Configuration Manager with Security Clearance Law Enforcement & Security - Bedford, MA at Geebo

Configuration Manager with Security Clearance

Applied Research Solutions is seeking Configuration Data Manager (Level 2) candidates to fill a role located at Hanscom AFB, in Bedford, Massachusetts.
The Configuration Data Manager must have progressive experience in managing configuration of software, engineering documents, design drawings, engineering changes and notices, and planning/conducting design audits to enable Government ownership of the program technical baseline.
Job
Responsibilities:
Provide CM of all relevant program artifacts.
Archive acquisition documentation.
Review and analyze the development/sustainment Contractor's CM program and data deliveries for accuracy, completeness, and compliance.
Maintain CM files including configuration identification, change control, and status accounting records.
Convene and manage the Configuration Control Boards (CCBs), Technical Review Boards (TRBs), and record approved changes and results.
Participate in cross-functional change control boards to evaluate proposed changes.
Review and analyze proposed changes to ensure operational and sustainment capabilities are not adversely affected by the changes.
Review the CCB membership list for currency and completeness.
Support Engineering Assessments.
Prepare for, conduct, and/or support major audits such as Physical Configuration Audits (PCAs) and Functional Configuration Audits (FCAs).
Record and maintain assessment and audit findings, minutes, and action items.
Report the Development/Sustainment's data delivery status.
Support pre- and post-contract award data reviews.
Review and analyze the development/sustainment Contractor's conformance to CDRL requirements.
Process Government and development/sustainment Contractor correspondence.
Ensure compliance with DoDI 5230.
24, DODD 5230.
25, DoD 5010.
12-M.
DoD 5000.
02-R, DFARS 252.
227-7013, DFARS 252.
227-7014, and ASSIST database.
Other duties as assigned.
Qualifications/Technical Experience Requirements:
Must be a U.
S.
Citizen Active Secret Security Clearance Required.
Advanced degree (MA/MS) and 12 years of experience in the respective technical/professional discipline being performed, of which 5 years must be in the DoD.
Or a BA/BS degree and 15 years of experience in the respective technical/professional discipline being performed, of which 5 years must be in the DoD.
Or 20 years of directly related experience with proper certifications as described in the Functionally Aligned Job Descriptions, of which 8 years must be in the DoD.
All positions at Applied Research Solutions are subject to background investigations.
Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.
5(a).
This regulation prohibits discrimination against qualified individuals on the basis of disability and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities.
This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.
5(a).
This regulation prohibits discrimination against qualified protected veterans and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
Recommended Skills Assessments Auditing Databases Change Control Engineering Fellow In The Casualty Actuarial Society Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.