|
J1800 : RIT - Senior Analyst (Meditech Systems)
Meditech System Analyst acts as a business liaison to assigned Healthcare Information System (HIS) applications function as intended. Identify, in Meditech EMR, problematic areas resulting in revenue leakage and propose solutions to optimize the system. Expertise with US healthcare business processes and associated HIS applications Analyze and resolve HIS application software, interface and report issues. Ability to troubleshoot and propose solutions to complex problems.
|
|
J1799 : RIT Report Writer/MIS
Experience in analyzing and presenting the data with findings Gather and interpret complex data from various sources Advance level in Excel, with macro writing ability, to automate certain reports and tasks. Develop complex SQL queries to produce reports that meet business requirements. Analyze data trends and insights to provide meaningful conclusions in reports Ensure the accuracy and integrity of the data being reported
|
|
J1791 : Associate - Claims Examiner
The Associate would need to Validate the following and process claims to pay: 1. Authorization 2. Financial risk per DOFR 3. If all codes are payable and if so how (applying multi procedure reductions and NCCI/PTP edits as necessary) 4. Validating copay and coinsurances on payable codes Once all the above are validated, the associate would then add EOB codes per instruction as well as update supplemental screen per instruction
|
|
J1782 : Associate/Senior Associate - Credentialing
Responsible to credential/re-credential providers & medical groups with all payers including Medicare & Medicaid. Update credentialing application with status of the requests sent, coordinate with medical group & retrieve provider related documents/data. Request & complete ERA enrollments for medical groups with payers
|
|
J1774 : Cybersecurity Advisor - Forensics
Position: Cyber Security – Advisor - Forensics Education: B.E or MCA (Preferable) Experience: Demonstrable SOC specialist Working Experience having managed L3 level responsibilities (6 to11 years of relevant working experience and as a full-time employee in an organization.
|
|
J1773 : TRO - Vulnerability Assessment - Analyst
In this role, you will be instrumental in identifying and assessing vulnerabilities across our IT infrastructure. Additionally, you will leverage basic coding skills to develop automation solutions that enhances overall workflow efficiency of vulnerability management processes. - Conduct initial vulnerability scans and assessments on a range systems, networks, and applications using industry-standard vulnerability assessment tools.
|
|
J1772 : TRO - Threat Hunter - Specialist
• Proactively hunt for advanced threats within the network and systems using various tools and techniques • Use both Attack Based Hunting and Data Based Hunting to identify and analyze potential threats • Stay up to date with the emerging threats and the tactics, techniques, and procedures (TTPs) used by threat actors • Use various data transformation techniques to facilitate effective hunting • Dissect and simulate attacks that would help in conceptualizing and executing the hunts • Contribute to the hunting knowledge management i.e., document details about the hunting expeditions, common behaviors, explained anomalies, friendly intelligence, etc. • Collaborate within/outside the team regarding the identified anomalies and develop and implement tactics for the detection and prevention of incidents • Create and maintain custom threat-hunting queries, scripts, and dashboards • Assist in converting successful hunting techniques into automated detection to the extent feasible • Evaluate the hunting evidence sources and identify improvement areas when needed • Perform host-based and network-based analysis to support investigations and incident response • Document, report, and present critical information about the investigation/procedures performed • Actively participate in the establishment of policies and procedures, training of personnel, and maintenance of analysis and hunting toolset • Provide recommendations for improving security posture based on threat-hunting insights • Contribute to and/or participate in Cyber Maturity Assessment activities like purple team exercises, table-top exercises, etc. • Share knowledge and ideas with other team members
|
|
J1771 : TRO - Threat Hunter - Specialist
• Proactively hunt for advanced threats within the network and systems using various tools and techniques • Use both Attack Based Hunting and Data Based Hunting to identify and analyze potential threats • Stay up to date with the emerging threats and the tactics, techniques, and procedures (TTPs) used by threat actors • Use various data transformation techniques to facilitate effective hunting • Dissect and simulate attacks that would help in conceptualizing and executing the hunts • Contribute to the hunting knowledge management i.e., document details about the hunting expeditions, common behaviors, explained anomalies, friendly intelligence, etc. • Collaborate within/outside the team regarding the identified anomalies and develop and implement tactics for the detection and prevention of incidents • Create and maintain custom threat-hunting queries, scripts, and dashboards • Assist in converting successful hunting techniques into automated detection to the extent feasible • Evaluate the hunting evidence sources and identify improvement areas when needed • Perform host-based and network-based analysis to support investigations and incident response • Document, report, and present critical information about the investigation/procedures performed • Actively participate in the establishment of policies and procedures, training of personnel, and maintenance of analysis and hunting toolset • Provide recommendations for improving security posture based on threat-hunting insights • Contribute to and/or participate in Cyber Maturity Assessment activities like purple team exercises, table-top exercises, etc. • Share knowledge and ideas with other team members
|
|
J1770 : Cyber Security ~ Advisor (EP - L3)
• Perform regular administrative task such as verifying EPO master server and Distributed repository, VSE, ENS and McAfee endpoint specific event log monitoring, definition distribution Verification and health check of repositories. Pro-active management of ePO\VSE\ENS\DLP\HIPS\EEPC issues and events. • Meet SLA s by processing requests to resolve endpoint security issues with workstation support and end users which also includes exception/ exclusion handling • Provide desktop and technical expertise to the Security Services Team. • Provide technical support in evaluating, designing, implementing, and supporting a McAfee endpoint and other advanced endpoint protection environment • Ensure all policies and procedures are followed, work within the scope of the project, and adhere to time constraints. • Conduct appropriate analysis and work with appropriate resources to ensure issues are addressed in a timely manner. Issues that are unable to be resolved should be appropriately forwarded to vendor product support, and followed through to resolution. • Compliance policy configuration and troubleshooting • Evaluate, implement, roll- out, and endpoint security solutions. • Manage and execute on projects within the team and cross- functionally. • Perform root cause analysis to resolve issues quickly in a complex IT environment. • Follow policies and procedures including those for ITIL incident, problem, change, and release management.
