IT Business Consultant II
Buckeye Lake, Ohio, United States
Applications have closed
TITLE: IT Business Consultant II
Location: Buckeye Lake, OH
Now is your chance to join a Forbes magazine top 100 hospital where career growth and opportunity await you.
They are committed to building healthcare teams whose care exceeds the expectations of their patients and community and are looking for quality talent who share the same values.
They’re nestled in a beautiful rural setting but close enough to the big city to enjoy that too!
If that sounds like the change you are looking for, please read on…
What you’ll be doing:
•Facilitates the efforts of corporate management in defining organizational goals and develops systems and procedures to achieve these goals.
Works with customers to identify needs, select and acquire systems, implement, manage and support systems, and develop plans that will lead to more profitable, effective and efficient operations or systems solutions.
•Evaluates the business procedures and analyzes business processes to ensure proper system configuration.
•Creates and maintains regular status reports to immediate Team Leader.
•Develops and maintains documentation and procedures as needed, provide training to other IT staff and user clients as appropriate.
•Provides application product function, design, and build expertise and experience to ensure successful product implementation.
•Primary resource dedicated to designing, building, testing, and activating the application database.
•Develops and maintains models and documentation of business and system requirements and configures system accordingly.
•Documents and maintains all required system design and build documents.
•Contributes to preparation of testing scripts and materials and performs unit, system, and integrated testing tasks.
•Works with training team to develop application specific training curriculums and materials.
•Effectively utilizes project tools, technologies and methodologies to provide clear and concise documentation/communication (i.e. project tracking, weekly reports, etc.).
•Works with all vendors to resolve issues/problems in a timely manner.
•Provides on-call support and troubleshooting via phone, remote connectivity or on-site if necessary.
•Utilizes and follows the project management and work prioritization methodologies and protocols established by IT leadership.
•Subscribes to relevant technology information channels to stay informed of security vulnerabilities.
•Proactively assesses potential items of risk and opportunities of vulnerability in the network.
Additional info:
•Position will report to the Director.
•This position will be HYBRID. Initially while in the implementation phase and post live support phase the person could need to be onsite 24-40hrs week. Once all is completed will reduce to onsite 0-16hrs week.
Requirements
What they’re looking for:
•Associates or Bachelors degree in computer science, management or an IT-related discipline
•Healthcare application design, build and implementation experience required. Ambulatory office or hospital outpatient scheduling and registration experience with a knowledge of referrals, prior auths, estimates and real time eligibility preferred.
•Appropriate certifications obtained within appropriate time frame. Epic(Cadence, Grand Central, Prelude, Resolute Professional Billing, Claims) 6 months from hire; Other application(s) as assigned: one year from hire. Competencies for applications other than Epic must be met/maintained and will be tracked by manager/director.
•Two years project management experience in systems analysis, system design and/or computer system project management.
GENERAL
Benefits
Hours and compensation potential:
•The position is full-time.
•The range is between $70K-$92K year depending on experience.
•Full benefits package included.
Tags: Computer Science Vulnerabilities
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open PowerShell-related jobs
- Open SQL-related jobs