|
J1819 : CDS reviewer
• Manage all electronic clinical documentation in the hospital (EPIC, Meditech & One content, CPSI and other EMR applications). • Review concurrent medical record for coding & documentation compliance including completeness and accuracy for severity of illness (SOI) and quality. • Complete accurate and timely record review to ensure the integrity of documentation compliance. • Recognizes opportunities for documentation improvement using strong clinical & critical thinking skills.
|
|
J1815 : Sr. Analyst - Security Operations Center (SOC)
• Perform advanced security Operations tasks in SOC • Well versed with SIEM products – McAfee or QRadar or LogRhythm etc. • Strong conceptual skills around network security • Assist on the advanced security incident resolution • Expert in malware analysis (static & dynamic)
|
|
J1814 : Analyst - Forensics
• The successful applicant must possess one or more current, applicable professional/technical certifications, such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), GPEN, GWAPT, SANS GCFA/GCFE/GSEC/GCIA/GCIH/GREM/GNFA, EnCE, CHFI, CEH, ECIH
|
|
J1813 : Analyst - Threat Hunter
• The successful applicant must possess one or more current, applicable professional/technical certifications, such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), GPEN, GWAPT, SANS GCFA/GCFE/GSEC/GCIA/GCIH/GREM/GN
|
|
J1812 : Analyst - Security Operations Center (SOC)
Experience: Demonstrable SOC specialist Working Experience having managed L1 level responsibilities (1-3 years of relevant working experience and as a full-time employee in an organization).
|
|
J1800 : RIT - Senior Analyst (Meditech Systems)
Meditech System Analyst acts as a business liaison to assigned Healthcare Information System (HIS) applications function as intended. Identify, in Meditech EMR, problematic areas resulting in revenue leakage and propose solutions to optimize the system. Expertise with US healthcare business processes and associated HIS applications Analyze and resolve HIS application software, interface and report issues. Ability to troubleshoot and propose solutions to complex problems.
|
|
J1799 : RIT Report Writer/MIS
Experience in analyzing and presenting the data with findings Gather and interpret complex data from various sources Advance level in Excel, with macro writing ability, to automate certain reports and tasks. Develop complex SQL queries to produce reports that meet business requirements. Analyze data trends and insights to provide meaningful conclusions in reports Ensure the accuracy and integrity of the data being reported
|
|
J1793 : Senior Associate - SCM
? Accurate and timely entry of item-related data into the system. ? Collaboration with relevant teams to ensure completeness and accuracy of Item Master records. ? Assist in the creation and maintenance of material master records. ? Ensure material data aligns with established standards and guidelines. ? Assist in maintaining the accurate Item Master order-related data. ? Understanding the packaging information like Unit of Measure, quantities ? Vendor and Manufacture name standardization and N
|
|
J1791 : Associate - Claims Examiner
The Associate would need to Validate the following and process claims to pay: 1. Authorization 2. Financial risk per DOFR 3. If all codes are payable and if so how (applying multi procedure reductions and NCCI/PTP edits as necessary) 4. Validating copay and coinsurances on payable codes Once all the above are validated, the associate would then add EOB codes per instruction as well as update supplemental screen per instruction
|
|
J1787 : Analyst - Procurement
Role and Responsibilities ? The Buyer is responsible for purchasing a variety of equipment, supplies and services utilizing computerized systems. ? Orders parts on a timely basis to ensure sufficient stock and plan proper organization. ? Reviews and evaluates proper vendor selections for “stock”, non-stock”, “Special”, item purchasing. ? Responsible for working daily orders, incidents, exceptions, buyer messages and communicating with responsible parties as needed ? Communicates with vendors and internal teams as needed regarding requirements, discrepancies, pricing, substitutes, and backorders. ? Prioritizes duties for optimum productivity. ? Developing and maintaining sources of supply, selecting suppliers, negotiating prices and delivery dates, approving purchase requisitions/orders, and following up on purchases with regard to delivery date, discrepancies, and backorder situations ? Ensuring data integrity, monitoring, and auditing data for inconsistencies and reporting them to the teams responsible for making corrections if needed. ? Other additional tasks as assigned related to the role.
|
|
J1774 : Cybersecurity Advisor - Forensics
Position: Cyber Security – Advisor - Forensics Education: B.E or MCA (Preferable) Experience: Demonstrable SOC specialist Working Experience having managed L3 level responsibilities (6 to11 years of relevant working experience and as a full-time employee in an organization.
|
|
J1773 : TRO - Vulnerability Assessment - Analyst
In this role, you will be instrumental in identifying and assessing vulnerabilities across our IT infrastructure. Additionally, you will leverage basic coding skills to develop automation solutions that enhances overall workflow efficiency of vulnerability management processes. - Conduct initial vulnerability scans and assessments on a range systems, networks, and applications using industry-standard vulnerability assessment tools.
