team in Washington, District of Columbia (US-DC), United States (US). Junior Logistics Analyst NTT DATA has an exciting opportunity for a Junior Logistics Analyst to provide logistics management program support in Washington, DC. You will provide support to the Undersea Defensive Warfare Systems Program Office (PMS 415) for counter-measure defense systems. Responsibilities: Participate in and support … staff coordination. Support meetings, action item tracking as well as documentation reviews for the various PMS415 programs and their ILS requirements. Support the Product Support Manager (PSM) for oversight management of support functions required to field and maintain operational capability of major torpedo weapon systems, subsystems, and components. Assist in conducting Physical Configuration Audits (PCA) by reviewing technical … documentation, validating hardware against design specifications, and ensuring configuration consistency to support system integrity and fleet operational readiness. Support configurationmanagement by maintaining accurate product data within iPDM systems, ensuring alignment across engineering, logistics, and technical documentation. Apply configurationmanagement principles to track and control system changes, maintain baseline integrity, and ensure consistency across technical More ❯
Tier III Operations and Maintenance (O&M) engineers to support various customer Wide Area Networks (WANs) and Local Area Networks (LANs) in providing network upgrades and configuration support to the architecture team; act as subject matter expert in WAN and LAN technologies and vendors; support customer's intra- and inter- net and other data communications systems or segments of … correct problems in the network while maintaining logs and records associated with reported problems or situations Preparing troubleshooting procedures for restoring the network to optimal performance levels Providing fault management for the network and supports performance management functions Responding, isolating, and resolving network troubles Monitoring alarms and alerts to identify network elements causing network degradation or failure Executing … report functions and data input associated with network management Monitoring the security posture of the network and reporting suspected violations to designated authorities Coordinating with configurationmanagement and implementation teams Performing operator-level maintenance on components for network management systems Analyzing network characteristics (e.g., traffic, connect time, transmission speeds, packet sizes, and throughput), recommending procurement, removals More ❯
Required Skills and Experience • Exposure to Desktop/PC or Endpoint Management support • Support and administration of networked Windows and Linux systems • Strong System & Network troubleshooting experience • Experience diagnosing issues with network configurations from the endpoint • Experience providing technical customer service in a desktop support setting • Active government security clearance: TSSCI CI Poly Job Description One of our research … for our end-users. This role will provide classified endpoint computing support for desktop systems (Windows and Linux) on various secured networks. They will assist with machine imaging/configuration, software installation, deployment, patching, and full lifecycle support for computing hardware and peripherals. This role will use various configurationmanagement tools to apply configurations to Windows and More ❯
Birmingham, West Midlands, England, United Kingdom
Verelogic IT Recruitment
Swindon, Birmingham and Nottingham Day rate - DOE Role Purpose Reporting to the Programme Office and OE Infrastructure Manager, the Central Change team is responsible for our client's project management/governance methodology and provides project management for the organisation's large, complex, and cross-functional projects. Additionally, the Central Change team is responsible for maintaining the organisation … provides facilitation and support to the business on prioritisation. Key Accountabilities Work to our client's PMO governance/methodology and serve as a subject matter expert in Project Management Define, plan, monitor and own the project approach throughout the Project Lifecycle, ensuring key metrics are achieved Create, maintain and review project plans and schedules, revising them as appropriate … appropriate to ensure financial controls Manage all project risks, issues and dependencies, and proactively mitigate or resolve roadblocks Manage project scope, dependencies, resources, costs and budgets Manage change control, configurationmanagement, and subsequent impacts as required Ensure lessons learned from the project are retained and shared as appropriate Complete post-implementation reviews as required Knowledge, Qualifications and Skills More ❯
802.1x, AAA, DHCP, DNS, ICMP, LDAPS, NetFlow, Polling, SCP, SMTP, SNMP, Syslog, TCP/IP, VLANs, WinRM, WMI • Exposure to SCCM/WSUS/MECM patch/software endpoint management technologies • Knowledge about virtualized environments such as VMware vSphere's vCenter Server Appliance (vCSA), ESXi hosts, virtual machines (VMs), VMTools and VMware hardware version • Familiarity with networking security, desktops … have the flexibility to cope with a changing environment and short deadlines Secondary Skills - Nice to Haves Job Description • Conduct administration of Microsoft Windows workstations and servers to include configurationmanagement, security updates, patching, software upgrades and mitigation of vulnerabilities • Effective and timely communication with users both in and outside 26NOS is required, including analyzing issues, understanding needs … or vendor hardening guidance • Ability or experience in evaluating scan report data from ACAS Tenable.SC or Tenable Nessus Scanners; participate in the review and response phases of the Vulnerability Management (VM) life cycle • Aptitude to support provisional installation, configuration, operation and maintenance of server systems hardware (Dell PowerEdge, HPe ProLiant, etc.), and utilize related infrastructure devices such as More ❯
