Cynda Martin


Leading enterprise modernization, operational transformation, and cross-functional delivery initiatives across regulated environments.



Featured Case Studies


LEGACY APPLICATION MODERNIZATION PROGRAM

Delivered a multi-phase modernization program that transitioned 93 legacy FACETS sub-applications to web-based platforms while aligning execution to enterprise cloud migration timelines.Program Scope: Enterprise platform modernization initiative coordinating phased migration of legacy FACETS sub-applications to web-based systems across multiple business units. This program required cross-team sequencing, adoption management, and alignment with Cognizant’s long-term platform roadmap.Operational Challenge
  The organization relied on a large set of legacy sub-applications within the FACETS core platform, accessed through a Citrix Workspace environment. These legacy components created long-term technical risk, operational friction, and adoption challenges as Cognizant’s roadmap shifted toward fully web-based solutions and eventual cloud alignment.
At the same time, the business needed to continue operating at scale without disrupting claims processing, configuration work, and daily production workflows. The challenge was modernizing within a mission-critical platform while coordinating change across multiple departments.
Ownership & Responsibility
  I served as the execution owner and delivery lead for the platform modernization program, owning rollout coordination, cross-team alignment, execution sequencing, leadership communication, and adoption readiness across impacted departments.
My responsibility was to ensure platform modernization stayed aligned with Cognizant’s roadmap while maintaining operational stability across business teams.
Strategy & Approach
To manage scale, risk, and adoption, I helped structure the initiative around a phased platform transition model focused on controlled rollout and readiness validation.
Key components included:
- Identifying and prioritizing FACETS legacy sub-applications based on usage and operational impact
- Aligning internal rollout cadence with Cognizant’s modernization and cloud roadmap
- Coordinating cross-team testing cycles within lower and higher environments prior to release
- Establishing structured communication through leadership forums and working sessions
- Supporting teams through change management and platform adoption concerns
This approach allowed modernization to occur incrementally while protecting production stability.
Execution
  I coordinated execution across 12+ departments, managing dependencies between business users, technical teams, and vendor delivery timelines.
Key execution responsibilities included:
- Sequencing migration waves
- Facilitating user acceptance testing and feedback cycles
- Managing rollout readiness checkpoints
- Tracking adoption progress
- Addressing resistance to platform change through structured communication and support
This ensured teams could transition FACETS functionality from Citrix-hosted legacy modules to web-based equivalents without operational disruption.
Results & Impact
• Successfully transitioned 93 FACETS legacy sub-applications into web-based equivalents
• Supported modernization efforts across 12+ departments
• Advanced progress toward the long-term target of 347 web-based FACETS applications
• Established a sustainable migration cadence aligned with Cognizant’s roadmap to ensure cloud readiness before legacy support sunset
• Improved user confidence in web-based FACETS tools, accelerating readiness and adoption for future migration waves
An important outcome was cultural: testing teams and operational users became significantly more comfortable with the web platform after hands-on exposure, reducing resistance and improving momentum for upcoming phases.
What This Demonstrates
  This initiative highlights my ability to:
- Lead enterprise-scale platform modernization programs
- Coordinate cross-functional delivery within regulated environments
- Balance technical roadmap alignment with business continuity
- Drive adoption through structured rollout and stakeholder engagement
- Operate at the intersection of strategic operations, platform delivery, and execution leadership


SECURITY PROFILE CONSOLIDATION &
ACCESS VISIBILITY PROGRAM

Led a security optimization initiative that consolidated 14 profiles, reduced access complexity, and introduced real-time visibility tooling for leadership decision-making.Program Scope: Governance and access modernization initiative focused on reducing security profile sprawl, improving permission visibility, and preparing the organization for Federated Azure identity integration. This program required executive alignment, cross-department coordination, and risk-balanced decision facilitation.Operational Challenge
  The organization maintained 103 active security profiles across multiple departments, creating access complexity, governance risk, and operational overhead, especially as the platform prepared for Federated Azure identity integration and Active Directory (AD) group alignment.
Leaders were hesitant to consolidate profiles due to highly specific access needs and concerns around compliance, risk exposure, and departmental autonomy. At the same time, the lack of centralized visibility made it difficult to quickly answer basic access questions, slowing decision-making and increasing manual effort.
The challenge was to reduce profile sprawl without increasing risk, while creating transparency that
enabled leaders to make informed consolidation decisions.
Ownership & Responsibility
  I led the security profile consolidation initiative, owning governance planning, access analysis, tooling enablement, stakeholder coordination, executive communication, and decision facilitation across multiple departments.
My role focused on balancing operational efficiency, security compliance, and future platform readiness.
Strategy & Approach
  To shift consolidation from opinion-based discussions to data-driven decision-making, I introduced a structured, visibility-first approach.
Key elements included:
- Building an internal tool that exposed line-level access visibility for every security profile
- Enabling side-by-side profile comparison to identify overlap and redundancy
- Creating a shared data foundation leaders could trust
- Framing consolidation in the context of Azure AD group scalability and long-term identity management strategy
- Facilitating leadership discussions focused on risk-balanced standardization rather than isolated access control
This approach moved conversations from “what might be impacted” to “what is actually configured.
Execution
  I coordinated consolidation planning across multiple leadership teams and departments, guiding
stakeholders through:
- Profile usage analysis
- Redundancy identification
- Risk evaluation
- Consolidation opportunity mapping
- Governance approvals
At the same time, I deployed the internal access visibility tool that eliminated manual lookup processes and significantly reduced turnaround time for security-related questions.
Results & Impact
• Reduced active security profiles from 103 to 89 through consolidation of 14 profiles
• Enabled near-instant access visibility, thereby reducing lookup time from manual investigation to seconds
• Eliminated repeated ad-hoc SQL queries and backend lookups for leadership access questions
• Improved decision speed and confidence by giving leaders direct access to accurate permission data
• Reduced future Azure Active Directory group complexity by minimizing identity group sprawl
• Lowered operational waste while maintaining compliance and existing risk thresholds
An important outcome was cultural: leadership shifted from access hoarding toward strategic standardization aligned with modernization goals.
What This Demonstrates
This initiative highlights my ability to:
- Lead governance modernization programs
- Build data-driven decision frameworks
- Design internal tooling that enables operational scale
- Balance compliance, security, and efficiency
- Facilitate executive-level alignment on complex technical topics
- Drive long-term platform readiness


