In this role, the selected candidate must have
ability to review & understand customer requirements, identify new opportunities, and use consultative solution selling skillsets to creatively position end to end solutions.
The Black Belt Quality Systems Engineer has overall quality system implementation, assessment, and improvement responsibilities including: raw material inspection process, production product flow, engineering design transfer, project team management, and project deliverables. The ideal candidate should be an experience Six Sigma Black Belt with experience working in engineering, manufacturing, and operations environments.
In this role, the selected candidate will be responsible for developing methods for integrating various systems and technology into the existing Building Automation Systems as well as into other data management platforms.
This individual will spearhead the implementation of IT Roadmap Strategies to ensure technical systems are scalable, reliable, secure, supportable, and achieve Business and IT performance and budgetary objectives.
This position will participate in generating engineering requirements and design reviews. This is a unique and exciting opportunity for a dynamic individual who loves to work in a creative, ground-breaking engineering-minded environment.
In this role, you will be responsible for performing an advanced level of technical activities required to support an enterprise environment including administration, design, and engineering for system performance improvement and optimization.
The Project Engineer - Control Systems and Telematics will primarily be a project lead, capable of leading a multi disciplined design team throughout the project lifecycle from concept proposal through detailed design, fabrication, testing, installation, and field support.
In this role, you must have in-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas: Firewalls, VPN, Authentication, Encryption, Vulnerability Assessment, Penetration Analysis, Intrusion Detection.