FutureTech Enterprise · Plano, TX
What I do
at work
A plain-English guide to my job as a Configuration Technician — for anyone who's ever wondered what I actually do all day.
The big picture
The one-sentence answer
I take brand-new laptops and desktops, configure every detail to exact client specifications, and certify they're ready before they ship to some of the most security-conscious organizations in the world.
Think of it like a custom car dealership, but for enterprise computers. The customer orders hardware. It arrives at our facility. I'm the person who opens the box, sets everything up exactly right — right down to firmware settings no normal user would ever see — and documents every step so there's a verifiable paper trail. Then it ships.
Industries served
The industries I configure computers for
My company's customers span some of the most regulated and technically demanding industries in the world. These aren't ordinary businesses — they build aircraft, satellites, radar systems, and critical infrastructure for government programs. The computers I configure end up in the hands of their engineers, analysts, and field technicians, often working with government data that carries strict federal handling requirements.
Aviation & Defense
Manufacturers of aircraft, spacecraft, radar, and advanced weapons systems. Navigate tough timelines and demanding compliance requirements.
Primary sector
Defense & Intelligence
Organizations building mission-critical systems for national security. Every device must meet strict security and documentation standards.
Primary sector
Defense Communications
Companies building communications and electronics technology for battlefield, space, and critical infrastructure environments.
Primary sector
Federal Systems Integration
Single-source IT solutions for government-aligned programs — from endpoint configuration to fully compliant work environments.
Primary sector
Aerospace Electronics
Manufacturers of avionics, safety systems, and precision electronics used in commercial and military aircraft worldwide.
Primary sector
Engineering & Infrastructure
Global engineering firms supporting government infrastructure programs. Devices often handle Controlled Unclassified Information (CUI) and require VPN-based domain enrollment and federal data compliance.
Primary sector
Each industry has its own rulebook. The same laptop configured for one client looks completely different inside than one configured for another — even if the hardware is identical.
The process
How a computer goes from box to customer
Every device I touch goes through a defined journey. I work in the middle — the most technical part of the whole process.
01
Order received
Customer places an order. S2K (our system) generates a Manufacturing Order (MO) — the job ticket.
Sales
02
Stock pulled
Warehouse pulls the right hardware from inventory and stages it on a pallet. Checked against the MO.
Warehouse
03
Configuration
I open the box, verify everything is correct, configure every hardware and software setting, image the OS, and document each step.
← This is me
04
QC check
A second technician independently verifies my work. Both of us sign off. The MO is closed in S2K.
Quality Control
05
Ship
Packaged, labeled, and handed off to the warehouse for shipment directly to the customer's facility.
Shipping
A typical day
What I actually do, step by step
No two orders are identical, but here's what a typical configuration job looks like from start to finish.
1
Receive the MO and pull the hardware
I get a Manufacturing Order — a printed job ticket with barcodes. It tells me what device, what customer, and exactly what needs to happen. I scan it into our inventory system (S2K) and physically pull the unit from the shelf.
2
Physical inspection and verification
Unbox the unit. Check for physical damage. Verify the serial number on the device matches the box and the MO. These numbers must all agree — if they don't, work stops until it's resolved.
3
BIOS configuration
Before installing anything, I go into the device's firmware (called BIOS/UEFI) — the deepest layer of the computer, below the operating system. Here I configure hardware-level settings: storage mode, security chip, network settings, boot behavior, and the device's permanent ID (asset tag). Each customer has a specific checklist. Wrong settings here can cause failures later.
4
Operating system imaging
I install a customized version of Windows configured specifically for that client. Depending on the engagement, this is done over the network — the computer downloads its operating system from our server — or via a dedicated USB drive. Either way, the process installs Windows, all drivers, and all required apps in one automated run.
5
Post-image verification and documentation
Once imaging completes, I verify everything: check that all software installed correctly, verify hardware is recognized, update any drivers, and run client-specific checks — including certificate verification for clients with strict security enrollment requirements. I document results on the MO and sign off.
6
Close out in S2K and hand off
I close the Manufacturing Order in our ERP system, triggering a second technician to independently QC my work. Once both of us have signed off, the device is packaged and handed to the warehouse for shipment.
