<p>Our dynamic client is seeking a <strong>Business Analyst</strong> in the Brentwood, TN, area to support process improvement and system initiatives across Finance and Operations, with a focus on Procure-to-Pay (P2P) workflows. This contract role will partner closely with stakeholders in Accounting, AP, Procurement, and IT to translate business needs into scalable, system-driven solutions.</p><p>This is an excellent opportunity for someone who enjoys analyzing processes, driving efficiencies, and leveraging technology to enhance financial operations.</p><p><strong>Key Responsibilities</strong></p><ul><li>Partner with stakeholders across Finance, AP, Procurement, and IT to gather, document, and translate business requirements into functional solutions</li><li>Develop clear functional specifications to ensure alignment between business needs, P2P workflows, and system capabilities</li><li>Analyze and optimize end-to-end P2P processes, including requisitioning, purchasing, invoicing, payments, and vendor management</li><li>Identify process gaps, inefficiencies, and opportunities for automation and standardization</li><li>Support system enhancements, implementations, and integrations, including ERP platforms</li><li>Build and maintain reporting dashboards to provide visibility into KPIs, spend analytics, and operational performance</li><li>Leverage Microsoft tools such as Power BI, Power Automate, and Excel to drive insights and workflow automation</li><li>Assist with user acceptance testing (UAT), training, and change management initiatives</li><li>Collaborate on data governance, data quality, and reporting consistency efforts</li><li>Support cross-functional projects tied to finance transformation and operational efficiency</li></ul><p><br></p>
<p>Robert Half is seeking a Contract Data Analyst to join our client's team. As a Data Analyst, you will be responsible for collecting, processing, and analyzing data to provide actionable insights that support business decisions. This contract position offers an exciting opportunity to work with a dynamic team and help drive data-driven strategies for a respected organization.</p><p><br></p><p><strong>Key Responsibilities:</strong></p><ol><li><strong>Data Collection and Analysis:</strong> Collect, clean, and analyze data from various sources to identify trends, patterns, and insights that inform business decisions.</li><li><strong>Reporting:</strong> Create and maintain dashboards, reports, and visualizations that communicate findings to stakeholders in a clear and concise manner.</li><li><strong>Data Validation:</strong> Ensure data integrity by conducting regular audits, validation, and quality checks.</li><li><strong>Collaboration:</strong> Work closely with cross-functional teams to understand data requirements and provide insights that support strategic goals.</li><li><strong>Data Modeling:</strong> Develop and maintain data models, forecasts, and simulations to support business planning and operations.</li><li><strong>Trend Analysis:</strong> Monitor key performance indicators (KPIs) and analyze data trends to identify opportunities for improvement.</li><li><strong>Documentation:</strong> Document data processes, methodologies, and findings to ensure transparency and reproducibility of results.</li><li><strong>Ad Hoc Analysis:</strong> Provide ad hoc analysis and reporting support as needed to assist in decision-making processes.</li></ol><p><br></p>
<p>Robert Half is seeking a skilled <strong>Cybersecurity Analyst</strong> to join our client’s IT security team. This role is responsible for monitoring, analyzing, and responding to security threats across the organization’s network, systems, and applications. The ideal candidate has hands-on experience with security tools, incident response, vulnerability management, and risk mitigation in an enterprise environment.</p><p>This is an excellent opportunity to play a critical role in protecting business-critical systems and sensitive data.</p><p><br></p><p><strong>Key Responsibilities:</strong></p><ul><li><strong>Security Monitoring:</strong> Monitor security systems including SIEM tools, firewalls, IDS/IPS, and endpoint detection platforms to identify potential threats.</li><li><strong>Incident Response:</strong> Investigate and respond to security incidents, perform root cause analysis, and document findings.</li><li><strong>Vulnerability Management:</strong> Conduct vulnerability scans, risk assessments, and coordinate remediation efforts.</li><li><strong>Threat Analysis:</strong> Analyze emerging threats and recommend proactive security measures.</li><li><strong>Access & Identity Management:</strong> Review and manage user access controls in accordance with security policies.</li><li><strong>Policy & Compliance:</strong> Assist in maintaining security policies and ensuring compliance with industry standards (e.g., HIPAA, PCI-DSS, SOC 2, NIST).</li><li><strong>Security Audits:</strong> Support internal and external security audits.</li><li><strong>Security Awareness:</strong> Provide guidance and training to end-users on security best practices.</li><li><strong>Documentation:</strong> Maintain accurate incident reports, risk assessments, and remediation documentation.</li></ul><p><br></p>