Overview
Remote
Depends on Experience
Accepts corp to corp applications
Contract - Independent
Contract - W2
No Travel Required
Skills
Social Media
Virtual Team
Windows PowerShell
Regulatory Compliance
Reporting
Risk Assessment
Management
Microsoft Windows
Military
Network
Python
ROOT
Incident Management
Law Enforcement
Legal
Linux
Malware Analysis
Media
Digital Forensics
File Systems
Forensic Toolkit
Forensics
GCFA
Scripting
Acquisition
Collaboration
Communication
Cyber Security
Data Recovery
EnCase
Security Operations
Job Details
Job Title: Forensics Analyst
Location: Remote
Contract Duration: 6 Months
Employment Type: Contract
Position Overview:
We are seeking a skilled Forensics Analyst to join our remote team on a 6-month contract. The ideal candidate will be responsible for performing comprehensive digital forensic investigations involving system artifacts, memory, file systems, email, malware, and social media forensics. This role plays a crucial part in identifying, analyzing, and documenting cybersecurity incidents while maintaining the integrity of evidence throughout the investigative process.
Key Responsibilities:
- Conduct in-depth digital forensic analysis, including acquisition and examination of:
- Emails
- Memory dumps
- File systems
- Logs
- Registry
- User activity
- Malware samples
- Browser histories
- Social media activity
- Anti-forensic techniques
- Collect and preserve digital evidence following legal and procedural standards.
- Analyze and correlate digital artifacts to build timelines and understand incident root cause.
- Maintain and document a defensible chain of custody for all acquired data and devices.
- Prepare detailed and accurate incident reports, findings, and risk assessments for internal teams and stakeholders.
- Stay updated on emerging cyber threats, attack techniques, and digital forensic methodologies.
- Collaborate with security, legal, and compliance teams to support internal investigations and regulatory inquiries.
Required Qualifications:
- 3+ years of experience in digital forensics or incident response.
- Proficiency in forensic tools such as EnCase, FTK, Autopsy, X-Ways, Volatility, or Magnet AXIOM.
- Solid understanding of Windows, Linux, and Mac file systems, registry analysis, and network log interpretation.
- Experience with malware analysis, memory forensics, and data recovery techniques.
- Strong verbal and written communication skills, including technical reporting.
- Ability to manage sensitive investigations and maintain confidentiality.
Preferred Qualifications:
- Relevant certifications such as GCFA, GCFE, CCE, EnCE, or CFCE.
- Familiarity with scripting languages (e.g., Python, PowerShell) for automation or analysis tasks.
- Experience in law enforcement, military, or enterprise-level security operations a plus.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.