The Defense group supports the Department of Defense (DoD) mission to keep our homeland and its citizens safe. We provide solutions to improve the Nation's defense by providing software, systems engineering, IT, training and logistics and fleet management solutions.Responsibilities
The contractor shall provide support within the J64 Division IAW processes identified in the ITCC contract and governing government directives.Support will be in the J641 branch.
Software Control Management Assistance:
Configure software tools (such as SCCM) to provide customized reports IAW government POC direction.
Synthesize software generated report data into decision-ready information for review and consideration by government personnel.
Analyze software generated report data to provide client software performance characteristics and enterprise client hardware configuration characteristics (baseline, low and high thresholds).
Present analysis to government personnel as requested, to provide performance parameters of the current client experience.The data analyst will provide and use performance characteristics information as a means to assess client experience between physical and virtual environments.
ICW government personnel, identify critical software application attributes that must be captured in the government-provided IT knowledge management system (i.e., REMEDY).Also, develop and propose organizational processes that ensure the critical software application attributes are captured in a simple and timely manner.
ICW government oversight and direction, use government-provided IT knowledge management system (i.e., REMEDY), develop customized reports that provide key information regarding approved software applications and components for each network domain.Also, provide report information for software applications pending approval, as well as software applications that are no longer approved.
ICW government personnel, assist in the development of an organizational “Software Application Change Approval Process.”The purpose of this process is to strictly control and manage the software approval and deployment process, so that additions and removal of software applications in the operational computing environment are performed after receiving approval by specified government personnel and documented accordingly.
ICW government personnel, assist in the development of an organizational “Software Waiver Approval Process”.The purpose of this process is to strictly control and manage the waiver process for software applications that do not conform to the CIO software policy, but are necessary to meet operational mission requirements.
ICW government personnel, assist in the development of an organizational “Software Assessment & Value Engineering” process.The purpose of this process is to periodically assess the usage rate of software applications and determine how best to manage software lifecycle costs to increase fiscal value to the government.
ICW government personnel, streamline IT asset management, secure network-connected devices, and service end-user systems more efficiently using Dell KACE Discovery Tool.
ICW government personnel manage enterprise wide compliance with all software license agreements and copyright law by monitoring and enforcing proper software usage policies and guidelines to ensure that there is no non-conformance.
ICW government personnel, conduct internal software audits to identify variances between deployed and licensed software, ensure deployed software aligns with the quantity and licensing models purchased, and rectify variances between deployed and licensed software.
ICW government personnel, assist with managing vendor compliance audits as required.
ICW government personnel, use Remedy to gather information regarding the purchase numbers of installed software on the enterprise networks.
ICW government personnel, reconcile purchased license level against the installed licenses.
ICW government personnel, assist with creating TMTs to inform users of software install overages.
ICW government personnel, ensure adequate number and usage of licenses by monitoring, analyzing and optimizing.
ICW government personnel, use the information from the TMTs and discovery tools to recommend courses of action (COAs) for software that has been installed over the purchased license level.
ICW government personnel submit CRQs for software removal or software installation (version upgrades).
ICW government personnel evaluate and recommend options to reduce licensing costs.
ICW government personnel, research, evaluate, recommend, and implement methods, policies, processes, best practices, techniques, technologies, and tools for software license management.
Top Secret security clearance
Bachelor’s degree in Computer Science or related field with a minimum of 5-8 years of configuration management experience
Experience working with distributed computer systems, software, and associated communication networks
Experience working with networking principles and local area networks
Experience working with software and hardware products
ITIL v3 Foundation Certification preferred
Must be proficient and training up on using Liquidware Labs Stratusphere software
Strong analytical and problem solving skills to resolve technological problems
Ability to work independently and as part of a team
Experience in both hardware and software asset and configuration Management, as well as knowledge of IT service management process
Experience with BMC Atrium, BMC AR System, and BMC Remedy ITSM 7.6 or later or a similar industry solution
Familiar with any of the following: discovery products including Microsoft SCCM, BMC Software Asset Management, reconciliation of discovery data in BMC CMDB environment, and integration of discovery solutions with CMDB or a similar industry solution
Must have excellent organizational, communication, and problem solving skills and a proved understanding of IT business needs and knowledge of IT industry standard best practices
Familiarity with applications, standards, concepts (ITSM), and service level agreements
Ability to multitaskAbout Perspecta
What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector—from investigative services and IT strategy to systems work and next-generation engineering.
Our promise is simple: never stop solving our nation’s most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.
Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.
As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)
Please be aware of recruitment fraud and third parties misrepresenting themselves as Perspecta recruiting and other members of our management team. Perspecta does not request personal information outside of the online application at careers.perspecta.com or perspecta.com/careers, nor will Perspecta ever request payment or banking-related information, or advance money as part of the hiring process. Perspecta applicants chosen to move forward in the hiring process will be contacted by a Perspecta talent acquisition representative, and only from an “@perspecta.com” email extension and not via personal email providers such as Gmail, Yahoo, etc. or any chatting apps. If you believe you have been sent fraudulent correspondence please go to: https://www.ic3.gov.