The position involves analyzing user and business requirements and designing solutions for systems. The position requires learning and understanding the systems unique to the University of Iowa Hospitals and understanding the controls and access requirements involved and assigning the appropriate access and permissions to hospital users.
This position is responsible for designing, developing and implementing software solutions for a wide variety of business needs. A successful candidate will effectively translate user requirements into usable software.
In this role, you will implement and integrates new information technology infrastructure using approved Information Technology (IT) processes. Identifies, analyzes, selects and applies appropriate new information technology infrastructure components within a diverse environment as required to support strategic business plans and processes.
As a Data Wrangler, you will work within an Analytics Team within the Enterprise Analytics Accelerator (EAA) to generate high-value business insights on transformational projects together with the Business Insight Lead and Data Scientist.
In this role, you will be supporting the leadership team in managing the relationships, the Sales Support Analyst partners with the relationship owner to deliver sound advice and solutions to the client. This firm provides business planning solutions to investment advisors.
In this role, you will coordinate resources during Performance and Stress testing phase to assure that developed solution satisfies client requirements including but not limited to developing test scripts, setting up test data, and assisting with activities relating to unit, performance, integration, conversion and cut-over testing, particularly packaged application configurations.
To help you find the most relevant
jobs, we've come up with an approximate compensation for this
position. This is based on similar jobs with compensation
$70K to $100K -Illinois City, IL
In this role, the selected candidate will assist in identifying, reporting and remediating security risks and vulnerabilities (e.g. review the results for security vulnerability scanning tools; coordinate the installation of security patches and 3rd party application upgrades, monitor the status of anti-virus controls, etc.