 seconds] 11:41 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 11:44 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 265 seconds] 11:52 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 11:56 -!- K`Tetch_ [~no@unaffiliated/ktetch] has quit [Ping timeout: 240 seconds] 11:59 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 12:02 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 240 seconds] 12:10 -!- PigBot [~PigBot@wilpig.org] has quit [Ping timeout: 260 seconds] 12:52 -!- K`Tetch [~no@unaffiliated/ktetch] has joined #se2600 12:56 -!- K`Tetch_ [~no@unaffiliated/ktetch] has quit [Ping timeout: 260 seconds] 13:07 <@Corydon76> You might not want to click on this link: https://apps.nsa.gov/eqip-applicant/showLogin.login 13:08 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has quit [Remote host closed the connection] 13:08 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has joined #se2600 13:08 <@Corydon76> Or you might. Who am I to stop you? 13:09 <@Corydon76> It might actually be a good one for cloning for public Wifi spots. Scare the crap out of anybody connecting. 13:10 <@brimstone> File not found? 13:27 <@Corydon76> brimstone: I wonder if it got removed after it started getting attention. 13:31 <@Evilpig> it's still there but you can't hit it directly 13:31 <@Evilpig> https://apps.nsa.gov/ 13:31 <@Evilpig> go there and click on eqip 13:32 <@Evilpig> the popup only came up once though, I assume there's a cookie 13:33 <@Evilpig> if(window.sessionStorage && sessionStorage.getItem('showWiFiMessage') == null) 13:34 <@Evilpig> definitely not a site I want in my history though 13:44 -!- K`Tetch_ [~no@47.39.211.239] has joined #se2600 13:44 -!- K`Tetch_ [~no@47.39.211.239] has quit [Changing host] 13:44 -!- K`Tetch_ [~no@unaffiliated/ktetch] has joined #se2600 13:47 -!- K`Tetch [~no@unaffiliated/ktetch] has quit [Ping timeout: 268 seconds] 13:57 -!- brimston3 [~brimstone@unaffiliated/brimstone] has joined #se2600 13:57 -!- mode/#se2600 [+o brimston3] by ChanServ 14:02 -!- brimstone [~brimstone@unaffiliated/brimstone] has quit [Disconnected by services] 14:02 -!- brimston3 is now known as brimstone 14:03 <@Mirage> Tried to take advantage of the once a month free bulk drop-off at the city dump. Was informed that as of 2 weeks ago it'd be a minumim of $52 to dump my pickup load of old wood and stuff because it was "construction material" 14:03 <@Mirage> What a crock of shit. 14:05 <@Mirage> Evilpig: get that mirror swapped out yet? 14:26 <@Mirage> https://www.cnn.com/2020/02/02/us/stephen-king-quits-facebook-trnd/index.html 14:28 <@Mirage> Weather ppl suck. As of this morning forecast still showed 0% chance of rain until tomorrow evening...since it started sprinkling/raining they now have changed it to 40% chance today. 14:32 < TheDukh> Who wants to bet that King's next book will be about an evil social network, that somehow ties into the Dark Tower 14:47 <@Mirage> https://www.ccn.com/blizzard-is-finally-caving-to-the-brutal-warcraft-iii-reforged-backlash/ 14:51 <@Mirage> Strongly debating on taking the refund. Granted it is kind of fun being able to play Warcraft III, but the game is a steaming PoS for the most part as far as re-releasing and improving. It sucks that I have all these old RTS games from the WFW/Win 3.1/Win95/Win98 days that are unplayable on a modern machine. I haven't had luck with most of them even on a VM with an older OS installed due to hardware compatibility issues. Normally the graphics are all j 14:53 <@Mirage> Origin has all the Command and Conquer's for free is you have premier and even those don't work worth a crap. 15:05 < TheDukh> didn't they have a free version of Lost Vikings out on their store? 15:10 <@Mirage> They usually will have 1 older title for free. Sometimes they rotate it after a few days, sometimes a couple weeks. Pretty random. 15:58 <@Evilpig> Mirage: the replacement will be here friday 15:59 <@Evilpig> I miss a good game of tiberium wars with c&c 18:23 -!- rpifan [~rpifan@p4FCA2F6F.dip0.t-ipconnect.de] has quit [Ping timeout: 268 seconds] 18:54 <@dasunt> Oracle: "Hey, applying with us? Just import the data from your linked in profile!" 18:54 <@dasunt> Also Oracle: "So, yes, we'll need you to enter in all this data manually..." 