Post Job Free

Resume

Sign in

Business and Health Application Analyst / Instructional Designer

Location:
Tampa, FL
Salary:
82000
Posted:
April 04, 2024

Contact this candidate

Resume:

MARIA E. RODRIGUEZ-GONZALEZ

813-***-****

ad4sio@r.postjobfree.com

Profile: Well organized, self-motivated, and able to prioritize – Project team leadership, client service orientation, and user support skills – multi-task in high-pressure situations when necessary – Advanced technical presentations, troubleshooting, and social media research capabilities – Dynamic thinker with excellent and thorough analytical skills – Fluent in English and Spanish

Competencies: IT Project Management – IT Business Operations / Support – IT Application Specialist – IT Knowledge Management – IT Procurement & IT Contract Procurement Negotiations – Application Specialist – Root Cause Analysis – Web Development - Application Licensing / Inventory – IT Security Platforms – eLearning Training – Instructional Design

– Training/Live Presentations – Vendor / Client Relations – Virtual Facilitator – SaaS – IS Clinical Analyst Shriners Hospitals for Children Headquarters Tampa, Florida (Oct 2023 – February 2024): As an Epic Analyst specializing in Grand Central, my role involved implementing, configuring, and optimizing the Epic Grand Central module, which is designed for patient access, registration, scheduling, and revenue cycle management. Responsibilities include:

Collaborating with stakeholders: Working closely with clinicians, administrators, and other staff members to understand their needs and workflows and ensuring that the Grand Central module meets those requirements.

System configuration: Configuring the Epic system to align with the hospital's processes and policies, including setting up registration screens, appointment types, insurance verification processes, and billing rules.

Training and support: Conduct training sessions for end-users to familiarize them with the Grand Central module and provide ongoing support to address any questions or issues that arise during the implementation phase and beyond.

Testing and optimization: Participating in testing activities to ensure that the Grand Central module functions correctly and efficiently and adjusting as needed to optimize performance and usability.

Documentation and communication: Documenting configuration decisions, training materials, and support processes to facilitate knowledge transfer and ensure consistency in system usage. Communicating updates and changes to relevant stakeholders as necessary.

Shriners Hospitals for Children Headquarters Tampa, Florida (Oct 2021 – Oct 2023): As an IS Clinical Security Analyst I, my responsibilities revolved around ensuring the security and integrity of the hospital's clinical information systems. Responsibilities include:

Access Control Management: Managing user access to clinical systems such as Electronic Health Records (EHR) software, ensuring that appropriate permissions are granted based on users' roles and responsibilities. This involves creating, modifying, and deactivating user accounts as needed.

Security Policy Enforcement: Enforcing security policies and procedures to safeguard patient data and comply with regulatory requirements such as HIPAA (Health Insurance Portability and Accountability Act). This includes monitoring user activity for any suspicious behavior and taking corrective actions when necessary.

Security Auditing and Compliance: Conduct regular audits and assessments of clinical systems to identify potential security vulnerabilities and ensure compliance with industry standards and regulations. This may involve collaborating with internal auditors or external regulatory agencies.

Incident Response and Investigation: Responding to security incidents such as unauthorized access attempts or data breaches, investigating the root causes, and implementing corrective measures to prevent recurrence. This could also involve coordinating with other IT and clinical staff members to mitigate any impact on patient care.

User Training and Awareness: Providing training and education to clinical staff on security best practices, including password management, data encryption, and handling of sensitive information. Increasing awareness among users helps to reduce the risk of security incidents caused by human error.

System Integration and Upgrades: Collaborating with IT teams and vendors to ensure that clinical systems are securely integrated with other hospital systems and that software updates and patches are applied on time to address known security vulnerabilities.

Documentation and Reporting: Maintaining comprehensive documentation of security-related processes, procedures, and incidents. Generating regular reports for management to provide visibility into the hospital's security posture and compliance status.

Shriners Hospitals for Children Headquarters Tampa, Florida (Oct 2018 – Oct 2021): As an Applications IS Training Specialist/Instructional Designer, my role encompassed designing, developing, and delivering training programs for various information systems used within the hospital. Responsibilities include:

Training Needs Assessment: Collaborating with stakeholders to assess the training needs of staff members related to the hospital's applications and information systems. This involves identifying gaps in knowledge and skills and determining training priorities.

Curriculum Development: Designing comprehensive training curricula and materials tailored to different user roles and skill levels. This includes creating instructional guides, manuals, presentations, e-learning modules, and other resources to support effective learning.

Instructional Design: Applying instructional design principles to develop engaging and interactive training content that facilitates effective learning and knowledge retention. This may involve incorporating multimedia elements, simulations, and hands-on exercises into training programs.

