As Sole RPA Developer I have delivered these projects for my clients:
Invoice Conversion Automation: Client receives invoices from their contractors from across the globe. These invoices have no consistent form, and must be manually altered to function with the client's invoice ingestion software.
- Built on AWS Virtual Machine with Cloud Storage.
- Lead discovery with client to break down the steps currently taken to convert invoices, as well as gather requirements for optimal invoice output.
- Deconstructed conversion process into bite size steps for automation that can be called to convert any invoice to the required format.
- Designed a key process for invoices that designs the conversion process from start to finish.
- Full hands-off automation - when an invoice arrives the automation picks up the invoice and runs the conversion process.
- Emails team when output invoice is ready. Advised on QA review and maintenance of bot.
Bank CSR Desktop Assistant: Client has a workforce of Customer Service Representatives who handle all types of incoming calls from customers. When they are tasked to handle fraud alerts they have many steps they must follow to gather information and file reports. Human error is a problem as CSR Agents have many tasks.
- Built in Azure Virtual Desktop setup to mirror Agent Environment
- For this I built a desktop automation the CSR will pull up any time there is a fraud report on call.
- Desktop Automation integrates to their tools to look up account and transaction information.
- Information is presented to the CSR to easily select the needed components without distracting them from customer engagement.
- Required information is automatically gathered and included in the Fraud Report.
Access Security Report: Client has databases that manage sensitive information such as employee personal data as well as customer data, earnings, etc. This information is kept under tight security, including a review monthly and quarterly to ensure unauthorized access is prevented.
- Built in AWS Virtual Machine
- Utilized cryptography to ensure information pulled from database was verifiable at all stages of automation.
- Tamper proof design for reports ensured even human mistakes would not corrupt the database results.
- Reviewed security protocol with client's Audit and Information Security team.
- Analyzed databases and report structures required to ensure every user with access to the machines were included in reports.
- Reports are automatically emailed to stakeholders for review. Email is tracked with receipts to ensure accountability.