18:57 <@dasunt> I love when tech companies have crappy tech. 19:31 <@Dagmar> TheDukh: Yes they did for awhile 19:32 <@Dagmar> Unrelated... it's almost shocking how many people on Reddit don't understand why SSL certs expire, but more alarming is the number of people who'll try and argue that they shouldn't expire 19:33 <@Dagmar> Since I mentioned "like passwords" one guy was even so bold as to claim the guidance is that users passwords _not_ expire 19:33 <@Dagmar> Like, no further details involved. Just that he had apparently heard someone saying passwords shoudln't expire 19:34 <@Dagmar> Some arguing "since you can use the same key again" to try to justify never-expiring SSL certs 19:34 <@Dagmar> Fucking christ on a crutch 19:34 <@Dagmar> If you reuse the same cert key, that's _your_ fuckup 19:59 < xray> We need these kind of people so we all have jobs. :) 19:59 <@Dagmar> Okay yah but it's generally not considered polite to say shit like that in /r/sysadmin 19:59 <@Dagmar> heh 20:14 <@dasunt> Worst is that all of these job seem to be using the same service for applications, yet I can't make one account and fill in all of the information. 20:14 <@dasunt> Anyways, applied at a bank. 20:16 <@dasunt> Dagmar: The recommendation is that a three month experiation on passwords results in users choosing weak passwords (2020Winter!, 2020Spring!, 2020Summer!, 2020Fall! will work for this year). Obviously doesn't apply to certs. 20:16 <@Dagmar> Yeah and if certs didn't expire, how many companies would lamely get their crap compromised and it would _stay_ decryptable for a decade 20:17 <@Dagmar> Only that the damn things expire keeps them from burning that shit into firmware 20:17 <@dasunt> As I said, doesn't apply to certs. 20:18 <@dasunt> But that's the difference between parroting what you hear, and understanding why something is reommended/not recommended (like your guy). 20:21 <@Evilpig> Dagmar: i've heard the argument for non-expiring passwords recently and moving to biometrics in lieu of passwords or a combination of a private key + biometrics instead 20:21 <@Dagmar> If you've got 2FA you can get away with it, provided the 2FA be _entirely unremovable_ 20:21 <@dasunt> I dislike biometrics because they are something you have. 20:22 <@Evilpig> god damnit dasunt. now I have to get a new password scheme, asshole 20:22 <@dasunt> (Only biometrics, I should say) 20:22 <@dasunt> Evilpig: Why be unique? 20:22 <@Evilpig> because you just put my password in clear text. duh 20:23 <@dasunt> It shows up on "***********" on my end. You are safe. 20:23 <@Evilpig> I did just get my annual change your password notice from work too. I need to do that this weekend 20:23 <@Evilpig> then spend the next two weeks retraining my fingers to type the new password 20:24 <@Evilpig> the only reason I really despite changing my password is muscle memory 20:24 <@dasunt> If it is a Microsoft/Azure environment, a competent system administrator should have the password checker invalidate all the passwords I listed. 20:24 <@dasunt> Keyword: "competent". 20:26 <@Evilpig> I'm currently in an arguement with our Principle Exchange Administrator on why he is demanding that all of our emails from systems come from valid addresses or he's going to shitcan them 20:26 <@Evilpig> so no more email from root@shitty.host.name -> my.valid@email.address 20:26 <@dasunt> Um, isn't root@shitty.host.name a valid email addression? 20:26 <@Evilpig> so .... for years all we care about on internal email is that the destination is valid. where it came from, as long as it was internal, who gave a fuck 20:27 <@Evilpig> this asshole bought some type of product from microsfot that calls itself a smart relay that won't relay unless the sender is a valid account from one of our domains 20:27 <@dasunt> I kinda sorta understtand that reasoning. 20:27 <@Evilpig> He's spent more than two months on this 20:28 <@Evilpig> he's currently trying to write a set of rewrite rules to translate our system messages to what he called "valid envelopes" so they won't trash all our mail 20:28 <@dasunt> Don't really want any system on your networks to be able to relay email. 20:29 <@Evilpig> right. but if you set up a relay that will only relay for your domains, and it delivers those directly to your mail server, and it's completely isolated from the internet for external relay. who cares if the sender is a valid address? 