• Participate in the entire application lifecycle, focusing on coding and debugging

  • Write clean code to develop functional web applications

  • Troubleshoot and debug applications

  • Take part in UI tests to optimize performance

  • Manage cutting-edge technologies to improve legacy applications

  • Collaborate with Front-end developers to integrate user-facing elements with server side logic

  • Gather and address technical and design requirements

  • Provide training and support to internal teams

  • Build reusable code and libraries for future use

  • Liaise with developers, designers and system administrators to identify new features

  • Follow emerging technologies

  • Create automated tests to ensure code quality

  • Implement and integrate into continous testing and integration process




  • Managing and tracking change to the production environment(s).
  • Communicating changes to the production environment(s).
  • Implementing change to the production environment(s).
  • Validating change to the production environment(s).


  • support the application development lifecycle
  • focuses on tasks related to building an effective, usable database environment to support the creation and maintenance of applications
  • lend assistance and support as programs and systems are being built
  • model and normalize the data
  • assists programmers in building and editing test data
  • provide and build tools to facilitate database testing and data refresh
  • ensure that proper methods are used to embed data access and modification logic into application programs
  • ensure that appropriate and efficient SQL is being coded and tested
  • create and maintain effective database-coupled application logic – stored procedures, triggers, and user-defined functions (UDFs)


  • Three primary DBA responsibilities for managing databases and applications: Performance, Administration, and Recovery.
  • Supports completed applications as they run business operations
  • Focuses on assuring availability, optimizing efficiency, and promoting usability
  • Database performance management is the optimization of resource usage to increase throughput and minimize contention, enabling the largest possible workload to be processed.
  • Helps to assure that applications perform according to the service level agreements, databases are administered properly, and data is sufficiently backed up such that it can be recovered in the event of an error or downtime.
  • Concerned with security and compliance efforts. Production data needs to be appropriately secured such that only the required users have access to it.
  • Ensures that data is in in compliance with governmental and industry regulations.




  • Analyze IT specifications to assess security risks
  • Design and implement safety measures and data recovery plans
  • Install, configure and upgrade security software (e.g. antivirus programs)
  • Secure networks through firewalls, password protection and other systems
  • Inspect hardware for vulnerable points of access
  • Monitor network activity to identify issues early and communicate them to teams
  • Act on privacy breaches and malware threats
  • Serve as a security expert and conduct trainings when needed
  • Draft security policies and guidelines
  • Protects system by defining access privileges, control structures, and resources.
  • Recognizes problems by identifying abnormalities; reporting violations.
  • Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
  • Determines security violations and inefficiencies by conducting periodic audits.
  • Upgrades system by implementing and maintaining security controls.
  • Keeps users informed by preparing performance reports; communicating system status.
  • Maintains quality service by following organization standards.
  • Maintains technical knowledge by attending educational workshops; reviewing publications.
  • Contributes to team effort by accomplishing related results as needed.
  • Pen testing


  • Identify valuable data sources and automate collection processes

  • Undertake preprocessing of structured and unstructured data

  • Analyze large amounts of information to discover trends and patterns

  • Build predictive models and machine-learning algorithms

  • Combine models through ensemble modeling

  • Present information using data visualization techniques

  • Propose solutions and strategies to business challenges

  • Collaborate with engineering and product development teams




The Manufacturing/IoT Security Architect is responsible for researching, designing and implementing secure business focused solutions that meets or exceeds corporate policies and government mandates. This includes developing roadmap and migration strategies for existing architecture. 

  • Research, design and advocate new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendor 
  • Work closely with enterprise architects, other functional area architects and specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements 
  • Provide clear and actionable feedback to technical and non-technical staff regarding security initiatives in relation to the manufacturing/ plant environment 
  • Support risk management process including facilitation of internal/ external security assessments


  • Guiding the team and organization on how to use Agile/Scrum practices and values
  • Guiding the team on how to get the most of out self organization 
  • Guiding the team on self organizing to fill in the intentional gaps left in the Agile/Scrum frameworks 
  • Assessing the Scrum Maturity of the team and organization and coaching the team to higher levels of maturity, at a pace that is sustainable and comfortable for the team and organization 
  • Removing impediments or guiding the team to remove impediments by finding the right personnel to remove the impediment. 
  • Building a trusting and safe environment where problems can be raised without fear of blame, retribution, or being judged, with an emphasis of healing and problem solving. 
  • Facilitating getting the work done without coercion, assigning, or dictating the work. 
  • Facilitating discussion, decision making, and conflict resolution 
  • Assisting with internal and external communication, improving transparency, and radiating information 
  • Supporting and educating the Product Owner, especially with respect to grooming and maintaining the product backlog. 
  • Providing all support to the team using a servant leadership style whenever possible, and leading by example


  • Supporting, designing, and delivering interfaces between RoboticsX and Non-RoboticsX systems that combine functional business processes

  • Implementation of third party software into RoboticsX platform including blueprinting, mapping, prototype, design, configuration, testing, go-live, user training and post production