In this role, you will work directly with all interested parties to document functional and technical requirements that meet business needs, provide creative solutions, as well as conduct analysis and define business cases related to the implementation of new solutions.
In this role, the selected candidate will identify security issues for remediation and performs system/network STIG implementation and verification, software certificate of netwrothyness verifications, software and hardware management, system integration assitance and patching/auditing through HBSS, SCCM, SCOM, and SPLUNK.
The person in this role will be responsible for combining business perspective and understanding with IT and functional application experience in order to enhance processes. The IT Business Systems Analyst will provide hands-on support of applications and will assist in the implementation of effective solutions in order to meet growth requirements.
This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
Provide Go Live support of EMR applications during Go Live period, as well as post Go Live period & responsible for training nurses, therapists and physicians on EMR application at hospitals and outpatient rehabilitation clinics.
In this role, you will serve as an Information Systems Security Officer (ISSO) for an Air Force client. Assist with the Certification and Accreditation (C&A) of standalone computers and networks using government standards. Gather the information necessary to maintain security and establish functioning external barriers, including firewalls and other security measures.
In this role, you will be responsible for achieving in-depth knowledge of Epic billing application software (Resolute) to serve as a bridge between end-user needs and the appropriate system build and configuration to support them.
Consults with all areas of the business, particularly Product Management and Product Development to advise on matters of security. Architects, Implements, Administers and Operates Information Security Systems.
The ideal candidate for position will be a proactive and self-motivated professional who will work with other team members to manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases.
In this role, the selected candidate will provide operational enhancements, maintenance and support for a suite of software products, including, but not limited to: AIX/Unix/Windows based systems that support the TXCSES 2.0 infrastructure applications.
In this role, the selected candidate will analyze issues, facts and available information to develop logical solutions; researching inconsistencies found in data; drawing correct inferences from information and making recommendations that support business decisions.