We are looking for a skilled Business Analyst to join our team in Memphis, Tennessee. This role involves transforming complex client needs into strategic solutions and actionable insights that drive business success. The ideal candidate will be adept at evaluating supply chain networks, leveraging data analytics, and presenting findings effectively to stakeholders.<br><br>Responsibilities:<br>• Translate client business requirements into tailored solutions and strategic project plans.<br>• Analyze parcel and supply chain networks to identify optimization opportunities for cost and service performance.<br>• Design and maintain customer reporting portfolios, utilizing business intelligence tools and data warehouse methodologies.<br>• Establish and enforce business rules for data labeling and general ledger allocation to ensure accuracy and audit compliance.<br>• Lead discussions with clients, presenting analysis and recommendations with confidence.<br>• Collaborate with cross-functional teams, including Technology, Contracts, and Account Management, to deliver comprehensive solutions.<br>• Utilize advanced SQL queries and data analytics tools to extract, transform, and present meaningful data insights.<br>• Conduct detailed audits and reporting for parcel data, ensuring alignment with cost-center applications.<br>• Develop network models and perform analytics to support supply chain improvements.<br>• Turn ambiguous or unstructured data into clear, actionable recommendations for clients.
<p>East Memphis company is currently seeking a Revenue Analyst to be responsibilities for analyzing billing procedures, verifying billing data, preparing invoices, ensuring accuracy of invoices, completing balance sheet reconciliations, and preparing month-end journal entries. </p><p><br></p>
<p>On behalf of our healthcare client, Robert Half Talent Solutions, Technology Division is seeking a <strong>Cybersecurity Analyst</strong> to support enterprise security operations across clinical, administrative, and patient‑facing systems. This is a highly visible role within a regulated environment where your work directly contributes to protecting patient data, maintaining system integrity, and supporting HIPAA‑driven compliance initiatives across the organization. The ideal professional enjoys investigative work, collaborative problem-solving, and strengthening the overall security posture of a complex healthcare environment.</p><p><br></p><p><strong>What You’ll Do:</strong></p><ul><li><strong>Monitor and analyze SIEM alerts</strong> using Splunk, Microsoft Sentinel, or IBM QRadar to identify indicators of compromise, suspicious activity, or emerging threats.</li><li><strong>Investigate security incidents end‑to‑end</strong>, including evidence collection, log analysis, documentation, and escalation to senior analysts or incident response teams when necessary.</li><li><strong>Contribute to ongoing HIPAA, NIST, and ISO 27001 compliance efforts</strong>, including documenting controls, validating security configurations, and supporting internal/external audits.</li><li><strong>Maintain and review IAM controls</strong>, including provisioning, deprovisioning, privileged access reviews, MFA policies, and adherence to least‑privilege principles.</li><li><strong>Assist with vulnerability management activities</strong>, including scanning, verifying remediation progress, patch validation, and collaborating with infrastructure teams on risk reduction.</li><li><strong>Participate in security assessments</strong>, risk evaluations, and periodic control testing across applications, networks, and cloud platforms.</li><li><strong>Support change management processes</strong> to ensure security considerations are incorporated into system upgrades, new implementations, and operational workflows.</li><li><strong>Document incident findings, corrective actions, and recurring issues</strong> to support continuous improvement and reduce repeat vulnerabilities.</li><li><strong>Collaborate with IT operations, networking, compliance, and application teams</strong> to maintain a secure ecosystem and promote best practices across departments.</li></ul><p><br></p>