Cyber Host Forensic Analyst III

Nightwing Intelligence SolutionsSterling, VA
19dOnsite

About The Position

Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Host Forensics Analyst to support this critical customer mission.

Requirements

  • U.S. Citizenship
  • Must have an active TS/SCI clearance
  • Must be able to obtain DHS Suitability
  • 8+ years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools
  • Ability to create forensically sound duplicates of evidence (forensic images)
  • Able to write cyber investigative reports documenting digital forensics findings
  • Experience with the analysis and characterization of cyber attacks
  • Experience with proper evidence handing procedures and chain of custody protocols
  • Skilled in identifying different classes of attacks and attack stages
  • Knowledge of system and application security threats and vulnerabilities
  • Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources
  • Must be able to work collaboratively across physical locations.
  • BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics experience

Nice To Haves

  • Experience with or knowledge of two or more of the following tools:--- EnCase--- FTK--- SIFT--- X-Ways--- Volatility--- WireShark--- Sleuth Kit/Autopsy--- Splunk--- Snort--- Other EDR Tools (Crowdstrike, Carbon Black, Etc)
  • Proficiency with conducting all-source research.
  • GCFA, GCFE, EnCE, CCE, CFCE, CISSP

Responsibilities

  • Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating evidence collection operations
  • Providing technical assistance on digital evidence matters and forensic investigative techniques to appropriate personnel when necessary
  • Writing in-depth reports, supports with peer reviews and provides quality assurance reviews for junior personnel
  • Supporting forensic analysis and mentoring/providing guidance to others on data collection, analysis and reporting in support of onsite engagements.
  • Assisting with leading and coordinating forensic teams in preliminary investigation
  • Planning, coordinating and directing the inventory, examination and comprehensive technical analysis of computer related evidence
  • Distilling analytic findings into executive summaries and in-depth technical reports
  • Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols
  • Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement
  • Evaluating, extracting and analyzing suspected malicious code
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service