Digital Media/Computer Forensic SME

Adaptability, Apple, Art, Bash, CAN, CHFI, CISSP, COM, Computer, Computer forensics, Configuration management, Continuous integration, Cyber security, DMA, Digital media, DoD, ECSA, Email, EnCase, Engineering, Federal government, Forensic Toolkit, Forensics, GCFA, GCIH, Hardware, IT, Incident management, Information systems, Law enforcement, Leadership, Linux, Malware analysis, Microsoft Windows, Mobile, Mobile device forensics, Monitoring, OSCP, Penetration testing, Problem solving, Python, ROOT, Reasoning, Relationship building, Reporting, Research, Reverse engineering, SANS, Science, Scripting, Security, Security analysis, Self motivated, Software, Standard operating procedure, Supervision, Tier 3, Visual Basic, Windows PowerShell, Wireless communication
Contract W2, Contract Corp-To-Corp
Depends on Experience
Travel not required

Job Description

Our Ashburn VA based client is looking for Digital Media/Computer Forensic SME. If you are qualified for this position. Please email me your updated resume in word format to


Primary Responsibilities

The Digital Media/Computer Forensic SME will perform the following:

  • Utilize state of the art forensics tools(FTK/Encase,etc) to perform computer, mobile phone forensics and memory analysis (volatility, rekall)  in support of incident response. 
  • Conduct reverse engineering of suspicious files utilizing dynamic, automated and static analysis
  • Properly preserve evidence, maintain chain of custody and write malware analysis or forensic reports.
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
  • Install, secure, maintain and recommend forensic software and hardware within a Forensic Lab environment while following established configuration management processes.
  • Develop and build security content, scripts, tools, or methods to enhance forensic processes.
  • Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
  • Develop and maintain Standard Operating Procedures
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Strong problem solving abilities with an analytic and qualitative eye for reasoning under pressure
  • Ability to independently prioritize and complete multiple tasks with little to no supervision           


 Basic Qualifications

Candidates shall have a minimum of seven (7) years of professional experience performing digital media forensic analysis with tools such encase, ftk or cellebrite

Professional experience in the following areas:

Forensics on Windows, Linux and Mac

Mobile Device Forensics

Bachelor’s degree in Science or Engineering Field, IT, or Cybersecurity


Must Have One of the Following J3 Certifications

Tier 3 DMA:

GCIH – Incident Handler

GCFA – Forensic Analyst

GCFE – Forensic Examiner

GREM – Reverse Engineering Malware

GISF – Security Fundamentals

GXPN – Exploit Researcher and Advanced Penetration Tester

OSCP (Certified Professional)

OSCE (Certified Expert)

OSWP (Wireless Professional)

OSEE (Exploitation Expert)

CCFP – Certified Cyber Forensics Professional

CISSP – Certified Information Systems Security

CHFI – Computer Hacking Forensic Investigator

LPT – Licensed Penetration Tester

ECSA – EC-Council Certified Security Analyst


Windows Forensic Examinations – FTK WFE-FTK

Computer Incident Responders Course - CIRC

Windows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CI

Forensics and Intrusions in a Windows Environment -FIWE


 Preferred Qualifications

SANS GREM certification

Experience performing computer forensics in Federal Government, DOD or Law Enforcement 

Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell

Cyber Kill Chain Knowledge


Dice Id : baseone
Position Id : 6957668
Originally Posted : 1 month ago
Have a Job? Post it