{"id":25463,"date":"2019-08-15T16:49:20","date_gmt":"2019-08-15T21:49:20","guid":{"rendered":"https:\/\/wp.stolaf.edu\/pipercenter\/?page_id=25463"},"modified":"2025-09-11T15:56:51","modified_gmt":"2025-09-11T20:56:51","slug":"business-analytics-tech","status":"publish","type":"page","link":"https:\/\/wp.stolaf.edu\/pipercenter\/business-analytics-tech\/","title":{"rendered":"Business &amp; Data Analytics"},"content":{"rendered":"<div data-modular-content-collection><h5><span style=\"font-weight: 400;\">Common Careers<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.prospects.ac.uk\/job-profiles\/application-analyst\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Application Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.mastersindatascience.org\/careers\/business-analyst\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Business Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.coursera.org\/articles\/business-intelligence-analysts-what-they-are-and-how-to-become-one\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Business Intelligence Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.computerscience.org\/careers\/systems-analyst\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Business System Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.mastersindatascience.org\/careers\/data-analyst\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Data Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.prospects.ac.uk\/job-profiles\/database-administrator\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Database Administrator<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.computerscience.org\/careers\/information-security-analyst\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Information Security Analyst<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/it-consulting\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">IT Consulting<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.coursera.org\/articles\/it-project-manager\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Information Technology Project Managers<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.simplilearn.com\/cyber-security-consultant-article\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Information Technology Security Consultants<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.mynextmove.org\/profile\/summary\/13-2099.02\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Risk Advisory<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/uxpa.org\/resources\/about-ux\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">User Experience (UX<\/span><\/a><span style=\"font-weight: 400;\">) <\/span><span style=\"font-weight: 400;\">\u00a0or watch <\/span><a href=\"https:\/\/www.lynda.com\/User-Experience-tutorials\/Planning-Career-User-Experience\/432558-2.html?srchtrk=index%3a1%0alinktypeid%3a2%0aq%3aPlanning+a+Career+in+User+Experience+%0apage%3a1%0as%3arelevance%0asa%3atrue%0aproducttypeid%3a2\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">this video<\/span><\/a><span style=\"font-weight: 400;\"> for detailed info on UX careers (St. Olaf login required)<\/span><\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">Student Involvement Opportunities<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Problem Solving Club<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/stolaf.presence.io\/organization\/sports-analytics-club\"><span style=\"font-weight: 400;\">Sports Analytics Club<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/stolaf.presence.io\/organization\/linux-ladies-organization-for-diversity-in-computing\"><span style=\"font-weight: 400;\">Linux Ladies<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.acm.org\/\"><span style=\"font-weight: 400;\">Association for Computing Machinery (ACM)<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/wp.stolaf.edu\/cir\/\"><span style=\"font-weight: 400;\">Center for Interdisciplinary Research<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/wp.stolaf.edu\/it\/student-employment\/\"><span style=\"font-weight: 400;\">Student employment: Information Technology<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/wp.stolaf.edu\/iea\/\"><span style=\"font-weight: 400;\">Student employment: Institutional Research and Effectiveness<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/wp.stolaf.edu\/pipercenter\/connect-with-us\/peer-advisors\/\"><span style=\"font-weight: 400;\">Student employment: Piper Center Data Analyst<\/span><\/a><\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">Key Training Resources<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check out <\/span><a href=\"https:\/\/www.linkedin.com\/learning\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Lynda.com\/LinkedInLearning\u2019s<\/span><\/a><span style=\"font-weight: 400;\"> FREE online learning platform for various topics and training, including:\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.lynda.com\/Big-Data-training-tutorials\/2061-0.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Big Data Training and Tutorials<\/span><\/a><span style=\"font-weight: 400;\">: such as <\/span><a href=\"https:\/\/www.linkedin.com\/learning\/the-data-science-of-retail-sales-and-commerce\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">The data science of Retail, Sales, and Commerce<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.lynda.com\/Data-Analysis-training-tutorials\/1303-0.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Data Analysis Training and Tutorials<\/span><\/a><span style=\"font-weight: 400;\">: such as <\/span><a href=\"https:\/\/www.lynda.com\/Tableau-tutorials\/Tableau-10-Essential-Training\/500540-2.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Tableau Essential training<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.lynda.com\/Data-Analysis-training-tutorials\/1303-0.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Security Training and Tutorials<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.lynda.com\/Excel-tutorials\/Excel-Tips-Weekly\/363001-2.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Excel Weekly Tips<\/span><\/a><\/li>\n<li><a href=\"https:\/\/igotanoffer.com\/blogs\/tech\" target=\"_blank\" rel=\"noopener noreferrer\">I Got An Offer &#8211; Tech Prep<\/a><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">And more!\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">Recruiting Tips<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.themuse.com\/advice\/how-to-make-sure-your-resume-is-as-current-as-your-skills\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">How to Prepare your resume for a tech job<\/span><\/a><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Job Postings<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">St. Olaf College\u2019s Handshake database<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.dice.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Dice<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/itjobpro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">IT Job Pro<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.roberthalf.com\/us\/en\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Robert Half<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.techcareers.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Tech Careers<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/scitechmn.org\/students\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">SciTechSperience Internship Program<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/minneanalytics.org\/jobs\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Minneanalytics<\/span><\/a><\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">Professional Associations<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/aisnet.org\/?\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Association for Information Systems<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Gartner Group<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/mnissa.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">MN Information Systems Security Association<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.aitp.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Association of Information Technology Professionals<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/tech.mn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">TECHdotMN \u2013 Minnesota technology news<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/minneanalytics.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Minneanalytics<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/minnestar.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">MinneStar<\/span><\/a><span style=\"font-weight: 400;\">&#8211; MN Tech Community<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/uxpa.org\/resources\/about-ux\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">User Experience Professionals Association UX Resources<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.onwardsearch.com\/UX-Career-Guide\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">ONWARD Search\u2019s \u201cA Guide to UX Careers\u201d<\/span><\/a><\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">Additional Resources<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.vault.com\/company-rankings\/consulting\/best-firms-in-each-practice-area\/?sRankID=396\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">2018 Best IT Strategy Consulting Firms to Work For<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><a href=\"http:\/\/www.vault.com\/company-rankings\/consulting\/best-firms-in-each-practice-area\/?sRankID=397\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">2018 Best Consulting Firms for IT Operations Consulting<\/span><\/a><\/li>\n<\/ul>\n<p><!-- begin-migrated-from-panel-builder --><!-- end-migrated-from-panel-builder --><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Common Careers Application Analyst Business Analyst Business Intelligence Analyst Business System Analyst Data Analyst Database Administrator\u00a0 Information Security Analyst IT Consulting Information Technology Project Managers Information Technology Security Consultants Risk [&hellip;]<\/p>\n","protected":false},"author":1238,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-25463","page","type-page","status-publish","hentry"],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/pages\/25463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/users\/1238"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/comments?post=25463"}],"version-history":[{"count":14,"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/pages\/25463\/revisions"}],"predecessor-version":[{"id":49524,"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/pages\/25463\/revisions\/49524"}],"wp:attachment":[{"href":"https:\/\/wp.stolaf.edu\/pipercenter\/wp-json\/wp\/v2\/media?parent=25463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}