Skip to Content

SCCM Security Consultant

Remote

SCCM Security Assessment Consultant

Ovoco is looking for independent consultants with deep Microsoft Configuration Manager (SCCM/MECM) expertise to join our security assessment practice.

We are building an SCCM security assessment offering that combines open-source tooling (ConfigManBearPig, BloodHound, Misconfiguration Manager) with CMDB-based remediation tracking. Most organizations treat SCCM as routine IT infrastructure, not as the Tier-0 attack surface it actually is. We help them see the difference.

The Work

  • SCCM infrastructure security assessments for federal agencies and enterprises
  • Running ConfigManBearPig and mapping findings to Misconfiguration Manager attack categories (CRED, ELEVATE, EXEC, RECON, TAKEOVER)
  • Identifying privilege escalation paths, credential exposure, and hierarchy takeover risks
  • Building remediation plans with persistent CMDB tracking
  • SCCM hardening guidance: HTTPS enforcement, PXE security, NAA replacement, client push restrictions
  • Active Directory attack path analysis using BloodHound

What We Are Looking For

  • Deep SCCM/MECM administration experience (site server management, hierarchy design, role configuration)
  • Understanding of SCCM security: network access accounts, client push installation, PXE boot, boundary groups, RBAC
  • Experience with BloodHound, SharpHound, or other AD attack path tools
  • Familiarity with the Misconfiguration Manager research or SCCM-specific offensive techniques
  • Pen testing, red team, or security assessment background
  • PowerShell proficiency

Federal clearances (Secret, TS, TS/SCI) are a strong plus for DOD engagements. Remote work is the default.

How It Works

You work as a 1099 independent consultant. You set your own rate and choose engagements that fit your availability. Ovoco handles the client relationships, contracts, scoping, and business development. You deliver the technical assessment work.

This is a new practice area for Ovoco. You would be shaping it from the ground up, not slotting into an existing process.