The skillset
What I'm actually good at
This job requires a broad set of skills that sit at the intersection of IT, manufacturing, and quality control. Here's what I'm building expertise in.
🖥️
Enterprise hardware configuration
Configuring BIOS/UEFI firmware settings on Dell laptops and desktops. Every setting has a purpose and a consequence — I know what each one does and why it's set a specific way for each customer.
⚙️
OS deployment at scale
Deploying Windows operating systems using enterprise tools (SCCM, Autopilot). I work with network-based imaging, USB-based imaging, and cloud-based provisioning depending on the customer.
📋
Quality & compliance processes
Operating within a formal Quality Management System — following documented SOPs, performing two-tech QC checks, and maintaining paper audit trails that clients in regulated industries can inspect at any time.
🔍
Technical troubleshooting
When things go wrong (and they do), I diagnose issues using PowerShell scripts, Device Manager, disk management tools, and log files. Finding the root cause matters more than just restarting something.
📦
Inventory and order management
Working in S2K (an enterprise ERP system) to track units, process inter-location transfers, pick orders, and close manufacturing orders. Every physical movement of hardware has a corresponding transaction.
🔐
Security and device identity
Managing security chips (TPM), device certificates, asset tags, and enrollment in enterprise management platforms. Each device needs a verifiable, cryptographic identity before it goes to the customer.
The tools and technology
What I use every day
Most people think IT technicians just install Windows and call it a day. The technology involved is significantly more complex than that.
ERP System
S2K by Verde
Manufacturing Orders
Inventory management
Location tracking
OS Deployment
SCCM / MECM
Windows Autopilot
MDT (Microsoft Deployment Toolkit)
Client imaging portals
USB boot media
PXE network boot
Firmware
Dell BIOS / UEFI
Dell Command | Configure
Surface UEFI
TPM management
Security
BitLocker encryption
PKI Certificates
Active Directory
Microsoft Intune
Secure Boot
GlobalProtect VPN
Scripting
PowerShell
Command Prompt
DiskPart
Batch scripts (.bat)
Dell Command | Update
Compliance
CUI labeling (NIST 800-171)
VPN domain enrollment
Posture validation
Multi-domain AD environments
QMS document control
What makes it challenging
Why this isn't just "plugging in computers"
The job looks simple from the outside, but the stakes and complexity are real.
6+
Different customer playbooks
Every client has unique BIOS settings, software, naming conventions, and documentation requirements. Mixing them up means a rework — or a compliance failure.
Zero
Margin for error on identity
Serial numbers, asset tags, machine names, and certificates must match perfectly. If a device ships with the wrong identity into a regulated environment, it's a serious compliance problem.
100%
Audit trail required
Every step is documented. Procedures are version-controlled. Two technicians sign off on every job. This isn't optional — it's required by the compliance frameworks our clients operate under.
138
Pages of procedures to know
There's no room to guess. I follow precise documented procedures — but I also need to understand the underlying technology well enough to troubleshoot when things go wrong.
~30
Min bake time after imaging
After imaging, some devices need to sit and complete background processes before QC. Patience and process discipline are just as important as technical skill.
24h
SOP document expiry
Printed procedure documents expire in 24 hours. The controlled digital version is always the authority. This is how defense-grade document control works.
The computers I configure end up in the hands of engineers who design aircraft and satellites. Getting the configuration wrong isn't just an inconvenience — it can delay critical programs.
The bigger picture
Where this fits in the world
FutureTech sits inside a specific niche of the IT industry called IT asset lifecycle management for the defense supply chain. Our clients operate in some of the most regulated environments in the world — aerospace, defense communications, federal systems integration — and they're under strict government regulations about how their IT equipment is sourced, configured, and documented. FutureTech exists specifically to handle this for them at scale.
The computers I configure don't go to offices for spreadsheets and emails. They go to engineers running CAD simulations for aircraft, technicians operating radar systems, and analysts processing classified data. The configuration we apply — the firmware settings, the security chips, the certificates — isn't just IT hygiene. It's part of a security and compliance chain that ultimately traces back to government contracts.
That's what makes this job different from typical IT support work. Every decision I make is documented, auditable, and tied to a customer's quality management system. I'm not just configuring computers. I'm part of a verified supply chain.