Yesterday
Public Trust
Senior Level Career (10+ yrs experience)
$125,000 - $150,000
No Traveling
Engineering - Systems
Rockville, MD (On-Site/Office)
Senior SCCM Engineer
Public Trust (NRC Screen will need to be performed)
Rockville, MD
Our Client is seeking qualified, creative, and customer-focused technical representative to provide System Release Engineering development and support remotely and at our customer site as a Release Systems Engineer.
You will work in a fast-paced and diverse environment and will have a management team that encourages your career development and growth. In this role, you will gain many intangible skills, such as time and task management, critical thinking and problem solving, the ability to communicate complicated problems in a concise manner, as well as solve complex problems using available tools. This job is for you, if you have an interest in joining a dynamic and respected team of individuals who provide unmatched support to our clients.
Routine Duties Will Include:
• This person will be a primary point of contact and responsible for providing System Release Engineering development, management, and support.
• Use knowledge of MS Office Suite, ServiceNow, and tools specifically used to support the deployment of these devices is desired. For example, familiarity with ServiceNow will aid in deploying the hardware devices, ticket processing, and updating the CMDB to capture the change.
• Excellent analytical and organizational skills preferred.
• Candidates must be comfortable with communicating with end users and providing status to Internal and external representatives and able to take and execute direction on a tight schedule.
• Some travel may be required depending on the site supported.
Primary Responsibilities:
The SCCM Engineer, or System Center Configuration Manager Release Engineer, will be responsible for deploying, testing, and maintaining software updates and patches for enterprise end-user PCs. They also help develop and maintain documentation and best practices for deploying and patching software and hardware.
• Software Testing & QA: Experience with functional, regression, and performance testing.
• Patch & Release Management: Understanding of patching processes, software deployment, and impact analysis.
• Scripting & Automation: Proficiency in PowerShell, Python, or Bash for test automation and patch validation.
• CI/CD & DevOps Tools: Familiarity with Jenkins, GitLab CI/CD, Ansible, SCCM, or Intune for automated patch testing.
• Operating Systems & Infrastructure:
• Deep knowledge of Windows, Linux, and MACOS patching.
• Experience with Windows Server Update Services (WSUS), SCCM, or Linux patching tools like YUM and APT.
• Network & Security Testing: Understanding of vulnerability scanning tools (Nessus, Qualys) and security compliance frameworks (DISA STIGs, NIST, CIS benchmarks).
• Database & Log Analysis: Ability to query logs and databases (SQL, Splunk, ELK Stack) for troubleshooting patch failures.
• May be called to review systems for critical updates on a weekly basis, or each time a major threat is announced.
Required Qualifications:
• Bachelor’s degree in computer science, Software Engineering, Information Technology, or a related field and 8-12 years relevant experience. A master’s degree in software engineering, Cybersecurity, or IT Management, or a related field and 6-10 years of relevant experience is a plus but not always required.
• Minimum 5+ years of experience providing IT technical support and administering IT systems.
• Minimum 3+ years of direct experience in the implementation, administration, and configuration of MECM/SCCM in a global enterprise environment (hundreds to thousands of endpoints) across multiple air-gap networks.
• Extensive working knowledge of and troubleshooting experience with standard (Windows) client platform administration, configuration, rights management, and file access permissions needed to remediate issues.
• Experience managing a desktop OS image for large corporate environments, coupled with experience in desktop deployment automation architecture, design/migration, and troubleshooting.
• Extensive working knowledge of the Windows registry, interaction of drivers within the OS, and unattended/silent installs of Windows operating systems is highly preferred.
• Must be proficient with troubleshooting Windows Desktop and Server OS.
• Strong PowerShell scripting experience.
• Strong experience with creating images using the Sysprep or MDT process.
• Experience patching, deploying software, and resolving MECM/SCCM client issues.
• Knowledge and experience with Active Directory and creating Group Policy Objects (GPOs).
• Experience in managing workforce task assignment.
• Strong prioritization, problem-solving, diagnosis, and troubleshooting skills.
• Ability to work under pressure with varying levels of leadership and manage competing priorities.
• Exposure to other network monitoring systems and IT Service Management (e.g., Splunk, or similar).
• Experience using ITIL Ticket Management System - ServiceNow or equivalent.
• Proficient in Microsoft Office applications (Word, Excel, PowerPoint).
• Familiarity with the ITIL 3 or 4 Framework.
• A self-starter with strong attention to detail and the ability to work independently.
• Patch Management experience.
• Process Documentation experience.
• Strong experience with Rights Management and setting up permissions.
• Strong understanding of TCP/IP networking, DNS, SSL/TLS, and related protocols.
• Experience with Windows Server 2016, 2019, or 2022.
• Ability to obtain ITILv4 Foundation Certification
• Strong analytical and troubleshooting skills to diagnose patch-related issues.
• Attention to detail to identify software bugs, security vulnerabilities, and system inconsistencies.
• Excellent documentation skills to track test cases, patch deployment results, and remediation steps.
• Collaboration & Communication to work with DevOps, security, and IT operations teams on patch validation.
• Must be able to obtain an NRC Public Trust Security Clearance prior to start (may take anywhere between 1-3 months).
• Due to contract requirements, U.S. Citizenship OR U.S. Permanent Residence is required.
