VetsEZ is seeking a VA Data Solutions Analyst to lead the design, coordination, and delivery of data integrations across multiple Department of Veterans Affairs (VA) systems. This role requires direct experience with establishing interfaces to and from the Summit Data Platform (SDP), ILER, VBMS, and VA Profile. Prior exposure to Military personnel data is strongly preferred. The successful candidate will develop data requirements, architect solutions for data flows, and help shape the processes and best practices for long-term data management within the VA environment.
Responsibilities:
Requirements:
Preferred Qualifications:
Benefits:
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, or protected veteran status.
Sorry, we are unable to offer sponsorship at this time.
...in shaping the future of feature films? Do you want to define the next generation of how and what Amazon customers and theatrical audiences are watching? Amazon MGM Studios is one of the leading theatrical distribution and digital video services today, and we're just...
...Role Overview Zoe Feldman Design is searching for a creative and motivated Design Intern to join our team in the Georgetown office for a six-month internship program... ...or recently earned a bachelors degree in Interior Design, Interior Architecture, Architecture , or...
...user management into their applications. We believe that a component is worth a thousand APIs . What you will do As the AEO/SEO Lead, you will own Clerk's organic discoverability across both traditional search and the rapidly evolving landscape of LLMs. Your...
...As a Customer Service Leader (CSL) at Chick-fil-A, you will play a key role in ensuring exceptional guest experiences and supporting operational excellence. You will be responsible for managing financial procedures, overseeing catering operations, and leading guest...
...The Computer Network Defense Analyst uses information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior. Monitoring and analysis are performed to identify and report events that occur, or might occur, within...