Army Golden Master (AGM) Software Engineer - Intermediate

Job ID 2025-8180
Job Locations
US-AZ-Fort Huachuca
Category
IT: Administrator / Analyst / Architect / Engineer
Type
Regular Full-Time

Overview

Empower AI is AI for government. Empower AI gives federal agency leaders the tools to elevate the potential of their workforce with a direct path for meaningful transformation. Headquartered in Reston, Va., Empower AI leverages three decades of experience solving complex challenges in Health, Defense, and Civilian missions. Our proven Empower AI Platform® provides a practical, sustainable path for clients to achieve transformation that is true to who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit www.Empower.ai.

 

Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company’s commitment to hiring and supporting active-duty and veteran employees.

Responsibilities

Empower AI: As an Army Golden Master (AGM) Software Engineer, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. You will be responsible for the Army Standard Software Baseline Configuration (SSBC) Program which currently produces the Army Golden Master (AGM), the mandatory software baseline configuration for the Army.

 

Highlights of Responsibilities:

  • Develop, update, and maintain the NETCOM Technical Authority (TA) that identifies minimum hardware requirements, operating systems and applications necessary to establish the baseline configuration for System Center computing systems for use throughout the Army, through CHESS.
  • Develop, create, test, validate and publish AGM operating system and software packages, including any required non-AGM applications and updates released by the AGM Program.
  • Coordinate with the Computer, Hardware, Enterprise, Software Solutions (CHESS) to determine the appropriate AGM packaging methods. The Contractor shall package and ship using continuous, accountable means provided by the Government, such as USPS, FEDEX and UPS to the vendors with AGM baselines for each cycle of the Consolidated Buy Program.
  • Replicate physical and electronic disk images and distribute to CHESS Consolidated Buy OEM vendors and Army’s designated software download portal and support the release of the AGM SIPR Token-based activation solution.
  • Generate and maintain a Microsoft Excel spreadsheet capturing unique CIs for the latest developments in security guidance (e.g., STIGs), including guidelines issued from Center for Internet Security (CIS), National Institute of Standard Technology (NIST), Defense Information Systems Agency (DISA), and National Security Agency (NSA) as they occur.
  • Provide IV&V test reports, IAW AGM Quality Management Plan, AGM Test Matrices and the Issue Tracker Log, for every AGM/SYSMAN software package and release for all operating systems both Office and Non-office IT, and associated application interoperability.
  • Create and maintain Requirements Documents for the AGM secure configuration baseline operating systems and applications.
  • Draft and maintain enterprise system documentation.
  • Conduct Change, Configuration, Release Management (CCRM) activities on a recurring basis.
  • Draft emerging technology or new capability fielding documentation.
  • Complete and upload into eMASS vulnerability scans using ACAS, and compliance scans (SCAP) to support RMF.
  • Develop artifacts including items such as documentation of system functionality, connectivity, data flows, PPSs, management concepts, security plan, and hardware/software configurations in support of system ATOs.
  • Update the eMASS POA&M for each capability.
  • Manage applicable system changes using both approved NETCOM document templates and the Configuration Management Data Base (CMDB).
  • Maintain standard baseline configuration within the ITEF.
  • Participate in technical information exchanges in various technical forums
  • Provide enterprise compliance analysis.
  • Provide and support data mining and data visualizations, including items such as dashboards, business intelligence, workflow diagrams, SharePoint Services sites, and customized queries and reports.
  • Test and identify system limitations and make recommended system improvements to optimize and enhance system functionality and performance
  • Support automated software delivery and configuration management of the computing environment.
  • Develop and release Cyber Tasking Order (CTO) POA&M mitigations that delineate the defense in depth measures taken to reduce the risk to the DoDIN-A infrastructure, data, and customers.
  • Develop system-specific technical key performance indicators (KPI) and analysis reports.
  • Draft enterprise system architectural diagrams.
  • Develop and maintain system diagrams, to include High Level Operational Concept Graphic (OV-1), Operational Resource Flow Description (OV-2), System Interface Description (SV-1), Systems Resource Flow Description (SV-2), or other required system interface diagrams.
  • As required support fielding activities.
  • Monitor capability incident queues, respond to > 95% of new incidents in accordance with minimum response times.
  • Generate monthly standardized reports of incident and problem management KPIs by capability.
  • Provide weekly in-depth discussions by capability on incident management performance utilizing Government provided dashboards
  • Provide Tier III support (break/fix) during normal duty hours and during call-back hours.
  • Coordinate and interface with the Global Cyber Center (GCC), Regional Cyber Centers (RCCs), Network Enterprise Centers (NECs), all echelons of the DoDIN-A and the Joint NetOps community, and product specialists to resolve incidents and problems.
  • Document all known errors, problems, and solutions discovered in the process of executing Tier-III break/fix operations.
  • Request and receive Government approval before escalating Tier-III incidents or problems to Tier-IV vendor support.
  • Draft technical guidance outlining step-by-step remediation procedures, targeted to a Tier-I/Tier-II user audience.

Qualifications

Minimum Requirements:

  • Secret Security Clearance
  • Microsoft 365 Certified: Fundamentals certification
  • Bachelor’s degree
  • 4 – 9 years of experience
  • Intermediate engineering in software development and coding experience using Java, Ruby, PHP or Python, Power Shell and XML and the integration of software automation tools.
  • Intermediate engineering in documenting designs, source code reviews and detailed technical specifications.
  • Intermediate engineering with ASP.NET Framework and C++ and understanding of Object-Oriented Design.
  • Intermediate engineering in Agile and Scrum methodologies, Information Architecture and Software Development Life Cycles (SDLC).
  • Intermediate engineering with commonly used application installation packaging tools and processes including tools such as Microsoft Installer (.msi), Advanced Installer, Visual Studio, that are compatible with Microsoft MCM deployments.
  • Basic knowledge of networking concepts, including common infrastructure, technologies, security, troubleshooting, and tools.
  • Basic knowledge of common operating systems, including Windows Desktop, Windows Server, or RedHat Linux.
  • Basic knowledge of virtualization technologies and software, such as VMWare or Hyper-V.
  • Basic knowledge of cloud technologies, such as Intune, Azure, and Amazon Cloud Services.
  • Intermediate knowledge in Microsoft Office tools, including Word, Excel, Outlook, Teams, and PowerPoint.
  • Intermediate knowledge in latest version of ITIL processes, with particular emphasis on Change, Release, and Configuration Management for enterprise systems.
  • Intermediate knowledge in latest version of ITIL processes, with particular emphasis on Incident and Problem Management for enterprise systems.
  • Intermediate experience providing direct technical support and troubleshooting to customers for complex IT-related issues.

 

Preferred Qualifications:

  • Microsoft 365 Certified: Endpoint Administrator Associate certification
  • Microsoft Certified Windows Server Hybrid Administrator Associate certification
  • Security+ certification or equivalent
  • ITIL v4 Foundations certification

Physical Requirements:

  • Sitting for long periods
  • Standing for long periods
  • Ambulate throughout an office
  • Ambulate between several buildings
  • Stoop, kneel, crouch, or crawl as required
  • Travel by land or air transportation 10% or less

About Empower AI

All hiring and promotion decisions at Empower AI are based on merit to bring the best talent available to contribute to our firm’s overall success. It is the policy of Empower AI not to discriminate against any applicant for employment, or employee because of age, color, sex, disability, national origin, race, religion, or veteran status. Empower AI is a VEVRAA Federal Contractor.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.