20:29 <@dasunt> True. 20:30 <@Evilpig> they're having to reconfigure all the copiers, all the customer applications that sent mail, like gitlab@stupid.host.name now has to be gitlab@noreply.domain.com 20:30 <@Evilpig> it's silly, it's wasting so many people's time to keep all their mail relay controls in one box, when that box doesn't really meet the business needs 20:30 <@dasunt> So did he bork all that email, or is it just throwing alerts? 20:31 <@Evilpig> he's still playing around. all our mail current goes through a relay that, *gasp* only relays for our domain and goes straight to the receiving server 20:31 <@Evilpig> but we're paying the university for that service. his task was to stop paying them. :-/ 20:32 <@Evilpig> I summed up the last two months of his project with an email that said "if I were setting this up in postfix i'd edite main.cf and add this, and edit transports and add this. two lines and we're done" 20:32 <@Dagmar> That's rather sad 20:32 <@Evilpig> he won't even look at me when we pass in the halls now 20:33 <@Dagmar> Well, he's a fucking moron, and now he knows you know it 20:33 <@Evilpig> They made the mistake of pulling me into a conference call with microsoft where they were describing our options and I stomped all over their shit with just put in a relay 20:34 <@Evilpig> this is the same dude that is over exchange but constantly asks us what mx records are 20:34 <@Dagmar> THey're clearly trying to avoid going back to having responsible adults proxying the mail for them 20:34 <@Evilpig> my favorite was the day he asked if a domain had to have an A record in order for an MX record to work. 20:34 <@Dagmar> ...probably ebcause they've already lost track of anything like instructions about how they're routing mail now 20:34 <@Evilpig> to be clear the mx record was poingint to blah.blah.microsoft.com 20:34 <@Evilpig> and the domain was blahblah.com 20:35 <@Evilpig> it's a shit show, but at least when I forwarded those emails to my group they all got a hell of a good laugh 20:35 <@dasunt> What I'm hearing is that I should be applying for every job, fuck my qualifications. 20:35 <@Evilpig> yup 20:35 <@Dagmar> Well, yes 20:35 <@Evilpig> I'll second that 20:36 * dasunt knows eough about mx records to be able to look up what they exactly do. 20:36 <@Dagmar> You can read. You're more qualified than a disturbingly large number of employees 20:37 <@Dagmar> Hell, some of the fuckers can't even watch YouTube videos 20:37 <@dasunt> I'm beginning to suspect that if I can find the answer in five minutes on Google, I'm more qualified. 20:37 <@Dagmar> Yes. 20:38 <@Dagmar> There's a guy in netsec over at Vandy probably _still_ who couldn't find his ass with both hands and a map. LIterally 20:38 <@Dagmar> It's the joker who could not figure out how to enable SNMP on Checkpoint 20:38 <@Dagmar> I at first surmised what was necessary and suggested it to him 20:38 <@dasunt> I'm pretty sure I could enable SNMP on Checkpoint. 20:38 <@Dagmar> ...becase on my experiences from eight years and a couple revisions ago. 20:38 <@Evilpig> hahah 20:39 <@Dagmar> Then I foudn a couple of KB articles to send him 20:39 <@Evilpig> I just realized that I sent this to the thread that was getting logged in the microsoft support system 20:39 <@dasunt> Ha ha: https://www.google.com/search?q=enable+SNMP+on+checkpoint&oq=enable+SNMP+on+checkpoint&aqs=chrome..69i57l2j69i59j69i60l5.3675j0j7&sourceid=chrome&ie=UTF-8 20:39 <@Evilpig> I have a pencil too, but when I sign official documents they want that in pen that can’t be erased. You can’t solve every problem with a single tool, there becomes a point where you are creating work for the sake of trying to stay in your box and creating more issues instead of just picking up the pen. 20:39 <@Dagmar> Finally a sent him a fucking youtube video that not only clearly illustrated the four steps necessary, but showed someone doing them 20:39 <@Dagmar> HE STILL COULD NOT DO IT 20:39 * dasunt pokes pigbot. Shorten that URL! 20:39 <@Evilpig> got disconnected 20:39 <@Evilpig> I need to fix that 20:39 <@Dagmar> Peter thought I was making that shit up until we all three sat down in a meeting about it 20:40 -!- PigBot [~PigBot@wilpig.org] has joined #se2600 20:40 <@dasunt> Dagmar: Are those the same four stemps that my google search came up with? 20:40 <@Dagmar> Dude was claiming Checkpoint was escalating the problem to "engineers" 20:40 <@Dagmar> dasunt: Let's see... from memory are they... 20:40 <@Dagmar> 1. Flip the fucking checkbox in the interface to enable SNMP 20:40 <@dasunt> "To enable SNMP: In the tree view, click System Management > SNMP. Select Enable SNMP Agent. Select this option if your management station does not support SNMPv3." 