BPM System Architect Engineering at Geebo

BPM System Architect

Company Name:
V2 Technologies, Inc.
Utilizes theoretical and practical application of advanced computer science and engineering principles and concepts, as well as advanced experience with Business Process Management (BPM) tools and technologies, to perform the following job duties:
- Performing business requirement analysis and revision of requirement specifications.
- Designing and creating work flows, Data Classes, Rule Sets, Rule set Versions, Activities, Activity Step Methods, Flow Shapes, Harness Rules, Layout and Sections.
- Performing Class structure design and data modeling.
- Designing UI Components and creating Flows in PEGA 7.
- Performing Business Process and Security modelling, Architecture Design and Testing and Deploying the BRE (Business Rules Engine) and BPM (Business Process Management) applications using PEGA PRPC.
- Refactoring class structures, Integrations, Site-minder Authentication, UI renaming classes, and creating Connect SQL's.
- Developing the Code and Web pages per the established business requirements.
- Creating Declarative Rules and Decision Rules for automatic validation of UI forms.
- Developing User Interfaces and Screen Flows using JSP and HTML.
- Developing and deploying Enterprise Applications using Web/Application Servers including Apache Tomcat, BEA Web-logic, WebSphere servers and JBoss.
- Understanding and Leveraging the PEGA OOTB functionalities.
- Providing technical guidance during design and development process.
- Debugging tools such as Tracer Tool, Clipboard and Expression Builders.
- Designing security applications, including setting up Access Groups, Operator ID's, Work Manager, Access Roles and End User ID's, and Application Rules.
May perform other duties normally associated with this occupation.
Requirements: Requires a Master's degree in Computer Science, Computer Information Systems, Electrical or Electronics Engineering, or related major that provided the skills, knowledge and abilities required and three (3) years of experience in the job offered or in a related position that provided the required skills, knowledge, and abilities. In lieu of the above-stated primary academic level and job experience requirements, employer will accept a related Bachelor's degree in Computer Science, Computer Information Systems, Electrical or Electronics Engineering, or related major that provided the skills, knowledge and abilities required and 5 years of related, progressive, post-degree experience that provided the required skills, knowledge, and abilities.
In addition, requires demonstrable experience and proficiency in the following:
1. PEGA 7.
2. PEGA Systems BPM tools, including PEGA works and PRPC (PegaRULES Process Commander) V. 7.1.4.
3. Web/Application Servers, including Apache Tomcat, BEA WebLogic, WebSphere servers, and JBoss.
4. Testing and deploying BRE and BPM applications.
5. JSP.
6. HTML.
7. CPM Framework.
8. Bix and Pega Mobile.
Any suitable combination of education, training or experience is acceptable. The term suitable, in this context, means substantial compatibility with stated academic level and job experience requirements and ability to perform job duties.
Additional Information:
Job Site: 160 Durham Avenue, Suite 104, Metuchen, NJ 08840
No travel or telecommuting. Job duties are project-based and performed on long-term assignments at various unanticipated sites within the U.S. which may require relocation at the end of the project.
Mail Resumes To: Questpay, Inc. dba V2 Technologies, Inc., ATTN: HR, 160 Durham Avenue, Suite 104, Metuchen, NJ 08840
No calls or emails. EOE.
Must be legally authorized to work in the United States without sponsorship.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.