The Technology Product Consultant – Configuration Management Specialist is an experienced mid to senior level technical role performing various tasks related to Configuration Management with in IT Infrastructure and Cyber Security. These tasks include but not limited to creating and updating CM plans, establishing and enforcing standards, baselines and best practices, developing and maintaining databases and repositories, performing and automating audits and reviews, implementing and managing tools, and collaborating with stakeholders.
In this role, the individual defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system. Configuration Management Specialist will establish and support automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system as well as support and maintain systems and tools that perform checks on critical system files, configuration files, and content.
• Ensure computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events.
• Implement and ensure configuration change controls are in place
• Establish, track and control baselines for IT assets including systems, configurations, identities and databases.
• Actively manage (inventory, track and correct) software and hardware assets for IT Infrastructure Areas.
• Collaborate with the IT and cyber security teams to implement and support FIM tool(s)
• Ensure Quality Control and Assurance procedures are consistent with Infrastructure specifications, client requirements and corporate policies.
• Support implementation and management of security policies, alerts, reports, and audits
• Manage and control data governance, classification, discovery, and protection
• Work within established configuration and change management policies to ensure awareness, approval and success of changes made to the environment.
• Work with the groups within IT and Cyber security for related Infrastructure projects and initiatives.
• Interface with other areas of IT for engineering and infrastructure support
• Perform reviews and/or Root Cause Analysis on production systems failures, formulate corrective action plans, ensure corrective actions are implemented, and track their effectiveness.
• Requires working in a 24x7 environment with callout availability
• Bachelor’s degree in Information Technology, Computer Science, Engineering, Math or related technical field.
• A minimum of 4 years of experience within the IT field or an industry with reliance on technical expertise.
• Experience with automation and file integrity monitoring tools such as Ansible, Tripwire, MS Defender, Puppet, Terraform, Chef
• Demonstrated knowledge of Information Technology principles including Infrastructure support, system administration, and application support and/or application development techniques.
• Strong understanding of risk analysis, vulnerability assessment methodologies, and securing baselines
• Knowledge of cybersecurity concepts and methods including, but not limited to secure configuration management, data protection, security monitoring, incident response, patch management, governance, enterprise security strategies and architecture
• Demonstrated ability to troubleshoot and make recommendations using critical thinking, sound judgment, and decision making processes and techniques in a fast-paced, mixed technology environment
• Demonstrated ability to create both technical and non-technical end-user documentation
• Must be detail oriented and demonstrate strong analytical and problem solving skills.
• Must demonstrate strong interpersonal skills and the ability to work effectively with clients, leadership, and all levels of staff.
Desired Qualifications:
• Experience with automation, scripting, and orchestration (Ansible, Python, PowerShell, Terraform, etc.)
• Knowledge of ITSM systems (ServiceNow), CMDBs, Databases and related platforms.
• Experience with end-point management tools like (BigFix, SCCM, Intunes, Solarwinds)
• Familiarity with security best practices, regulatory requirements, and industry frameworks (e.g., NIST, ISO, CIS, etc.,)

“Public service” is not just in our name.
It’s who we are. It’s what we do.
We keep the lights on. We keep our customers’ phones charged and their homes warm. We’re the folks in the trucks during the storms, hard at work late at night.
We power the lives of 2.4 million electric customers and 1.9 million gas customers in New Jersey, and over one million electric customers on Long Island. We are proud to be in neighborhoods, keeping customers safe and comfortable.
A lot has changed since PSEG was founded in 1903, but our commitment to our customers, employees, shareholders and communities has stayed the same.
For 120 years and counting we have rolled up our sleeves to deliver the affordable and reliable services customers need. And that isn’t changing.
We are still adapting to meet the needs of today and tomorrow. PSEG invests in the communities where we live and work, advancing sustainability, equity and workforce training and development.
We also have our eye on tomorrow and finding ways to fight climate change, including working toward our goal for net-zero carbon emissions by 2030.
Find us on Facebook:
www.linkedin.com/company/pseg
Find us on Twitter:
http://twitter.com/psegnews
http://twitter.com/psegdelivers
For PSEG Long Island:
http://facebook.com/psegli
https://www.linkedin.com/company/psegli/
http://twitter.com/psegli
For the latest PSEG blog, follow Energize!: www.energizepseg.com
Click here to get PSEG news sent to your inbox: http://pseg.com/getnews.
For news about PSE&G’s rate filings and upcoming public hearings visit www.pseg.com/pseandgfilings.
Our LinkedIn page is intended to serve as a useful exchange of information in regards to our Company and services and we encourage any and all questions and commentary, including criticism. However, we won't allow any forms of hate speech (personal attacks, such as disparaging others for different points of view, ethnicity, heritage, etc), violent remarks, comments that are excessively re