×
Register Here to Apply for Jobs or Post Jobs. X

Configuration​/Change Management Services; Security Analyst II

Job in San Antonio, Bexar County, Texas, 78208, USA
Listing for: Koniag Government Services
Full Time position
Listed on 2026-01-06
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Position: Configuration/Change Management Services (Security Analyst II)

Koniag Data Solutions, LLC, a Koniag Government Services company, is seeking a Configuration/Change Management Services (Security Analyst II) to support KDS and our government customer at Joint Base, San Antonio, TX. This position requires the candidate to be able to obtain a Public Trust. This position is for a Future New Business Opportunity.

We offer competitive compensation and an extraordinary benefits package including health, dental and vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more.

Essential Functions, Responsibilities & Duties may include, but are not limited to:
  • Provides advanced technical support and expertise for the Defense Health Agency's enterprise management systems, focusing on complex problem-solving and system optimization.
  • Serves as a top-tier escalation point for issues that cannot be resolved at lower support levels, addressing critical incidents that impact the DHA's global IT infrastructure, including military hospitals, medical clinics, and dental clinics.
  • Develops and implements advanced solutions for standard application integration, application security, application delivery, desktop engineering, mobile device engineering, end-user experience, and service monitoring functions.
  • Designs and maintains architectural and technical solutions for IT infrastructure systems, ensuring high availability, reliability, and security across the DHA's extensive network of physical and virtual servers, multiple sites, and numerous end-user devices.
  • Leads efforts in automation and scripting to improve system efficiency and reduce manual interventions.
  • Provides expert-level support for enterprise user data/profile management and associated resources.
  • Develops and implements standardized designs and solutions for directory services, Public Key Infrastructure (PKI), identity management, and access management systems.
  • Plays a key role in the preparation and deployment of policies, applications, and operating systems, including applicable upgrades.
  • Manages and optimizes the common system and monitoring framework for centrally deploying, supporting, and monitoring applications and systems.
  • Ensures all solutions align with DoD cybersecurity requirements, Risk Management Framework (RMF), and various DoD strategies including Zero Trust, ICAM, Digital Modernization, and Cybersecurity Reference Architecture.
  • Contributes to Configuration Management, Change Management, and Knowledge Management processes, developing technical documentation for all technical and presentation requirements.
  • Participate in the accreditation of operational environments and execution of governance processes to maintain security requirements.
Work Experience, Knowledge, Skills & Abilities:
  • Works independently, providing guidance to lower-tier support teams and collaborating with other high-level technical experts.
  • Must be prepared to support 24-hour operational requirements as needed and contribute to maintaining the stability and continuity of the DHA's IT workforce.
  • Bachelor's degree in Computer Science, Information Systems, or a related technical field. Advanced degree (Master's) preferred.
  • Relevant high-level certifications (e.g., CISSP, ITIL Expert, TOGAF) are highly desirable.
  • 8-10 years of progressive experience in enterprise IT management, with at least 5 years in a Tier 3 or equivalent senior technical role.
  • Should have extensive experience in managing complex, large-scale IT environments, preferably in military or healthcare settings.
  • Demonstrated expertise in advanced troubleshooting, system optimization, and implementation of enterprise-wide IT solutions is required.
Requirements:
  • Ability to obtain a Public Trust
Our Equal Employment Opportunity Policy

The company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race, color, religion, creed, ethnicity, sex, sexual orientation, gender or gender identity (except where gender is a bona fide occupational qualification), national origin or ancestry, age, disability, citizenship, military/veteran status, marital status, genetic information or…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary