Healthcare RSAM Administrator Consultant

posted on July 20, 2017

Job Description

Location: Baton Rouge, LA

Duration: 6 Months

Job Description:

  • Tool Administration – Demonstrable RSAM System Administration experience
  • Preferably, certified RSAM administrator
  • System Environment Administration – Experience managing the technical environment that supports the RSAM application (servers, databases, IIS, SSRS, IE, etc.)
  • Team Player who is self-starting and can work independently as needed
  • Highly analytical
  • Detail oriented with an ability to understand the macro environment
  • Excellent decision making and communication skills

 Day to Day Responsibilities:

  • General RSAM Tool Administration
  • Working with RSAM Support and End Users to correct bugs and other issues
  • Translation of Business Requirements into a Technical Design
  • Use Case Development and Configuration
  • Implementations & Change Management (Testing New Functionality, Regression Testing, Change Tickets, and Push-to-Prod)
  • End User Support
  • End User Training
  • Perform Routine Maintenance (i.e. Server Validation, Test and Production Server Patching, etc.)
  • Documentation
  • Other Duties as required
  • General Governance, Risk, and Compliance (GRC) Support
  • Provide overall support to all Technology GRC team efforts
  • Assist in developing, testing, and delivering solutions, support, reporting, information, and relationship management to satisfy client requests
  • Act as a liaison between clients and others  to facilitate solutions, information sharing, and effective communication

 General Knowledge of the Following Areas:

  • Computer networking concepts and protocols, and network security methodologies
  • IT Service Management Processes
  • Risk management processes (e.g., methods for assessing and mitigating risk)
  • Cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
  • Information technology (IT) risk management policies, requirements, and procedures
  • Risk management and mitigation strategies