[Close] 

Software configuration management specialist - intermediate

Company Name:
Engility
Must be able to write Configuration Management (CM) Plans and audit software change procedures, software development, software testing, and software documentation to verify compliance with software CM plans and procedures. Must be capable of participating in design reviews, configuration audits, and evaluations of software products to ensure proper identification, control, and status accounting of the software baseline for each system. Must also:
Have knowledge in the use of SharePoint for use in identification, control and status accounting of the software baseline;
Have knowledge in the use of Configuration Management tools such as Code Management System (CMS) Subversion, ClearCase, P4V, Open VMS CMS, MS Visual Studio 2010 (V Source Safe);
Execute, document and maintain system version software builds and associated procedures for testing and delivery of the software product to field sites;
Conduct configuration audits (functional and physical) implementing any corrective action required;
Be able to manage the delivery of software to SEC Software Control and Reference Office (SCRO);
Be able to interact with the RDIT to have copies produced of documents and software products for distribution.
Bachelor's Degree in Computer Science, Electronics Engineering or other Engineering or Technical discipline with substantial software or computer related course work is required. Four years additional applicable experience can be substituted for the degree;
Have knowledge in the use of SharePoint for use in identification, control and status accounting of the software baseline;
1.5 years of experience.
BA/BS and 0-1 yrs of related experience.
Date: 2014-09-11
Country: US
State: MD
City: Aberdeen Proving Ground
Postal Code: 21005
Category: INFORMATION TECHNOLOGY

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.