20:41 <@dasunt> Don't even have to click on any search results, at the top of the page. 20:41 <@Dagmar> 2. Verify that the line in snmp.conf has the right bits to direct that OID space to the SNMPv1 daemon checkpoint has 20:41 <@Dagmar> 3. Ensure the firewall itself allows the fucking queries through 20:41 <@Dagmar> 4. Restart the goddamn OS's SNMPd 20:41 <@Dagmar> LIke, the shit isn't complex at all 20:42 <@dasunt> I'd say you should hire me, but I'm in MN. 20:42 <@Evilpig> on another topic, I've been seeing shit on facebook that the little crack dealers are slinging their wares but I have yet to see any set up around my regular grocery store. I need me some thin mints 20:43 <@Dagmar> That was the guy who was one of the reasons I wouldn't transfer into the netsec group at Vanderbilt 20:43 <@Dagmar> They had too many people who were all vegetable from the neck up 20:43 <@Evilpig> Dagmar: the university was down to a single linux admin about a month ago 20:44 <@Dagmar> Oh, _again_? 20:44 <@Evilpig> yup. 20:44 <@Dagmar> Or is that the VUMC side as well? 20:44 <@Evilpig> vumc side is fine 20:44 <@Dagmar> cuz when I transferred from the edu side I was their _last_ admin 20:44 <@Evilpig> I actually work with a decent group of folks. only two semi-turds 20:45 -!- dc0de [~jim@198.46.153.211] has joined #se2600 20:45 -!- mode/#se2600 [+o dc0de] by ChanServ 20:45 <@Dagmar> Yeah, I liked almost all the EAI guys 20:45 <@Dagmar> THe worst I could say about any of them would be "not my kinda admin" 20:45 <@dasunt> NSFW? https://i.redd.it/paql6fbt1pe41.png 20:45 < PigBot> None (at i.redd.it) http://tinyurl.com/wroh2nh 20:45 <@Dagmar> But VUIT needs to stop fucking around withe the CYA bullshit and hire some people who can get shit done, and let them do their fucking jobs 20:46 <@Evilpig> we've got a pretty sharp girl now too. really helps out having two of us that are more code minded than the rest 20:46 <@Dagmar> Good luck with that 20:47 <@dasunt> Meanwhile, I am completely unemployed. Did bath the dog today and applied for two jobs. Not sure about job #2, but I'm pretty qualified. 20:47 <@Dagmar> I always got the impression that my ability and willingness to write code was somehow considered unnatural 20:47 <@Evilpig> kyle's been heavy on "can we automate it?" 20:47 <@Dagmar> If I'd had my way, ya'll would not still be entering fucking netmasks from the 1990's in any of the build shit 20:47 <@Evilpig> it's to the point where I wrote a screen scraper to interact with pegasus because that thing is garbage 20:47 <@dasunt> Does AutoIt like it? 20:47 <@Evilpig> we don't deal with any of that anymore. it's all automated 20:47 <@Dagmar> Oh you can just fake the fuckin login cookie 20:47 <@dasunt> Also, Pegasus? Not the mail system, right? 20:48 <@Evilpig> yeah it's an internal ticket system 20:48 <@Evilpig> based off of some hp software from ye olden days and it's just garbage 20:48 <@Dagmar> I was secretly posting most of my shit with shell scripts 20:48 <@dasunt> I was thinking of: https://en.wikipedia.org/wiki/Pegasus_Mail 20:48 < PigBot> Pegasus Mail - Wikipedia (at en.wikipedia.org) http://tinyurl.com/6ggqxla 20:49 <@dasunt> Which is still around, amazingly. 20:49 <@Evilpig> we can provision out a customer system in about an hour now and it's completely hands off once you give it the name and tell it what datacenter to put it in, etc 20:50 <@Dagmar> That's not bad considering that I was doing it in 30 minutes 20:50 <@Evilpig> I mean fully provisioned, in nagios, patched, all custom requirements from that customer done 20:51 <@Dagmar> I'm angling towards nagios/cacti at work now 20:51 <@Dagmar> Patching should be a non-issue 20:51 -!