In this role, you will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction and provide the technical support necessary to evolve/sustain Cyber infrastructure as well as data and processes.
Provide Go Live support of EMR applications during Go Live period, as well as post Go Live period & responsible for training nurses, therapists and physicians on EMR application at hospitals and outpatient rehabilitation clinics.
The person in this role will be responsible for combining business perspective and understanding with IT and functional application experience in order to enhance processes. The IT Business Systems Analyst will provide hands-on support of applications and will assist in the implementation of effective solutions in order to meet growth requirements.
In this role, the selected candidate will provide operational enhancements, maintenance and support for a suite of software products, including, but not limited to: AIX/Unix/Windows based systems that support the TXCSES 2.0 infrastructure applications.
In this role, the selected candidate will identify security issues for remediation and performs system/network STIG implementation and verification, software certificate of netwrothyness verifications, software and hardware management, system integration assitance and patching/auditing through HBSS, SCCM, SCOM, and SPLUNK.
In this role, you will work directly with all interested parties to document functional and technical requirements that meet business needs, provide creative solutions, as well as conduct analysis and define business cases related to the implementation of new solutions.
This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
The ideal candidate for position will be a proactive and self-motivated professional who will work with other team members to manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases.