Network Based Systems Analyst


Job Details

Who is Fusion Technology?

Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.

Who are you?

  • Trusted Employee: The Government trusts you and so do we. You possess an active Top Secret Clearance. You must also be able to obtain Department of Homeland Security (DHS) suitability.
  • Technology Expert: You have advanced knowledge of standard protocols, such as Internet Control Message Protocol (ICMP), Hypertext Transfer Protocol Secure (HTTP/S), Domain Network System (DNS), Secure Shell (SSH), Simple Mail Transfer Protocol (SMTP), Server Message Block (SMB), Network File System (NFS), and Transmission Control Protocol/Internet Protocol (TCP/IP). You have in-depth knowledge and experience of Wi-Fi networking. You also have great knowledge of network topologies, including Demilitarized Zone (DMZ's), Wide Area Network (WAN's), etc. You are used to working with various technology and system types, including Splunk (or other SIEM's) and MITRE Adversary Tactics, Techniques, and Common Knowledge (ATT&CK). You are proficient with network analysis software (e.g., Wireshark).
  • Integrity Preservation: You have substantial knowledge of network device integrity concepts and methodologies. Proficient with carving and extracting information from PCAP data, non-traditional network traffic (e.g., Command and Control), and with virtualized environments. You also have experience preserving evidence integrity according to standard operating procedures or national standards.
  • Knowledgeable: You have put in the hard work and earned a Bachelor of Science in Cyber Security, Computer Engineering, or related degree with 8+ years of experience. You may also have a High School diploma, as well as 10+ years of network investigations experience. You have 8+ years of experience in network investigations, as well as in-depth knowledge of CND policies, procedures, and regulations.
  • Field Certified: You are a go-getter and an excellent test taker. You earned and maintain at least one of the following certifications:
    • GIAC Certified Intrusion Analyst (GCIA)
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Network Forensic Analyst (GFNA)
    • CSSP Analyst
    • CSSP Incident Responder
    • Certified Ethical Hacker (CEH)
    • Sys Admin, Audit, Network, and Security (SANS)
What we do:

The Department of Homeland Security (DHS) is dedicated to responding to cyber incidents and hunting proactively for malicious cyber activity. The DHS centers its resources around securing the nation's infrastructure, and Fusion Technology aims to support this mission by providing advanced technical assistance, proactive hunting, and rapid onsite incident response utilizing host and network-based cybersecurity analysis capabilities.

What you'll do:
  • Assists the government lead in coordinating teams in preliminary incident response investigations
  • Assist the government lead with interfacing with the customer while on site
  • Determines appropriate courses of actions in response to identified and analyses anomalous network activity
  • Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations
  • Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies
  • Collects network intrusion artifacts (e.g., PCAP, domains, URI's, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents
  • Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information
  • Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support on site engagements
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
  • Identify and analyze anomalies in network traffic using metadata
  • Reconstruct a malicious attack or activity based on network traffic
  • Examine network topologies to understand data flows through the network


What matters to you matters to us.

Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, comprehensive Cigna healthcare plan, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training.

Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills, and experiences within our workforce.Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.





 Fusion Technology

 05/03/2024

 Arlington,VA