- dc0de [~jim@198.46.153.211] has quit [Remote host closed the connection] 20:51 <@Evilpig> it's not a major issue, we have a monthly patch cycle now too 20:52 <@Evilpig> it's semi-automated 20:52 <@Dagmar> ...although if someone managed to get satellite working over there the way it should be used, they should give seminars 20:52 <@Dagmar> The last patch night I just scripred all my shit and sat there and read 20:52 <@Dagmar> Like, ya'll wanna do this at 2am that's fine 20:52 <@Dagmar> Don't expect me to fucking type that shit in manually at 2am 20:53 <@Dagmar> _I_ _check_ _motherfucking_ _return_values 20:53 <@Evilpig> we have satellite working 20:54 <@Evilpig> I even have shit like the dell support utilities syncing monthly to it 20:54 <@Dagmar> Are you using it for actual package distribution, or are ya'll still using it like a dumb mirror 20:54 <@Evilpig> we sync it daily from redhat, and build out our content views monthly to keep the environments on teh same patch levels 20:54 <@Dagmar> The way it's _meant_ to be use pretty much amounts to an admin should be logging into _it_ and changing the inventory and the system will take on those changes itself when it checks in 20:55 <@Evilpig> on the 28th of each month we build out the content views, automagically 20:55 <@Dagmar> The way it was being used was just plain primitive 20:55 <@Dagmar> ...which I thought was shitty until I started looking into the docus 20:55 <@Evilpig> and then we patch dev/test on the 1st thursday of the month, prod is two weeks later, and the clinical/critical systems three days after that 20:55 <@Dagmar> THe docs suck horribly 20:55 <@Evilpig> the docs are dog shit 20:55 <@Evilpig> the api guide is awful 20:56 <@Dagmar> I think that has a lot to do with why RHEL are now pushing Ansible 20:56 <@Evilpig> they tied ansible into satellite 20:56 <@Dagmar> Well, yeah 20:56 <@Evilpig> but we don't use it like that. 20:56 <@Dagmar> YOu have to establsh the web of trust fucking somewhere 20:56 <@Dagmar> Otherwise you're just doing like my lazy ass and scp'ing a tarball from the devel box after you finish the install 20:57 <@Evilpig> if you saw that environment now it's completely different from when you were there 20:57 <@Dagmar> That's good to hear 20:59 <@Dagmar> At _some_ point I'll get things squared away and formally set up ansible at work 20:59 <@Dagmar> Right now I'm just doing the same thing, without invoking anyone else's mess. ;) 20:59 <@Dagmar> A bunch of non-idempotent shell scripts 21:00 <@Evilpig> when you get around to messing with ansible I can give you some pointers on shit we've learned 21:00 <@Dagmar> That will probably be helpful 21:00 <@Dagmar> Hey are y'all doing 8 yet? 21:00 <@Dagmar> I should cut to the chase 21:00 <@Evilpig> yes 21:01 <@Dagmar> _Have you seen the fuckery that is perl modules for 8_? 21:01 <@Evilpig> fuck teaming, fuck everyone involved with thinking teaming is good 21:01 <@Evilpig> yes, it's a god damned shit show 21:01 <@Evilpig> https://www.dropbox.com/s/zajgf5xr663nly1/Screenshot%202020-02-03%2021.00.47.png?dl=0 21:01 < PigBot> Dropbox - Screenshot 2020-02-03 21.00.47.png - Simplify your life (at www.dropbox.com) http://tinyurl.com/rx356en 21:01 <@Dagmar> I rolled out three things on 8, and thankfully only one of them do I have to keep around 21:01 <@Evilpig> here's a loop that you can use with ansible to expand out a variable 21:01 <@Dagmar> THere was so much broken packaging bullshit I may still go back and refactor that one back to 7.6 21:03 <@Dagmar> Okay, soo.. yaml is some bullshit, personally 21:03 <@Evilpig> yeah it is 21:03 <@Dagmar> Mainly I need to come up with a secret server 21:04 <@Dagmar> ...and no I don't mean a hidden server 21:04 <@Evilpig> https://www.dropbox.com/s/sn4f6h72vjans95/Screenshot%202020-02-03%2021.04.05.png?dl=0 21:04 < PigBot> Dropbox - Screenshot 2020-02-03 21.04.05.png - Simplify your life (at www.dropbox.com) http://tinyurl.com/sr42827 21:04 <@Evilpig> we wrote out several helpers for stuff to make sure that when customers ask for X we do it the same way every time 21:05 <@Evilpig> but left it flexible enough that it will meet all our needs 21:06 <@Evilpig> I just realized I reused that header block from the python helper. 21:23 <@dasunt> My brain is fried. 22:19 <@dasunt> "As the IT Advanced Business Analyst, you will perform business analysis functions using a set of tasks and techniques to successfully act as a liaison among stakeholders in order to understand the structure, policies and operations of an organization and to be able to recommend solutions that enable projects to be successful and goals to be met. This includes participating in requirements gathering 22:19 <@dasunt> sessions to analyze, define and document business processes, software requirements, data management systems and development of specifications for technology initiatives. 22:19 <@dasunt> " 22:19 <@dasunt> ^- Brain fried. 22:22 <@dasunt> I'm a little afraid of how many meetings that job description had to go through to get to that point. --- Log closed Tue Feb 04 00:00:57 2020