• Certifications:
• CompTIA Security+ or Network+
• ITIL 4 Foundation
• One or more of the following certifications are required:
o MCSA
o MCSE
o MCSD
o Microsoft Modern Desktop Administrator Associate
o Azure Administrator Associate
o Azure Solutions Architect
Public Trust (NRC Screen will need to be performed)
Rockville, MD
Our Client is seeking qualified, creative, and customer-focused technical representative to provide System Release Engineering development and support remotely and at our customer site as a Release Systems Engineer.
You will work in a fast-paced and diverse environment and will have a management team that encourages your career development and growth. In this role, you will gain many intangible skills, such as time and task management, critical thinking and problem solving, the ability to communicate complicated problems in a concise manner, as well as solve complex problems using available tools. This job is for you, if you have an interest in joining a dynamic and respected team of individuals who provide unmatched support to our clients.
Routine Duties Will Include:
• This person will be a primary point of contact and responsible for providing System Release Engineering development, management, and support.
• Use knowledge of MS Office Suite, ServiceNow, and tools specifically used to support the deployment of these devices is desired. For example, familiarity with ServiceNow will aid in deploying the hardware devices, ticket processing, and updating the CMDB to capture the change.
• Excellent analytical and organizational skills preferred.
• Candidates must be comfortable with communicating with end users and providing status to Internal and external representatives and able to take and execute direction on a tight schedule.
• Some travel may be required depending on the site supported.
Primary Responsibilities:
The SCCM Engineer, or System Center Configuration Manager Release Engineer, will be responsible for deploying, testing, and maintaining software updates and patches for enterprise end-user PCs. They also help develop and maintain documentation and best practices for deploying and patching software and hardware.
• Software Testing & QA: Experience with functional, regression, and performance testing.
• Patch & Release Management: Understanding of patching processes, software deployment, and impact analysis.
• Scripting & Automation: Proficiency in PowerShell, Python, or Bash for test automation and patch validation.
• CI/CD & DevOps Tools: Familiarity with Jenkins, GitLab CI/CD, Ansible, SCCM, or Intune for automated patch testing.
• Operating Systems & Infrastructure:
• Deep knowledge of Windows, Linux, and MACOS patching.
• Experience with Windows Server Update Services (WSUS), SCCM, or Linux patching tools like YUM and APT.
• Network & Security Testing: Understanding of vulnerability scanning tools (Nessus, Qualys) and security compliance frameworks (DISA STIGs, NIST, CIS benchmarks).
• Database & Log Analysis: Ability to query logs and databases (SQL, Splunk, ELK Stack) for troubleshooting patch failures.
• May be called to review systems for critical updates on a weekly basis, or each time a major threat is announced.
Required Qualifications:
• Bachelor’s degree in computer science, Software Engineering, Information Technology, or a related field and 8-12 years relevant experience. A master’s degree in software engineering, Cybersecurity, or IT Management, or a related field and 6-10 years of relevant experience is a plus but not always required.
• Minimum 5+ years of experience providing IT technical support and administering IT systems.
• Minimum 3+ years of direct experience in the implementation, administration, and configuration of MECM/SCCM in a global enterprise environment (hundreds to thousands of endpoints) across multiple air-gap networks.
• Extensive working knowledge of and troubleshooting experience with standard (Windows) client platform administration, configuration, rights management, and file access permissions needed to remediate issues.
• Experience managing a desktop OS image for large corporate environments, coupled with experience in desktop deployment automation architecture, design/migration, and troubleshooting.
• Extensive working knowledge of the Windows registry, interaction of drivers within the OS, and unattended/silent installs of Windows operating systems is highly preferred.
• Must be proficient with troubleshooting Windows Desktop and Server OS.
• Strong PowerShell scripting experience.
• Strong experience with creating images using the Sysprep or MDT process.
• Experience patching, deploying software, and resolving MECM/SCCM client issues.
• Knowledge and experience with Active Directory and creating Group Policy Objects (GPOs).
• Experience in managing workforce task assignment.
• Strong prioritization, problem-solving, diagnosis, and troubleshooting skills.
• Ability to work under pressure with varying levels of leadership and manage competing priorities.
• Exposure to other network monitoring systems and IT Service Management (e.g., Splunk, or similar).
• Experience using ITIL Ticket Management System - ServiceNow or equivalent.
• Proficient in Microsoft Office applications (Word, Excel, PowerPoint).
• Familiarity with the ITIL 3 or 4 Framework.
• A self-starter with strong attention to detail and the ability to work independently.
• Patch Management experience.
• Process Documentation experience.
• Strong experience with Rights Management and setting up permissions.
• Strong understanding of TCP/IP networking, DNS, SSL/TLS, and related protocols.
• Experience with Windows Server 2016, 2019, or 2022.
• Ability to obtain ITILv4 Foundation Certification
• Strong analytical and troubleshooting skills to diagnose patch-related issues.
• Attention to detail to identify software bugs, security vulnerabilities, and system inconsistencies.
• Excellent documentation skills to track test cases, patch deployment results, and remediation steps.
• Collaboration & Communication to work with DevOps, security, and IT operations teams on patch validation.
• Must be able to obtain an NRC Public Trust Security Clearance prior to start (may take anywhere between 1-3 months).
• Due to contract requirements, U.S. Citizenship OR U.S. Permanent Residence is required.
• Certifications:
• CompTIA Security+ or Network+
• ITIL 4 Foundation
• One or more of the following certifications are required:
o MCSA
o MCSE
o MCSD
o Microsoft Modern Desktop Administrator Associate
o Azure Administrator Associate
o Azure Solutions Architect
group id: 10107773