IT Business Consultant II

Buckeye Lake, Ohio, United States

TITLE: IT Business Consultant II
Location: Buckeye Lake, OH
 
Now is your chance to join a Forbes magazine top 100 hospital where career growth and opportunity await you.
They are committed to building healthcare teams whose care exceeds the expectations of their patients and community and are looking for quality talent who share the same values.
They’re nestled in a beautiful rural setting but close enough to the big city to enjoy that too!
If that sounds like the change you are looking for, please read on…


What you’ll be doing:
•Facilitates the efforts of corporate management in defining organizational goals and develops systems and procedures to achieve these goals. 
Works with customers to identify needs, select and acquire systems, implement, manage and support systems, and develop plans that will lead to more profitable, effective and efficient operations or systems solutions.
•Evaluates the business procedures and analyzes business processes to ensure proper system configuration.
•Creates and maintains regular status reports to immediate Team Leader.
•Develops and maintains documentation and procedures as needed, provide training to other IT staff and user clients as appropriate.
•Provides application product function, design, and build expertise and experience to ensure successful product implementation. 
•Primary resource dedicated to designing, building, testing, and activating the application database.
•Develops and maintains models and documentation of business and system requirements and configures system accordingly.
•Documents and maintains all required system design and build documents.
•Contributes to preparation of testing scripts and materials and performs unit, system, and integrated testing tasks.
•Works with training team to develop application specific training curriculums and materials.
•Effectively utilizes project tools, technologies and methodologies to provide clear and concise documentation/communication (i.e. project tracking, weekly reports, etc.).
•Works with all vendors to resolve issues/problems in a timely manner.
•Provides on-call support and troubleshooting via phone, remote connectivity or on-site if necessary.
•Utilizes and follows the project management and work prioritization methodologies and protocols established by IT leadership.
•Subscribes to relevant technology information channels to stay informed of security vulnerabilities.
•Proactively assesses potential items of risk and opportunities of vulnerability in the network. 
Additional info:
•Position will report to the Director.
•This position will be HYBRID. Initially while in the implementation phase and post live support phase the person could need to be onsite 24-40hrs week. Once all is completed will reduce to onsite 0-16hrs week.

Requirements

What they’re looking for:
•Associates or Bachelors degree in computer science, management or an IT-related discipline
•Healthcare application design, build and implementation experience required. Ambulatory office or hospital outpatient scheduling and registration experience with a knowledge of referrals, prior auths, estimates and real time eligibility preferred.
•Appropriate certifications obtained within appropriate time frame.  Epic(Cadence, Grand Central, Prelude, Resolute Professional Billing, Claims)  6 months from hire; Other application(s) as assigned:  one year from hire.  Competencies for applications other than Epic must be met/maintained and will be tracked by manager/director.
•Two years project management experience in systems analysis, system design and/or computer system project management.

GENERAL


Benefits

Hours and compensation potential:
•The position is full-time.
•The range is between $70K-$92K year depending on experience.
•Full benefits package included.

Job stats:  11  0  0
Category: Consulting Jobs

Tags: Computer Science Vulnerabilities

Region: North America
Country: United States

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.