In this role, the selected candidate must have a working knowledge of Internet/Intranet/Extranet architectures; ability to analyze, diagnose, recommend and implement solutions for application problems.
In this position, you will analyze and translates requirements from business area and IT partners in order to design technology solutions that meets the business need including changing/modifying existing applications to meet the business need
In this role, you will actively monitor and respond to technical hardware and software problems utilizing hardware and software testing tools and techniques as well as assist in managing overall system capacity.
In this role, you will define the scope of testing within the context of the project and based upon various requirements documentation available. Include detailed schedule of testing events and deliberate due dates/testing checkpoints.
This position performs assessments and audits on processes and procedures to ensure compliance to specifications, engineering drawings, procedures and ISO-9001/AS9100. The role interfaces with customers and program personnel on all quality related issues and utilizes lean initiatives to reduce waste and maintain continuous improvement. They will make the final decision on acceptability of product.
In this role, the selected candidate will be responsible for documenting detailed system specifications, participation in unit testing and maintenance of planned and unplanned internally developed applications, evaluation and performance testing of purchased products. I
Review, evaluate, and recommend hardware dispositions of non-conforming items, assist in the accomplishment of corrective actions to preclude recurrence, and coordinate the routing and proper level of approvals.
In this role, you will manage an Information Security team that research engineer, develop, implement, communicate, monitor, and maintain the information security (authentication, perimeter security, security & compliance tools, etc), & directory technology systems (software & hardware) and security policies / procedures.