Training Delivery: Conducting training sessions for end-users, both in-person and through virtual platforms, to teach them how to effectively use the hospital's applications and information systems. This could include one-on-one training, classroom-style sessions, or large group workshops.

User Support and Troubleshooting: Providing ongoing support to staff members to address questions, issues, and challenges encountered while using the hospital's applications. This involves troubleshooting technical problems, clarifying concepts, and offering guidance on best practices.

Training Evaluation: Assessing the effectiveness of training programs through evaluations, surveys, and feedback mechanisms. Analyzing training outcomes to identify areas for improvement and adjust training content and delivery methods as needed.

System Updates and Rollouts: Developing and delivering training programs to support staff members during the implementation of new applications or system upgrades. Ensuring that users are adequately prepared to adapt to changes and leverage new features effectively.

Documentation and Knowledge Management: Creating documentation and knowledge repositories to support ongoing learning and reference. This includes maintaining user manuals, FAQs, and other resources to help staff members troubleshoot issues independently.

Collaboration with IT and Subject Matter Experts: Working closely with IT teams, application vendors, and subject matter experts to stay updated on system changes, new features, and best practices. Collaborating with these stakeholders to ensure that training materials align with system functionality and organizational needs. Claims Investigation Agency / KNK Engineering Florida (2017 – 2018): As a SaaS and Web Solutions Specialist, my role involved working with cloud-based software applications and web solutions to address various business needs. Responsibilities include:

SaaS Implementation: Leading the implementation and integration of SaaS solutions within the organization. This could involve selecting appropriate SaaS platforms, configuring them to meet specific requirements, and migrating data from legacy systems.

System Administration: Managing the day-to-day operation of SaaS applications, including user management, access control, and configuration settings. Ensuring that the systems are properly maintained, updated, and optimized for performance.

Customization and Development: Collaborating with software vendors or internal development teams to customize SaaS applications according to the organization's unique requirements. This may involve developing custom features, workflows, or integrations to enhance functionality.

User Training and Support: Providing training and support to end-users to ensure they understand how to effectively use the SaaS applications. This could include conducting training sessions, creating user documentation, and offering ongoing assistance and troubleshooting.

Security and Compliance: Ensuring the security and compliance of SaaS solutions with relevant regulations and industry standards. Implementing appropriate security measures such as data encryption, access controls, and regular audits to protect sensitive information.

Performance Monitoring and Optimization: Monitoring the performance and usage of SaaS applications to identify potential issues or bottlenecks. Implementing optimization strategies to improve system performance, scalability, and reliability.

Vendor Management: Managing relationships with SaaS vendors, including contract negotiation, service level agreements (SLAs), and vendor performance evaluation. Acting as a liaison between the organization and vendors to address any issues or concerns.

Web Development and Maintenance: Designing, developing, and maintaining websites or web-based applications to support the organization's online presence and business operations. This could involve front-end development, back-end programming, and database management.

Technology Evaluation and Recommendations: Research emerging technologies and trends in SaaS and web solutions to identify opportunities for innovation and improvement. Making recommendations for adopting new tools or platforms that could benefit the organization.

AECOM Tampa, Florida (May 2015 – May 2017): As a Lead IT Facilitator/Training Specialist/Instructional Designer, my role involved various responsibilities related to IT facilitation, training, and instructional design. Responsibilities include:

Facilitation of IT Processes: Facilitating IT processes within the organization, which could include leading meetings, workshops, and training sessions to ensure effective communication and collaboration among team members. This might involve guiding discussions, resolving conflicts, and promoting best practices.

Training Development: Designing and developing training programs and materials for IT staff members to enhance their knowledge and skills in specific areas such as software applications, technical procedures, and IT policies. This could include creating training manuals, presentations, e-learning modules, and hands-on exercises.

Instructional Design: Applying instructional design principles to create engaging and interactive learning experiences for IT professionals. This involves analyzing training needs, defining learning objectives, selecting appropriate instructional methods, and evaluating the effectiveness of training programs.

Knowledge Management: Managing knowledge repositories and documentation related to IT processes, procedures, and best practices. This includes organizing and maintaining information in a structured format to facilitate easy access and retrieval by team members.

Process Improvement: Identifying opportunities for process improvement within the IT department and implementing solutions to streamline workflows, increase efficiency, and enhance productivity. This could involve conducting process assessments, gathering feedback from stakeholders, and implementing changes based on industry standards and best practices.

Collaboration and Communication: Collaborating with IT teams, stakeholders, and subject matter experts to gather requirements, develop training materials, and coordinate training delivery. Communicating effectively with team members to ensure clarity and alignment on training objectives and expectations.

Performance Evaluation: Evaluating the effectiveness of training programs through assessments, surveys, and feedback mechanisms. Analyzing training outcomes to identify areas for improvement and make adjustments to training content and delivery methods as needed.

