DE Jobs

Search from over 2 Million Available Jobs, No Extra Steps, No Extra Forms, Just DirectEmployers

Job Information

Fusion Technology LLC Incident Responder (ESOC) in Fairmont, West Virginia

Who is Fusion Technology? 

 

Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.  

 

Who are you? 

 

  • Security-cleared Professional: You are really trustworthy. You have an active Secret clearance and the ability to obtain and maintain an Interim Top Secret clearance. 

  • Seasoned Leader: You have four (4) years of experience working as a security guru in a security operations center (SOC) or relevant field. Experience in lieu of degree is also acceptable.  

  • Field Certified: You are a go-getter and an excellent test taker. You earned and maintain at least one of the following certifications: 

  • CERT Certified Computer Security Incident Handler 

  • Certified Ethical Hacker (CEH) 

  • Certified Information Systems Security Professional (CISSP) 

  • Global Information Assurance Certification (GIAC) Certified Incident Handler GCIH 

  • GIAC Information Security Fundamentals (GISF) Network+ 

  • Inquisitive: You’re well-versed in cybersecurity and it shows. You have a solid understanding of cyber landscapes and multiple types of typical threat and attack vectors. You like to problem solve incidents and remediated high-profile incident cases. 

  • Cyber Sleuth: You can track incidents like no one else against a framework such as MITRE ATT&CK or Cyber Kill Chain methodologies. 

  • Adaptable: You are not averse to working long hours. We don’t need you to work 24x7, but we do need you to be on-call following a fair rotation schedule. You will work on an on-call rotation for SOC escalation as needed for night and weekends. 

  • Specialized: You are a preferred candidate if you specialize in niche cybersecurity services. You know how to perform forensic investigation and malware analysis and can analyze malicious files through code analysis and reverse engineering.  

     

What we do: 

 

The National Oceanic and Atmospheric Administration (NOAA) is a bureau within the Department of Commerce (DOC) focused on understanding and predicting changes in the Earth's environment. The demand for NOAA’s products and information continues to grow as global climate change and the threat of natural disasters remain at the forefront of the Nation’s attention. Fusion Technology aims to protect the delivery of this critical demand by modernizing NOAA’s IT security infrastructure, increasing security awareness throughout the department, and coordinating security efforts with the intelligence community and stakeholders. 

 

What you’ll do: 

 

  • Prepare situational awareness reports for DOC, its bureaus, and/or DOC management 

  • Act as the main investigator for potential incidents identified by cyber analysts 

  • Work with DOC users to analyze, triage, contain, and remediate security incidents 

  • Communicate guidance to end users, DOC bureaus, and senior officials  

  • Identify process improvements and generate ideas to improve the Enterprise Security Operations Center (ESOC)’s capabilities  

  • Provide timely dissemination of information to the appropriate stakeholders  

  • Provide incident response related duties as assigned  

  • Analyze firewall logs, Full Packet Capture (PCAP), intrusion detection system (IDS) alerts, anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings 

  • Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, Orchestrator logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents 

     

Preferred skills/experience, but not required:  

 

  • Ability to perform deep dive investigations from start to finish of a security incident using data from both host-based and network-based devices  

  • Forensically investigate both Windows and Linux devices for compromise  

  • Ability to analyze malicious files through code analysis/reverse engineering  

  • Perform introspection of incident for after action reports to both technical and non-technical staff  

  • Ability to perform threat hunting  

  • Scripting capabilities  

  • Possess an understanding of SIEM and SOAR products  

     

What matters to you matters to us. 

 

Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, comprehensive Cigna healthcare plan, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training. 

 

Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills and experiences within our workforce. Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. 

Powered by JazzHR

DirectEmployers