The Staff Enterprise Application Engineer will be responsible for designing a large service or integration of services, will learn the relevant technologies and lead design discussion in a limited manner.
Design and develop new applications, programs, workflows and interfaces based on requirements and directives; design workflows that facilitate electronic creation, transmission, and delivery of documents.
The Intermediate Applications Developer conducts systems and requirements analyses to identify project action items. He/She analyzes specifications and user requirements to perform assigned applications development work.
The Assured Compliance Assessment Solution (ACAS) Software Application Engineer will perform standard O&M activities for the ACAS information assurance application for both unclassified and classified networks.
Perform hands-on, full stack, and full life cycle mobile application development, using a variety of modern application development frameworks, languages, and techniques to create mobile applications that empower clients to achieve success.
This role will cover everything from creating tools that will improve the workflows of our Designers to conducting research and development of emerging technologies such as Virtual Reality, Augmented Reality, Mixed Reality, and Photogrammetry.
Assist project/program management by developing technical solutions for internal and external customers, help inside and outside sales personnel on special projects, minor product mods, BOMs and schematics.
Determines computer user needs; analyzes system capabilities to resolve problems on program intent, output requirements, input data acquisition, programming techniques and controls; prepares operating instructions; designs and develops compilers and assemblers, utility programs, and operating systems.
Develops, implements, and executes standard procedures for the administration, backup, disaster recovery, and operation of the EMS tools including operating system security hardening, backup management, capacity planning, change management, version/patch management, and lifecycle upgrade management.
Assess new and existing applications and system deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk; research threats and attack vectors that impact web applications and infrastructure and stay up-to-date with current web application security threats.