Hardware, Software and Network Support Server, Cloud, VoIP, Mobile and MDM Support Liaising with stakeholders and users to provide updates and scheduling information Network and System Administration Build and ConfigurationManagement Onsite and Remote Support Mix of Reactive and Pro-active Work Project Planning and Execution A little about you Core competencies/relevant previous experience: Hardware/… staff of all levels throughout an organisation Understanding of processes and procedures and working to them Starter/Finisher mentality Continuous self improvement and responsibility for learning Excellent time management and scheduling skills Car and clean driving license Occasional travel IT Technical Support: 3 years+ Windows Server Installation, Configuration and Support: 3 years+ Networks and Infrastructure: 3 years+ More ❯
project. Before launch, NASA has a list of all the spacecraft's up-to-date requirements and proof that every single one of them has been satisfied. Effective requirements management ensures that such issues, which are critical in one sense of the word, never have the opportunity to become critical in a more dire sense of the word. JOB … and verification. Have expert proficiency in DOORS eXtension Language (DXL) with the ability to review and analyze code, create and maintain scripts used to generate reports and metrics for management and verification efforts, and develop new custom solutions as needed. Use advance features of Microsoft Word and Excel for document formation and management of document and requirement changes … engine (PUB) Troubleshoot DOORS problems and perform the compatibility testing of new versions of DOORS and IBM PUB. Develop and implement common best practices for DOORS to support requirements management standards throughout the organization. Work with Systems Engineers to extract stakeholder requirements. Manage changes to requirements in accordance with the project CM process. Train and mentor users in requirements More ❯
Bolton, Greater Manchester, North West, United Kingdom
Hiredonline Ltd
Hardware, Software and Network Support Server, Cloud, VoIP, Mobile and MDM Support Liaising with stakeholders and users to provide updates and scheduling information Network and System Administration Build and ConfigurationManagement Onsite and Remote Support Mix of Reactive and Pro-active Work Project Planning and Execution A little about you... Core competencies/relevant previous experience: Hardware/… staff of all levels throughout an organisation Understanding of processes and procedures and working to them Starter/Finisher mentality Continuous self improvement and responsibility for learning Excellent time management and scheduling skills Car and clean driving license [Occasional travel] IT Technical Support: 3 years+ Windows Server Installation, Configuration and Support: 3 years+ Networks and Infrastructure: 3 years+ More ❯
to provide direct support to a dynamic program office overseeing the post-delivery phase of newly constructed USCG cutters. In this role, you will coordinate logistics planning, assist with configuration and sustainment activities, and support the execution of post-delivery availabilities. The ideal candidate will bring hands-on logistics experience, strong communication skills, and a proactive, detail-oriented approach … for newly delivered USCG cutters. Manage and maintain technical documentation and post-delivery support materials. Coordinate cutter availability schedules and logistics events in collaboration with program stakeholders. Assist with configurationmanagement, sustainment planning, and ILS documentation. Participate in recurring meetings and briefings with USCG leadership and shipyard personnel. Contribute to the preparation of support documentation, including statements of … and government acquisition documentation. Required Experience - Logistics Support Specialist: Minimum 3 years of experience in logistics analysis or related support roles. Familiarity with technical documentation review, maintenance planning, and configuration management. Understanding of ILS principles and Coast Guard logistics policies. Comfortable participating in weekly and monthly program meetings. More ❯
software development/coding experience At a minimum three (3) years of experience with web development with .NET, MVC, C#, HTML, CSS, JavaScript, and SQL Understand and use change management functions for production turnover Possesses skills to organize and implement operational level configurationmanagement TS/SCI clearance More ❯
and Intelligence (C4I)/Information Technology (IT) electronic systems equipment, infrastructure, engineering, design, installation, Supply and Warehouse support to Naval Information Warfare Center Pacific (NIWC Pacific) during design, installation, configuration, and transition to operations of the IT infrastructure for multiple facilities. This initiative aims to design, plan, procure, and implement comprehensive IT solutions within the NC3 Alert Campus/… alignment with identified requirements and feasibility within project constraints • Security Architecture & Design - Design, implement, and maintain security frameworks, protocols, and solutions to safeguard DoD enterprise IT infrastructure. • Compliance & Risk Management - Ensure compliance with industry standards (e.g., NIST, GDPR) and implement risk management strategies to protect against vulnerabilities, data loss, and cyber threats. • Collaboration & Documentation - Work closely with engineers … Assist the NIWC Pacific Government team in planning, executing and documenting development of SOVTs in accordance with Shore Installation Process. • Assist the Government in engineering input to support procurement, configurationmanagement, and certification and accreditation. • Identifies and evaluates solution risks and creates strategies and plans to mitigate those risks. Requirements: • 6 to 8 years of systems engineering experience More ❯
