Cyber Command Forensic Analyst

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 2 Year(s)
No Travel Required

Skills

forensics Analyst
Threat Management
Forensics Investigations
Incident Response
FTK
X-Ways
SIFT
AXIOM
EnCase
Volatility
MemProcFS
AWS
Azure
GCP
Linux

Job Details

Title: Cyber Command Forensic Analyst Location: Brooklyn, NY Duration: 2 years Hybrid: Work location & Remote (3 days in office/2 days remote)

SCOPE OF SERVICES
The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause, extent and consequences of the breach.
TASKS:

Research and develop new techniques, and procedures to continually improve the digital forensics process.
Produce high quality written work product presenting complex technical issues clearly and concisely.
Managing and maintaining the analysis labs and forensics tools leveraged for investigations.
Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements.
Assisting the Cyber Emergency Response Team during critical incidents.
Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based forensic analysis.

MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered

Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools.

DESIRABLE SKILLS/EXPERIENCE:
Experience with a wide range of forensic tools (FTK, X-Ways, SIFT, AXIOM, EnCase, etc.)
Experience with memory analysis tools (i.e. Volatility, MemProcFS)
Experience with Linux and open-source tools
Experience investigating intrusions on Windows and Linux/Unix operating systems
Experience with performing forensics collections in cloud environments (AWS, Azure, Google Cloud Platform)
Knowledge of gathering, accessing, and assessing evidence from computer systems and electronic devices
Knowledge of virtual environments
Knowledge of forensic imaging techniques
Knowledge of Microsoft Windows operating system and Windows artifacts
Knowledge of Linux/UNIX operating systems and artifacts
Knowledge of macOS operating system and forensics artifacts
Knowledge of file systems
Strong analytical skills.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.