Change Management: Supporting change management initiatives within the IT department by preparing staff members for changes in processes, procedures, or technology. This involves providing training and support to facilitate smooth transitions and minimize resistance to change. AECOM Tampa, Florida (May 2016 – May 2017): As a part-time Network Security Analyst focusing on monitoring alerts within the Security Operations Center (SOC), my role involved specific responsibilities related to network security monitoring and incident detection. Responsibilities include:

Alert Monitoring: Monitoring security alerts generated by various network and security monitoring tools, such as intrusion detection systems (IDS), intrusion prevention systems (IPS), firewalls, and security information and event management (SIEM) systems. This includes analyzing alerts for signs of suspicious or malicious activity that could indicate a security incident.

Incident Triage: Investigate security alerts to determine their severity, validity, and potential impact on the organization's network and systems. This involves conducting initial triage to prioritize alerts based on their risk level and likelihood of being a genuine security threat.

Threat Identification: Identifying and analyzing potential security threats and vulnerabilities within the organization's network infrastructure. This includes researching emerging threats, attack techniques, and vulnerabilities to stay ahead of evolving security risks.

Security Incident Response: Responding to confirmed security incidents by following established incident response procedures and protocols. This may involve coordinating with other members of the SOC team, IT staff, and management to contain and mitigate the impact of security breaches.

Alert Escalation: Escalating critical security alerts and incidents to senior analysts or management for further investigation and response. This includes providing detailed reports and analysis to support decision-making and response efforts.

Documentation and Reporting: Documenting all security alerts, incidents, and response activities in a timely and accurate manner. This includes maintaining detailed records of incident timelines, actions taken, and outcomes for compliance, reporting, and future reference.

Continuous Monitoring: Continuously monitoring the network environment for signs of anomalous or suspicious activity that could indicate a potential security threat. This includes proactively identifying and investigating potential security risks before they escalate into full-blown incidents.

Training and Knowledge Sharing: Participating in training sessions and knowledge-sharing activities to enhance your skills and expertise in network security monitoring and incident response. This includes staying updated on the latest security trends, tools, and techniques to improve SOC capabilities. Job Experience: URS Tampa, Florida May 2013 –May 2015): As an IT Procurement Specialist, my role revolved around managing the procurement process for IT-related goods and services across these geographical areas. Responsibilities include:

Vendor Management: Identifying and evaluating vendors capable of providing IT products and services that meet the company's requirements. This involves establishing and maintaining relationships with vendors, negotiating contracts, and ensuring compliance with procurement policies and procedures.

Procurement Planning: Collaborating with internal stakeholders to understand their IT needs and requirements. Developing procurement plans and strategies to ensure timely and cost-effective acquisition of IT resources while aligning with budgetary constraints and project timelines.

Sourcing and Purchasing: Executing the procurement process from sourcing to purchase. This includes issuing requests for proposals (RFPs) or quotes (RFQs), evaluating vendor responses, negotiating pricing and terms, issuing purchase orders, and managing the procurement lifecycle.

Contract Management: Managing contracts and agreements with IT vendors to ensure compliance with terms and conditions, including pricing, delivery schedules, warranties, and service level agreements (SLAs). Monitoring contract performance and addressing any issues or discrepancies that arise.

Budget and Cost Management: Monitoring IT procurement expenses and ensuring adherence to budgetary constraints. Identifying opportunities for cost savings through strategic sourcing, volume discounts, and supplier negotiations.

Compliance and Risk Management: Ensuring compliance with company policies, industry regulations, and legal requirements related to IT procurement activities. Mitigating risks associated with vendor relationships, supply chain disruptions, and contractual obligations.

Quality Assurance: Assessing the quality and suitability of IT products and services procured from vendors. Conducting vendor evaluations and performance reviews to ensure alignment with company standards and expectations.

Inventory Management: Tracking and managing inventory levels of IT equipment, software licenses, and other assets procured for the organization. Maintaining accurate records of inventory transactions, including receipts, transfers, and disposals.

Stakeholder Communication: Communicating effectively with internal stakeholders, including IT teams, project managers, finance departments, and senior leadership, to provide updates on procurement activities, address concerns, and solicit feedback.

Continuous Improvement: Identifying opportunities for process improvements and efficiencies in IT procurement practices. Implementing best practices, standardizing processes, and leveraging technology solutions to optimize procurement operations.

Skills:

Content Development and Management:

Articulate 360, Rise 360, and Review 360: Proficient in creating interactive e-learning content.

WordPress, C-Panel, maWebCenters, Wix, Shopify, eBay, iPower: Skilled in website development and management across different platforms.

