-Perform application administration activities such as creating, modifying, and deleting users, optimizing remote access, and security access for messaging systems, databases, and web applications. 
-Coordinate with department leadership to plan, design, and schedule the release of all software, hardware, and operating system updates. Develop and enhance processes and technical documentation, create back-up procedures, test plans, and reports. Prioritize and respond to requests for service and may provide escalation support to helpdesk staff.
-Provides knowledge for various SAP modules for integrated data interchange for EAI and EDI developments based on webMethods.   
          
-Summarize the overall purpose, objective and responsibilities of the job and how it fits into the organization.            
                                                         
Essential Functions:      
                                                 
Develops EAI/EDI Interfaces
Monitors and evaluates all in-place systems and applications and initializes repairs, updates and other changes necessary to ensure maximum performance
Independently modify existing software to correct errors, to adapt it to new hardware or to upgrade interfaces and improve performance.
 Examples include windows servers, third party systems, storage systems, etc.
Consult with engineering staff and users to evaluate interface between hardware and software, develop and implement specifications and performance requirements and resolve customer problems, requiring specialized aptitude with various systems.
Supports and administers various applications software platforms
Documents IT activities such as down time, problems, systems configurations
May coordinate, manage and/or build new computer systems for special purposes
Remains abreast of emerging technology and maintain technical competency of IT applications
Performs other duties and projects as assigned
Engineer will keep abreast and aware of latest security trends, participate in regular security activities.  Operating systems should be
 kept updated per company security policies and procedures. For example, when a Microsoft vulnerability has been announced or monthly security patches are available, the patch should be applied after it has been tested. Systems engineering staff should routinely harden operating systems. For example, unused ports and services should be closed and turned off, unneeded application features should be disabled, and demo or default application data should be moved or deleted.