Facilitates the efforts of corporate management in defining organizational goals and develops systems and procedures to achieve these goals. Works with customers to identify needs, select and acquire systems, implement, manage and support systems, and develop plans that will lead to more profitable, effective and efficient operations or systems solutions. The IT Business Consultant II plays a key role in evaluating business procedures, analyzing business processes, and ensuring proper system configuration. This role involves creating and maintaining status reports, developing and maintaining documentation and procedures, and providing training to IT staff and user clients. The position requires expertise in application product function, design, and build to ensure successful product implementation, with a primary focus on designing, building, testing, and activating the application database. The consultant will develop and maintain models and documentation of business and system requirements, configure systems accordingly, and document all required system design and build documents. Contributions to testing scripts, materials, and performing unit, system, and integrated testing are essential. The role also involves working with the training team to develop application-specific training curriculums and materials, providing expertise for activation plans, and troubleshooting issues. The IT Business Consultant II will log, track, analyze, and resolve issues, effectively utilize project tools for clear documentation and communication, and work with vendors to resolve problems in a timely manner. On-call support and troubleshooting are required, along with implementing and following established security measures and protocols. The position involves investigating and analyzing project feasibility, prioritizing and scheduling projects and resources, and managing all phases of system selection/implementation. The consultant will advise clients on the implications of changes or alternative solutions, provide business/technical representation to the enterprise, and learn user functionality of involved systems. Adherence to project management and work prioritization methodologies is expected, as is participation with vendors in assessing new systems and technologies. Staying informed of security vulnerabilities and proactively assessing network risks are also key responsibilities.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
Associate degree