and Intelligence (C4I)/Information Technology (IT) electronic systems equipment, infrastructure, engineering, design, installation, Supply and Warehouse support to Naval Information Warfare Center Pacific (NIWC Pacific) during design, installation, configuration, and transition to operations of the IT infrastructure for multiple facilities. This initiative aims to design, plan, procure, and implement comprehensive IT solutions within the NC3 Alert Campus/… TLD) by drafting and refining assigned portions of the document and participate in interim and final reviews to ensure alignment with identified requirements and feasibility within project constraints • System Management & Maintenance - Install, configure, and maintain Mac and Windows systems, ensuring optimal performance, security, and uptime. • User Support & Troubleshooting - Provide technical support, diagnose hardware/software issues, and resolve system … Assist the NIWC Pacific Government team in planning, executing and documenting development of SOVTs in accordance with Shore Installation Process. • Assist the Government in engineering input to support procurement, configurationmanagement, and certification and accreditation. • Identifies and evaluates solution risks and creates strategies and plans to mitigate those risks. Requirements: • 6 to 8 years of systems administration experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience : Bachelor's degree - or - 4 years of additional experience in lieu of degree. 2-5 years related experience, especially More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Required Education and Experience : Bachelor's degree -or- 4 years of relevant additional experience in lieu of degree 2-5 years related More ❯
Job Description: We are seeking a Junior Engineer to support the test, evaluation, and integration of C5ISR systems with a focus on configurationmanagement and electromagnetic environmental effects (E3). The ideal candidate will have a foundational understanding of EMI/EMC, EMP, and shipboard electromagnetic compatibility and will work alongside senior engineers to conduct testing, analysis, and … technical assessments in support of Navy programs. Key Responsibilities: Assist in the test, evaluation, and integration of C5ISR systems related to configuration management. Support EMI/EMC analysis, problem investigation, and mitigation strategies. Conduct E3 computation, modeling, and simulation to assess electromagnetic effects. Participate in EMP and PCI shipboard testing to ensure system resilience and compliance. Perform technical assessments … in an engineering, scientific, or technical discipline from an accredited college or university. At least one (1) year of experience in test, evaluation, and integration related to C5ISR system configuration management. Experience in one or more of the following areas: Integrated Topside Design EMP testing, modeling, and simulation E3 computation and analysis EMI/EMC problem investigation and resolution More ❯
the IT Service Delivery Manager, the Application Support Analyst has primary responsibility for providing day to day operational support for the Company Application Portfolio, through the effective use and management of incident, requests and problems. You will be responsible for the regular monitoring and maintenance of the application portfolio. You will be responsible for the change management process … plan and are scheduled in conjunction with the SSC and 3 rd party suppliers as appropriate. In addition you will provide appropriate SharePoint expertise, in terms of support, content management and development of sites, services and functionality. Responsibilities Provide 2 nd and 3 rd line support for the Company application portfolio Monitor application systems, identifying performance trends and taking … as required for project deliverables Ensure that pro-formas are completed and submitted and track delivery Provide test support for new and enhanced systems/applications Responsible for Change Management process, ensuring that changes are managed, roll-back plans are in place and that they are appropriately scheduled and approved, liasing with SSC Change Manager Owns ConfigurationManagementMore ❯
Welwyn Garden City, Hertfordshire, South East, United Kingdom
Aimtech Recruitment Ltd
vision of how to future-proof this. Take ownership of supplier relationships with a strong technical understanding that enables the conversation to be beneficial to all parties. Ensure Change Management and ConfigurationManagement is is robust and upheld Maintain clear documentation. Strong knowledge of Microsoft products including but not limited to Intune, VMWare and Azure. You will More ❯
Demonstrates high responsiveness for technology issues, security compliance, and SLA attainment Drives problems to root cause through partnership with engineers, ensuring knowledge is captured for future events Develops software configurationmanagement standards and performs data de-identification and provisioning Documents and tracks hardware and software configuration, migration, testing, and deployment solutions rovides user support for an enterprise More ❯