The role of Systems Analyst will analyze and interpret business and user requirements into technical specifications that have an appropriate level of detail suitable for use by the development and implementation teams. Lead the team and other resources to ensure alignment of technical solutions with business requirements for complex business projects.
In this role, the selected candidate will identify and promote applications to target departments based on utilization statistics and other feedback;·engage resources to promote adoption of CareConnect.
In this role, you will under general direction, the Business Analyst effectively facilitates the gathering, analysis, prioritization and categorization of complex business requirements in the revenue business lines s/he supports. Leads and directs business teams in medium to large projects creating new business solutions or enhancements to existing business solutions.
Develop detailed business requirements, use cases and functional specifications with supporting documents including business process and data flow models using MS Visio for SDLC Methodology (Waterfall and Agile).
Review/validation of Business Requirement documents, List Specification document and marketing materials that includes an assessment of all documents/materials reviewed after completion to stakeholders/management.
Provides recommendations on system optimization to increase user efficiency and system configuration to meet compliance requirements. Explores, evaluates, recommends, and designs new features and functionalities or process re - configuration.
The hris analyst will be responsible for modifying existing systems to add value to the business processes and solutions, as well as researching and delivering proposals for additional systems and solutions to meet business needs.
The Information Security Analyst will work with senior security engineers and management while sharing responsibility of supporting and maintaining security tools, processes and procedures within SaaS Datacenters that ensure the confidentiality, integrity, and availability of infrastructure and application operations.