|
|
J1772 : TRO - Threat Hunter - Specialist
• Proactively hunt for advanced threats within the network and systems using various tools and techniques • Use both Attack Based Hunting and Data Based Hunting to identify and analyze potential threats • Stay up to date with the emerging threats and the tactics, techniques, and procedures (TTPs) used by threat actors • Use various data transformation techniques to facilitate effective hunting • Dissect and simulate attacks that would help in conceptualizing and executing the hunts • Contribute to the hunting knowledge management i.e., document details about the hunting expeditions, common behaviors, explained anomalies, friendly intelligence, etc. • Collaborate within/outside the team regarding the identified anomalies and develop and implement tactics for the detection and prevention of incidents • Create and maintain custom threat-hunting queries, scripts, and dashboards • Assist in converting successful hunting techniques into automated detection to the extent feasible • Evaluate the hunting evidence sources and identify improvement areas when needed • Perform host-based and network-based analysis to support investigations and incident response • Document, report, and present critical information about the investigation/procedures performed • Actively participate in the establishment of policies and procedures, training of personnel, and maintenance of analysis and hunting toolset • Provide recommendations for improving security posture based on threat-hunting insights • Contribute to and/or participate in Cyber Maturity Assessment activities like purple team exercises, table-top exercises, etc. • Share knowledge and ideas with other team members
|
|
J1771 : TRO - Threat Hunter - Specialist
• Proactively hunt for advanced threats within the network and systems using various tools and techniques • Use both Attack Based Hunting and Data Based Hunting to identify and analyze potential threats • Stay up to date with the emerging threats and the tactics, techniques, and procedures (TTPs) used by threat actors • Use various data transformation techniques to facilitate effective hunting • Dissect and simulate attacks that would help in conceptualizing and executing the hunts • Contribute to the hunting knowledge management i.e., document details about the hunting expeditions, common behaviors, explained anomalies, friendly intelligence, etc. • Collaborate within/outside the team regarding the identified anomalies and develop and implement tactics for the detection and prevention of incidents • Create and maintain custom threat-hunting queries, scripts, and dashboards • Assist in converting successful hunting techniques into automated detection to the extent feasible • Evaluate the hunting evidence sources and identify improvement areas when needed • Perform host-based and network-based analysis to support investigations and incident response • Document, report, and present critical information about the investigation/procedures performed • Actively participate in the establishment of policies and procedures, training of personnel, and maintenance of analysis and hunting toolset • Provide recommendations for improving security posture based on threat-hunting insights • Contribute to and/or participate in Cyber Maturity Assessment activities like purple team exercises, table-top exercises, etc. • Share knowledge and ideas with other team members
|
|
J1770 : Cyber Security ~ Advisor (EP - L3)
• Perform regular administrative task such as verifying EPO master server and Distributed repository, VSE, ENS and McAfee endpoint specific event log monitoring, definition distribution Verification and health check of repositories. Pro-active management of ePO\VSE\ENS\DLP\HIPS\EEPC issues and events. • Meet SLA s by processing requests to resolve endpoint security issues with workstation support and end users which also includes exception/ exclusion handling • Provide desktop and technical expertise to the Security Services Team. • Provide technical support in evaluating, designing, implementing, and supporting a McAfee endpoint and other advanced endpoint protection environment • Ensure all policies and procedures are followed, work within the scope of the project, and adhere to time constraints. • Conduct appropriate analysis and work with appropriate resources to ensure issues are addressed in a timely manner. Issues that are unable to be resolved should be appropriately forwarded to vendor product support, and followed through to resolution. • Compliance policy configuration and troubleshooting • Evaluate, implement, roll- out, and endpoint security solutions. • Manage and execute on projects within the team and cross- functionally. • Perform root cause analysis to resolve issues quickly in a complex IT environment. • Follow policies and procedures including those for ITIL incident, problem, change, and release management.
Required Skills and Experience: • Candidate should possess minimum 10-15+ Years of Experience in Endpoint Security/IT Operational Security having minimum of 5 years of experience in Managing and Supporting McAfee ePolicy Orchestrator, Virusscan Enterprise, Data Loss Prevention, Host Intrusion Prevention and Endpoint Encryption. • The requirement is to support the McAfee ePO environment with strong McAfee Endpoint Security suite policy configuration and deployment support. • Candidate should be a Subject Matter Expert with in-depth knowledge of implementation, and operational support, administration surrounding the process supporting the business for End-User Enabled Security technologies/initiatives specifically on McAfee endpoint security • The candidate should have a solid understanding of end-user Endpoint technologies, complete understanding of McAfee Endpoint policies, their strengths, weakness and applicable usages. • Should have good Work Experience on Infrastructure Security Domain mainly on McAfee Endpoint products. • Operational experience on components like McAfee Agent, VSE, HIPS, ENS, TIE, DXL, FRP, MDE, MAR, and MOVE products. • Ability to create VBscripts to use for asset searching and automation. • Define and configure McAfee Endpoint Security policies including AV on access and on demand scanning, firewall, access protection, intrusion prevention, queries and use of ePO policy and client task assignment with tags. • Must have advanced trouble shooting skills to identify the severity of the issue, ability to resolve issues quickly to account/customer satisfaction and Prepare RCA. • High Severity Incident Analysis, incident trend report, and create new policy and reports • Good knowledge/understanding on Threat Analysis. • Good working knowledge/understanding on Data loss prevention and Endpoint Encryption tools • Should have knowledge in handling Major Virus outbreaks/Major incidents • Excellent customer handling skills along with extensive hands on skills in defining and creating operational/procedure documents. • Possess knowledge on ITIL processes like Incident Management, Problem Management, Configuration Management and Change Management processes Preferred Certification: • McAfee Product Specialist to Advisor level requirement.
|
|
J0846 : Senior Manager
Assistant Manager • Monitor Daily production & ETA and achieving daily/monthly target • Monitor Quality accuracy and provide feedbacks to immediate supervisors and team members’. • Perform root cause analysis and provide solution if not achieving production or quality. • Analyzing and prevent the denials related to Eligibility. • Working on performance dashboard and MIS to the management • Calibrating with US office and working on training requirements internally • Evaluating the performance of team members and providing adequate feedback to setup a career path
|