Overview
On Site
USD 130,000.00 per year
Full Time
Skills
Content Management
Inventory
Computer Hardware
IT Infrastructure
Collaboration
FIM
Quality Control
Auditing
Data Governance
Change Management
Root Cause Analysis
Corrective And Preventive Action
Computer Science
Mathematics
Tripwire
Puppet
Progress Chef
Information Technology
System Administration
Application Support
Application Development
Risk Analysis
Vulnerability Assessment
Cyber Security
Configuration Management
Data Security
Incident Management
Patch Management
Critical Thinking
Decision-making
User Guides
Attention To Detail
Analytical Skill
Problem Solving
Conflict Resolution
Leadership
Scripting
Orchestration
Ansible
Python
Windows PowerShell
Terraform
IT Service Management
ServiceNow
Database
Management
BigFix
Microsoft SCCM
SolarWinds
ISO 9000
Job Details
About the Job
Job Summary:
The Technology Product Consultant - Configuration Management Specialist is an experienced mid to senior level technical role performing various tasks related to Configuration Management within IT Infrastructure and Cyber Security. These tasks include but not limited to creating and updating CM plans, establishing and enforcing standards, baselines and best practices, developing and maintaining databases and repositories, performing and automating audits and reviews, implementing and managing tools, and collaborating with stakeholders.
In this role, the individual defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system. Configuration Management Specialist will establish and support automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system as well as support and maintain systems and tools that perform checks on critical system files, configuration files, and content.
Job Responsibilities:
Job Specific Qualifications:
Desired Qualifications:
Job Summary:
The Technology Product Consultant - Configuration Management Specialist is an experienced mid to senior level technical role performing various tasks related to Configuration Management within IT Infrastructure and Cyber Security. These tasks include but not limited to creating and updating CM plans, establishing and enforcing standards, baselines and best practices, developing and maintaining databases and repositories, performing and automating audits and reviews, implementing and managing tools, and collaborating with stakeholders.
In this role, the individual defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system. Configuration Management Specialist will establish and support automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system as well as support and maintain systems and tools that perform checks on critical system files, configuration files, and content.
Job Responsibilities:
- Ensure computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events.
- Implement and ensure configuration change controls are in place.
- Establish, track and control baselines for IT assets including systems, configurations, identities and databases.
- Actively manage (inventory, track and correct) software and hardware assets for IT Infrastructure Areas.
- Collaborate with the IT and cybersecurity teams to implement and support FIM tool(s).
- Ensure Quality Control and Assurance procedures are consistent with Infrastructure specifications, client requirements and corporate policies.
- Support implementation and management of security policies, alerts, reports, and audits.
- Manage and control data governance, classification, discovery, and protection.
- Work within established configuration and change management policies to ensure awareness, approval and success of changes made to the environment.
- Work with the groups within IT and Cyber security for related Infrastructure projects and initiatives.
- Interface with other areas of IT for engineering and infrastructure support.
- Perform reviews and/or Root Cause Analysis on production systems failures, formulate corrective action plans, ensure corrective actions are implemented, and track their effectiveness.
- Requires working in a 24x7 environment with callout availability.
Job Specific Qualifications:
- Bachelor's degree in Information Technology, Computer Science, Engineering, Math or related technical field.
- A minimum of 4 years of experience within the IT field or an industry with reliance on technical expertise.
- Experience with automation and file integrity monitoring tools such as Ansible, Tripwire, MS Defender, Puppet, Terraform, Chef
- Demonstrated knowledge of Information Technology principles including Infrastructure support, system administration, and application support and/or application development techniques.
- Strong understanding of risk analysis, vulnerability assessment methodologies, and securing baselines.
- Knowledge of cybersecurity concepts and methods including, but not limited to secure configuration management, data protection, security monitoring, incident response, patch management, governance, enterprise security strategies and architecture.
- Demonstrated ability to troubleshoot and make recommendations using critical thinking, sound judgment, and decision making processes and techniques in a fast-paced, mixed technology environment.
- Demonstrated ability to create both technical and non-technical end-user documentation.
- Must be detail oriented and demonstrate strong analytical and problem solving skills.
- Must demonstrate strong interpersonal skills and the ability to work effectively with clients, leadership, and all levels of staff.
Desired Qualifications:
- Experience with automation, scripting, and orchestration (Ansible, Python, PowerShell, Terraform, etc.)
- Knowledge of ITSM systems (ServiceNow), CMDBs, Databases and related platforms.
- Experience with end-point management tools like (BigFix, SCCM, Intunes, Solarwinds)
- Familiarity with security best practices, regulatory requirements, and industry frameworks (e.g., NIST, ISO, CIS, etc.,)
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.