Configuration Manager Tier III (Top Secret Clearance) at Piper Companies
Washington, District of Columbia, USA -
Full Time


Start Date

Immediate

Expiry Date

07 Aug, 25

Salary

160000.0

Posted On

08 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Microsoft, Gems, Configuration Management, Splunk, Linux, Puppet

Industry

Information Technology/IT

Description

Zachary Piper Solutions is currently looking for a Configuration Manager to support work for the Department of Energy and the National Nuclear Security Agency on-site in Washington, DC. The Configuration Manager should be eager to thrive in a dynamic environment and utilize their skills in infrastructure and cybersecurity.
This job opens for applications on 4/29/25. Applications for this job will be accepted for at least 30 days from the posting date.
Clearance: DOE Q clearance OR Top Secret clearance

QUALIFICATIONS FOR THE CONFIGURATION MANAGER INCLUDE:

  • 10+ years of experience in Configuration Management
  • Knowledge of Microsoft, Linux, Splunk, Ansible, Tenable, Splunk, GEMS
  • Experience with CM tools such as Puppet, Chef and Ansible
  • Must be eligible to work in the United States and obtain and maintain an Active U.S Government Top Secret or Q Clearance
Responsibilities
  • Conduct analysis of alternatives for configuration tools, make recommendations, work with team to design, develop, test, implement, and maintain tool choice.
  • Responsible for the administration, monitoring, and maintenance of software infrastructures and applications.
  • Analyzes software, hardware, and database design and include in technical baseline
  • Maintains documentation for all developed hardware, software, and databases, including requirements traceability matrices, APIs, software designs, software test reports, security documentation, POA&Ms, user guides, admin guides, and training.
  • Maintains a primary source repository with replication for COOP for all production configurations technology.
  • Performs or participates in audits, inventories, and assessments of software, all documentation, and configurations to meet cybersecurity requirements in coordination with cyber teams.
Loading...