Camtasia: Proficient in creating screen recordings and video editing.

Vyond Animation: Proficient in creating animated videos. Task and Project Management:

Orion Task Management: Proficient in managing tasks within the Epic system. IT Support and Service Management:

Citrix Receiver, Cerner applications, Shriners SharePoint, Central Point: Proficient in managing various software systems and platforms within healthcare environments.

Handling incident request tickets using CA SDM, ServiceNow, and Cherwell Service Management: Proficient in IT service desk support and ticket management.

Network troubleshooting: Proficient in diagnosing and resolving network connectivity issues.

Active Directory, DNS, Group Policy, Remote Access: Proficient in managing and troubleshooting network infrastructure.

Microsoft Windows desktop and server operating systems troubleshooting: Skilled in resolving hardware and software issues.

Symantec Secure Digital Email certificates: Proficient in email encryption and security.

VMware, Antivirus, Anti-SPAM, End Point Protection, VPNs, Firewalls: Proficient in IT security and system protection.

Lotus Notes: Proficient in managing and troubleshooting Lotus Notes environment.

Network traffic analysis and bandwidth monitoring: Proficient in monitoring network performance and security.

Experience with various IT security applications: Familiarity with tools for security analysis and monitoring. Business Applications and Communication:

MS Office Suite, MS Outlook, SharePoint: Proficient in Microsoft Office applications and collaboration platforms.

Salesforce: Proficient in using Salesforce for business communications.

Presentation and communication skills: Capable of effectively communicating with individuals and groups in English and Spanish.

Other Experiences:

Experience with Basware, Concur, E1, and Oracle: Familiarity with financial and enterprise resource planning systems.

Supporting and maintaining Microsoft SharePoint: Experience in managing SharePoint environments.

MS Lync, Office Communications Server, Skype for Business: Experience in unified communications platforms.

Mobile device support: Experience in managing and troubleshooting mobile devices for Exchange.

Email archiving solutions: Experience with email archiving platforms.

Other IT security applications: Experience with additional security tools and platforms. Education: Hillsborough Community College – Information Technology, Erwin Vocational Technical Institute, Hillsborough High School – Business Program

Online Certificates of Completion:

IT - Udemy Online

o Cyber Security

o Be a White Hate Hacker and Pen Tester

o Learning Computer Forensics with Infinite Skills o Hacking Academy: Monitoring Transmitted Data

o Build Your Own Cyber Lab at Home

o CISSP – Certified Information Systems Security Professional (Currently Learning Course Modules)

o Building a Personal Brand using social media

Virtual Facilitating and Presentation Training Webinars o Bring Your Mojo to Virtual Learning

o Webinar Production Checklist

o From Chalkboard to Keyboard: Transitioning to the Virtual Classroom o Webinar Risk Management Planning Tool

o Learning Anywhere' Infographic

o Presentation Best Practices

o Conversational Presenting 101: How to Create Interactive, Two-Way Presentations o We've Got to Keep Meeting Like This!

o The Virtual Leader's Advantage

o Getting Your Whole Team on Prezi

o The Virtual Leader's Advantage: Getting Results Across Distance

AECOM University

o TestPrep ITIL Foundation

o Brainshark: An easy-to-use tool to engage your virtual audience o Basic Presentation Skills: Planning a Presentation o Creating Engaging Presentations in Brainshark

o Brainshark: An easy-to-use tool to engage your virtual audience o Handling Difficult Questions as a Presenter

o Getting Ready to Present

o Creating Engaging Presentations in Brainshark

o Adobe Captivate 8: Getting Started

o CA Service Desk Manager – Introduction

o CA Service Desk Manager - Managing Tickets

o CA Service Desk Manager - Ticket Management Process Live Session o CompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics o CompTIA Security+ SY0-401: Authentication, Biometrics, and Security Controls o CompTIA Security+ SY0-401: Control Fundamentals and Security Threats o CompTIA Security+ SY0-401: Creating Secure Networks o CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures o CompTIA Security+ SY0-401: Network Protocols, Attacks, and Defenses o CompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless Security o CompTIA Security+ SY0-401: Securing a Networked Environment o CompTIA Security+ SY0-401: Securing Applications, Virtualization, and the Cloud o CompTIA Security+ SY0-401: Vulnerability Assessment and Penetration Testing o Safety Orientation

o Behavior Based Safety

o Code of Conduct

Communications and Supervisory

o Powerful Communications Skills for Women

o Supervisory Skills for Women

o Successful Women Supervisors

o Basic Supervision

o Dealing with Difficult People

o Managing Multiple Priorities

Legal

o The World of Patents, Trademarks and Copy Right Infringements o Federal District Court Litigation (Civil and Criminal) o The Representation of a Public Entity



Contact this candidate