Who is Fusion Technology?
Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.
Position Location: Herndon, Virginia (onsite required), will require shift work
Who are you?
Security-cleared Professional: You have made it through the process of receiving a United States government security clearance - congratulations! We know you are a trustworthy intel professional because you have an active DOD Secret Security Clearance or an Interim DOD Secret Clearance.
Education is important to us: You have a High School Diploma with 5 years of experience working in a SOC or NOC environment performing security event analysis.
Experience is important to us:
- Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks
- Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
- Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
- Advanced knowledge of common adversarial tactics, techniques, and procedures (TTPs)
- Ability to obtain suitability clearance from the Agency
Preferred Skills:
- Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network
- Experience with Splunk query language, PCAP analysis, Tanium threat response, IDS/IPS/firewall/security configurations and signature development
- Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
- Excellent verbal and written communications skills
- Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components
- Conceptual understanding of Windows Active Directory is also desired
- Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred
- Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment
Certifications: CYSA+, CEH, or equivalent
What you'll do:
The Sr Security Analyst will monitor and analyze security events and alerts reported on a 24x7 basis to identify and investigate suspicious or malicious activity, or other cyber events which violate policy. The analyst will be responsible for analyzing logs and events from any other device types which may send logs or events to the SOC in the future. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.). The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. The analyst will record all artifacts (i.e. emails, logs, documents, Uniform Resource Locators (URLs), screenshots, etc.) associated with all security events and incident investigations within the SOC's incident and tracking application.
What matters to you matters to us.
Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, a comprehensive healthcare plan through Cigna, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training.
Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills, and experiences within our workforce. Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.