Who is Fusion Technology?
Fusion Technology is a performance-driven HUBZone Small Business concern residing in the heart of the beautiful mountainsides of West Virginia, steps away from the Federal Bureau of Investigation's Criminal Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates our valuable resources to providing comprehensive IT services and solutions to mission-critical US Government programs and the Intel Community.
Who are you?
- Security-cleared Professional:You have made it through the process of receiving a United States government security clearance – congratulations! We know you are a trustworthy intel professional because you have an active Top Secret security clearance
- Education is important to us: You have a Bachelor’s Degree and/or advanced degree preferably in computer science, business management, or IT related discipline with 9 years of experience in a computer science or cybersecurity related field
- Experience is important to us:
- At least 7 years serving as an Information Systems Security Officer (ISSO) at a cleared facility
- Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WebInspect, Network Mapper (NMAP), and/or similar applications
- Certifications - Required to hold at least one of the following certifications:
- Certified Information Systems Security Professional (CISSP),
- Global Information Security Professional (GISP),
- CompTIA Advanced Security Practitioner (CASP),
- or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level III proficiency
- Additional requirement to hold at least one Security certification from AWS, Azure, or GCP:
- AWS Certified Security – Specialty
- (ISC)2 Certified Cloud Security Professional (CCSP)
- AWS Certified Solutions Architect – Associate
- AZ-500: Microsoft Certified: Azure Security Engineer Associate
- Google - Professional Cloud Security Engineer
What you’ll do:
Services to support IS Security performed by the Information System Security Officer (ISSO) at a minimum, shall consist of the following activities:
- Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
- Provide liaison support between the system owner and other IS security personnel
- Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
- Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
- Conduct required IS vulnerability scans according to risk assessment parameters
- Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
- Manage the risks to ISs and other Agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs)
- Coordinate system owner concurrence for correction or mitigation actions
- Monitor security controls for The Agency’s ISs to maintain security Authorized To Operate (ATO)
- Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
- Ensure changes to The Agency’s IS, its environment, and/or operational needs that may affect the authorization status are reported to the System Owner and IS Security Manager (ISSM)
- Ensure the removal and retirement of IS being decommissioned is in coordination with the System Owner, ISSM, and ISSR
- Leads Risk Management Assessment and Authorization (A&A) processes for systems in the Cloud
- Performs Cloud system risk assessments while enhancing their current process workflows and developing new processes
- Works with government and industry customers to provide cyber security expertise for an AWS or Oracle Cloud Infrastructure (OCI) program
- Demonstrate working in an operational environment where priorities change frequently
- Provide Information Assurance perspective and guidance during cloud
planning/discussions and provide security support with reach back to OCIO as needed.
- Recommend best practices with regards to information security, information assurance, and cloud cyber security
- Support making recommendations to leadership and developing a monitoring and event logging strategy in the cloud as The Agency considers future cloud migration efforts
What Matters To You Matters To Us.
Fusion Technology values its employees and works hard to ensure proper care for them and their families. We desire to compensate employees in a competitive, motivational, fair, and equitable way with other employers in the marketplace. Salary is only one component of employee compensation but an integral part of recruiting and retaining qualified employees. However, at Fusion Technology, we take a comprehensive approach and consider each employee's needs to tailor a compensation plan that provides financial security and peace of mind. Our competitive package includes a best-in-class matching 401K program, a comprehensive healthcare plan through Meritain, a competitive employer contribution to a health savings account, vision and dental plans, life insurance, short- and long-term disability, and personal leave, in addition to paid certifications and training.
Fusion Technology LLC is an Equal Opportunity Employer. We respect and seek to empower each individual and support the diverse cultures, perspectives, skills, and experiences within our workforce. Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.
Powered by JazzHR
EoJtCb1xud