Senior Application Engineer

Schneider Electric Andover , MA 01810

Posted 3 months ago

Schneider Electric creates connected technologies that reshape industries, transform cities and enrich lives. Our 144,000 employees thrive in more than 100 countries. From the simplest of switches to complex operational systems, our technology, software and services improve the way our customers manage and automate their operations. Help us deliver solutions that ensure Life Is On everywhere, for everyone and at every moment: https://youtu.be/NlLJMv1Y7Hk.

Great people make Schneider Electric a great company.

Schneider Electric's Industry Services business is looking for a dynamic application engineer to support the growth of its migration and modernization business. In this highly visible and key position, you will support and promote the development of tools and services that help our customers migrate to Schneider Electric's new automation platform from a legacy system.

Responsibilities for this position include engineering, programming, and supporting the migration of automation systems. More specific tasks may include:

  • Provide automation product and system application expertise to aid product management with strategies synchronized with the team's goals and the strategic roadmap

  • Capturing customer requirements and define the new product and/or services to meet them

  • Develop playbooks and migration assessment tools to help easily migrate competitive legacy systems to the Schneider world

  • Support the development of software conversion tools and hardware wiring systems through specification, validation and installation

  • Participate in product launch and business support activities

  • Develop and present product demonstrations and training courses at commercial events including trade shows, customer briefings, and launch events

  • Provide and resolve high-level technical application issues (pre and post sales) and marketing questions as requested by various stakeholders

  • Willingness to travel required (about 15%)

  • Expertise in the application of industrial automation systems in the form of application development and installation

  • A high degree of knowledge of PLC programming, PLC hardware, and other automation system components such as HMI, SCADA and drives. Must be able to program and properly document a variety of PLC and HMI systems from different manufacturers

  • Experience with some of the following PLC/HMI platforms is necessary:

Schneider Electric PLCs

  • Quantum, M340, Premium, Advantys, Unity-Pro Software

Rockwell/Allen-Bradley PLCs ControLogix, CompactLogix, SLC Series RSLogix software

GEFanuc Rx3i PAC, 90-30 Series PLC

Schneider Electric HMI Vijeo Citect, Vijeo Designer, ClearSCADA

Rockwell HMI - RSView32, RSView Studio RSLinx, PanelBuilder

GEFanuc

  • IFix, Cimplicity,

Wonderware Intouch, Archestra

Networking Ethernet IP, Modbus TCP, Profibus, Profinet, Devicenet, Interbus, Modbus

Cybersecurity

  • Excellent verbal and written communication skills.

  • Excellent interpersonal and customer relation skills.

  • Excellent problem resolution skills

  • Must be a detail-oriented self-starter and able to work independently

We seek out and reward people for being straightforward, open, passionate, effective and challenging the status quo. We want our employees to reflect the diversity of the communities in which we operate. We welcome people as they are, creating an inclusive culture where all forms of diversity are seen as a real value for the company. We're looking for people with a passion for success on the job and beyond. See what our people have to say about working for Schneider Electric: https://youtu.be/6D2Av1uUrzY.

Let us learn about you! Apply today.

You must submit an online application to be considered for any position with us. This position will be posted until filled.

It is the policy of Schneider Electric to provide equal employment and advancement opportunities in the areas of recruiting, hiring, training, transferring, and promoting all qualified individuals regardless of race, religion, color, gender, disability, national origin, ancestry, age, military status, sexual orientation, marital status, or any other legally protected characteristic or conduct.

Concerning agencies: Schneider Electric does not accept unsolicited resumes and will not be responsible for fees related to such.

Schneider Electric is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.


icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Senior IT Security Engineer
New!