CLAIMS REQUEST INTAKE PROCESS REDESIGN

Designed and implemented a centralized intake workflow that reduced SLA turnaround from one week to under two days across seven operational teams.Program Scope: Operational workflow transformation initiative focused on improving service delivery performance, request transparency, and turnaround time across multiple operational teams.Operational Challenge
  The original Claims Test Pro request process relied heavily on unstructured email intake, creating delays, visibility gaps, and consistent turnaround times.
Requests were often buried in inboxes, follow-up questions required additional email cycles, and status tracking was manual. At the same time, the technical workflow itself was complex, involving query creation, Claims Test Pro configuration, 837 keyword file generation, adjudication timing dependencies, and environment-specific batch constraints.
This created a high-risk operational environment where:
- Requests were easy to miss
- Turnaround times were unpredictable
- Communication was fragmented
- Rework was common due to adjudication failures or timing conflicts
Ownership & Responsibility
  I led the end-to-end redesign of the Claims Test intake workflow, owning process architecture, implementation coordination, documentation rollout, and cross-team adoption.
My goal was to improve reliability, speed, and transparency without disrupting existing technical execution workflows.
Strategy & Approach
  To eliminate email dependency and improve operational consistency, I introduced a centralized ticket-based intake model using Jama.
Key elements of the solution included:
- Standardized request forms capturing required criteria up front
- Automated request notifications to eliminate manual inbox monitoring
- In-platform communication for clarification and updates
- Centralized status tracking and request history
- Structured closeout process with delivered outputs attached to the request
This shifted the process from reactive email handling to proactive workflow management.
Execution
I coordinated the rollout across 7 impacted teams, ensuring:
- Request templates were aligned to operational needs
- Testing validated intake logic and notification flows
- Documentation clearly outlined the new process
- Stakeholders were trained on how to submit and track requests
The transition required change management to move teams away from informal email habits
toward structured intake workflows.
Results & Impact
• Reduced official SLA from one week to three business days
• Consistently exceeded SLA performance, with average turnaround of approximately 1.5 days
• Eliminated missed requests caused by inbox overload
• Improved transparency into request status and ownership
• Reduced back-and-forth email cycles
• Centralized operational tracking and historical auditability
The new workflow significantly improved operational reliability while increasing requester
confidence and satisfaction.
What This Demonstrates
  This initiative highlights my ability to:
- Design scalable operational workflows
- Apply tooling to eliminate manual process bottlenecks
- Lead cross-team change adoption
- Improve service delivery performance
- Balance technical constraints with operational efficiency


Tools & Automation

Internal Platforms Built to Accelerate Delivery and Reduce Operational Risk


Security Profile Configuration Management Platform (JavaFX)

Problem
  Built to centralize security configuration management, accelerate access changes, and remove operational bottlenecks during upgrades and environment transitions.
Solution
  I designed and built a JavaFX-based desktop application that centralized profile management, enabled bulk configuration operations, provided dynamic search and auditing capabilities, and supported environment-aware database connectivity.
Impact
• Reduced security profile implementation time from 32 days to ~30 minutes
• Enabled bulk access updates and faster environment transitions
• Improved audit visibility and configuration validation
• Reduced reliance on tribal knowledge
• Supported three departments and six operational teams
Strategic Value
  Rather than optimizing individual tickets, this platform created a reusable internal security configuration capability that scaled with system growth.


SQL MERGE Generator & Configuration Automation Engine

Problem
  Built to standardize configuration update workflows, reduce deployment risk, and accelerate testing and promotion cycles across environments.
Solution
  I built a schema-driven MERGE generation engine that dynamically inspects database structures, generates insert-only, update-only, or full MERGE statements, and includes preview and logging functionality for safer deployments.
Impact
• Eliminated hand-built MERGE query errors
• Standardized configuration update patterns
• Accelerated lower-environment testing cycles
• Improved deployment reliability
• Reduced dependency on individual SQL expertise
Strategic Value
This tool encoded best-practice SQL patterns into reusable automation, improving consistency and lowering operational risk across configuration workflows.


Multi-Environment SQL Audit & Export Engine (Python CLI)

Problem
  Designed to eliminate manual validation effort and enable scalable cross-environment parity checks for security and configuration reviews.
Solution
  I designed and built a Python-based multi-environment query engine that executes a single query across selected environments, normalizes results, and automatically generates structured Excel workbooks with environment-separated tabs, validation summaries, and built-in comparison logic.
Impact
• Eliminated manual environment switching and copy/paste workflows
• Standardized parity validation across regulated environments
• Enabled repeatable, audit-ready validation artifacts
• Reduced analyst effort and turnaround time for environment checks
• Improved visibility into configuration drift and data inconsistencies
Strategic Value
  This tool transformed environment validation from a manual support task into a scalable, reusable
operational capability.