Required Skills and Experience: • Candidate should possess minimum 10-15+ Years of Experience in Endpoint Security/IT Operational Security having minimum of 5 years of experience in Managing and Supporting McAfee ePolicy Orchestrator, Virusscan Enterprise, Data Loss Prevention, Host Intrusion Prevention and Endpoint Encryption. • The requirement is to support the McAfee ePO environment with strong McAfee Endpoint Security suite policy configuration and deployment support. • Candidate should be a Subject Matter Expert with in-depth knowledge of implementation, and operational support, administration surrounding the process supporting the business for End-User Enabled Security technologies/initiatives specifically on McAfee endpoint security • The candidate should have a solid understanding of end-user Endpoint technologies, complete understanding of McAfee Endpoint policies, their strengths, weakness and applicable usages. • Should have good Work Experience on Infrastructure Security Domain mainly on McAfee Endpoint products. • Operational experience on components like McAfee Agent, VSE, HIPS, ENS, TIE, DXL, FRP, MDE, MAR, and MOVE products. • Ability to create VBscripts to use for asset searching and automation. • Define and configure McAfee Endpoint Security policies including AV on access and on demand scanning, firewall, access protection, intrusion prevention, queries and use of ePO policy and client task assignment with tags. • Must have advanced trouble shooting skills to identify the severity of the issue, ability to resolve issues quickly to account/customer satisfaction and Prepare RCA. • High Severity Incident Analysis, incident trend report, and create new policy and reports • Good knowledge/understanding on Threat Analysis. • Good working knowledge/understanding on Data loss prevention and Endpoint Encryption tools • Should have knowledge in handling Major Virus outbreaks/Major incidents • Excellent customer handling skills along with extensive hands on skills in defining and creating operational/procedure documents. • Possess knowledge on ITIL processes like Incident Management, Problem Management, Configuration Management and Change Management processes Preferred Certification: • McAfee Product Specialist to Advisor level requirement.
|
|
J1769 : Trainer - Procurement
Duties & Tasks will include (Not limited to):
? Conducting Training needs assessments and developing an educational program. ? Delivering a Lawson procurement training curriculum. ? Developing training modules and case studies using real time cases. ? Developing a monitoring and evaluation framework to measure the efficiency of the training. ? Conduct Refresher trainings for the team from time to time. ? Train new joiners as per the training schedule. ? Working with the production and management team to roll out process changes ? Responsible for transitioning employees from training to pre-production to production with the right knowledge of work and technical expertise. ? Identify training needs by analyzing job requirements, current training programs and strategize an approach to develop training solutions and learning initiatives ? Collaborate with the inhouse development team to develop online training to be delivered on LMS
|
|
J1768 : Associate - SCM
? Accurate and timely entry of item-related data into the system. ? Collaboration with relevant teams to ensure completeness and accuracy of Item Master records. ? Assist in the creation and maintenance of material master records. ? Ensure material data aligns with established standards and guidelines. ? Assist in maintaining the accurate Item Master order-related data. ? Understanding the packaging information like Unit of Measure, quantities ? Vendor and Manufacture name standardization and N
|
|
J1766 : Sr Interface Engineer
Design, develop, implement and maintain interfaces between Epic and external systems using HL7 v2, CCD/CDA, FHIR (R4/R5), and web APIs. Build and support Epic-specific integrations (Bridges, Interconnect / Epic FHIR APIs, CareEverywhere, Chronicles/Clarity extracts) and coordinate with Epic analysts/vendor support as needed. Develop and manage integration logic using middleware and engines (Mirth Connect, Rhapsody, Cloverleaf, Corepoint, or equivalent). Implement SMART on FHIR and OAuth2/OpenID
|
|
J1765 : Sr Data Quality Engineer
Design, develop and operate a robust data quality framework and processes to validate, monitor and improve data across batch and streaming pipelines. Define data quality rules, checks and thresholds (completeness, accuracy, consistency, uniqueness, timeliness, validity, freshness) and implement them as automated tests. Perform data profiling, anomaly detection, root-cause analysis and triage for data incidents; drive remediation with owners.
|
|
J1629 : Associate/Sr Associate
Review and resolve daily hospital billing edits and claim rejections. Strong understanding of EDI files, including loops and segments Analyze and correct errors in electronic data interchange (EDI) files, focusing on loops and segments. Review accounts, verify eligibility, update registration, and perform rebill activities. Maintain detailed documentation of all actions taken to resolve edits and rejections. Work experience in Epic edits queue is added advantage
|
|
J1338 : Team Lead - NOA
• 7- 9 Years’ experience in Authorization process • Obtain authorization via payer website or by phone and follow-up regularly on pending cases. • Maintain individual payer files to include up to date requirements needed to successfully obtain authorizations. • Initiate appeals for denied authorizations. • Respond to clinic questions regarding payer medical policy guidelines. • Confirm accuracy of CPT and ICD-10 diagnoses in the procedure order
|
|
J0534 : Associate Engineer, IOC
This role involves in L1 support Role requires the 24/7 coverage Proficiency in Technologies ( CompTIA+, MCSE, VMware , Citrix , CCNA)
|