Onward Technologies Inc

Posted Today

VIEW JOBS 10/19/2019 12:00:00 AM 2020-01-17T00:00 <div><strong>Title: </strong>Senior IT Security Engineer<br /> <br /> <strong>Location:</strong> North Andover, Massachusetts<br /> <br /> <br /> <strong>RESPONSIBILITIES:</strong></div> <ul type="disc"> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Gain a comprehensive understanding of the company’s data protection technology and information systems and capabilities.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Provide security requirements, design and architecture patterns including processes and tools to protect data across all platforms.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Provide guidance and recommendations related to big data protection security architecture and lead proof of concept projects.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Lead the development and guidance during data protection architecture design activities of new and existing products.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Conduct architectural risk and impact assessments on new and existing applications/data stores.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Research and evaluate proposed data protection and business solutions for adherence to documented company standards, policies and regulatory responsibilities.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Work collaboratively with multidisciplinary teams and Business Units to implement and support existing and future IoT security solutions.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Determine data protection and database centric security requirements by evaluating business strategies and requirements, researching information security standards, conducting system security and vulnerability analyses and risk assessments and identifying integration issues.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Plan security systems by evaluating data protection technologies; developing requirements for all areas related to data protection and database security.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Act as the subject matter expert with regards to strengths and weaknesses of the data protection systems and recommend improvements to both software and embedded hardware.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Identify data protection security architecture capabilities and designing security architecture patterns to mitigate threats.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Assess emerging data protection technologies against security architecture to determine where they fill gaps, overlap with existing solutions or extend capabilities.</span></li> </ul> <div style="margin: 0px 0px 10px; line-height: normal;"> </div> <div><strong>Qualifications:</strong></div> <ul type="disc"> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Bachelor’s Degree in Computer Science, Information Technology or a related field.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">CISSP, CREA, CEH, CPT, CEPT, CWAPT or other relevant security certifications and knowledge of ISO and NIST security standards - <strong>PREFERRED</strong></span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Three to five (3-5+) years of experience in system security administration, controls or information management experience and/or Security Engineer/Architect/Consultant</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Five (5+) years of systems architecture experience</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">In-depth understanding of IoT Azure solutions and security best practices/governance</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Wrangling the explosion data from the Internet of Things (IOT)</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Keeping your data secure with encryption, KMS, HSM, IAM, Cognito, STS, and more</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Experience with analytic solutions applied to the Marketing or Risk needs of enterprises</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Highly technical and analytical, possessing 5 + years of IT platform implementation experience.</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">End to end understanding of the software development lifecycle</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Demonstrated ability to think strategically about business, product and technical challenges</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Familiarity with security industry standards (ISO 17799, ISO 27001/2, ISO 31000, NIST 800 series)</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Experienced with core data protection technologies and relational database management platforms</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Experience in defining and implementing data protection/database security and solid understanding of best practices</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Demonstrated ability of leading programs focused around security</span></li> <li style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;" style="padding: 0; margin: 0;"><span style="margin: 0px; font-family: "Helvetica",sans-serif; font-size: 10.5pt;">Influencing experience at senior levels within an organization</span></li> </ul> <div style="margin: 0px 0px 10.66px; color: rgb(0, 0, 0); line-height: normal; font-family: "Helvetica",sans-serif; font-size: 10.5pt; font-style: normal; font-weight: 400;"> </div> <div style="margin: 0px 0px 10px; line-height: normal;"><br style="background-color: transparent; color: rgb(34, 34, 34); font-family: Arial,Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;" /> <span style="background-color: transparent; color: rgb(0, 0, 0); font-family: Arial,Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"><span style="background-color: rgb(255, 255, 255); display: inline; float: none; font-family: Arial,Verdana,sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;">Onward Technologies is an Equal Opportunity Affirmative Action employer.  We prohibit discrimination in decisions concerning recruitment, hiring, compensation, benefits promotions, training, termination or any other condition of employment or career development.   All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, veteran status, disability status or any other legally protected status.</span><font face="Calibri" size="3"> </font></span></div> Onward Technologies Inc North Andover MA

Senior Application Engineer

Schneider Electric