Digital Forensics Analyst

Gunnison Consulting GroupAlexandria, VA
Hybrid

About The Position

This position is contingent upon a future opening with Gunnison. The Digital Forensics Analyst will perform network and media digital forensic investigations to support cybersecurity incident response, threat analysis, and enterprise security operations. This role involves conducting advanced threat hunting activities across enterprise infrastructure to identify malicious activity, indicators of compromise (IOCs), and persistent threats. The analyst will utilize industry-standard forensic, malware analysis, and incident response tools, techniques, and procedures to investigate cybersecurity events and security incidents. Responsibilities include analyzing malware, suspicious files, network traffic, and compromised systems to determine attack vectors, scope of compromise, and remediation recommendations. Proactive defense activities will be executed through IOC sweeps, host interrogation, and continuous threat hunting. The role also supports enterprise incident response by providing forensic analysis and technical findings, developing and maintaining standard operating procedures (SOPs), preparing detailed reports, and enhancing forensic processes and detection capabilities. Collaboration with security operations, incident response, and cybersecurity engineering teams is essential to strengthen enterprise detection, response, and defensive capabilities. This position also coordinates and supports insider threat investigations by collecting, analyzing, and preserving digital evidence.

Requirements

  • US Citizenship required
  • 5+ years digital forensics experience (Windows, Linux, macOS)
  • Experience with disk duplication, mobile forensics, malware analysis, and forensic toolsets
  • Experience with AWS, Azure, M365, CloudTrail, IAM logs, EDR, SIEM, packet capture
  • Ability to investigate Virtual Machines, CloudTrail, IAM logs.
  • Accepted certifications include: GCIH, GCFA, GCFE, GREM, GISF, GXPN, GCTI, GOSI, EnCase (EnCE, CFSR, ENCEP)
  • Ability to obtain and maintain a Public Trust.

Responsibilities

  • Perform network and media digital forensic investigations to support cybersecurity incident response, threat analysis, and enterprise security operations.
  • Conduct advanced threat hunting activities across enterprise infrastructure to identify malicious activity, indicators of compromise (IOCs), and persistent threats.
  • Utilize industry-standard forensic, malware analysis, and incident response tools, techniques, and procedures to investigate cybersecurity events and security incidents.
  • Analyze malware, suspicious files, network traffic, and compromised systems to determine attack vectors, scope of compromise, and remediation recommendations.
  • Execute proactive defense activities through IOC sweeps, host interrogation, and continuous threat hunting across systems operated by and on behalf of the organization.
  • Support enterprise incident response activities by providing forensic analysis, technical findings, and status updates in accordance with established incident response procedures and reporting timelines.
  • Develop, maintain, and update forensic analysis, malware analysis, and advanced threat hunting standard operating procedures (SOPs) and operational documentation.
  • Prepare detailed forensic and incident response reports documenting investigative findings, technical analysis, root cause, remediation actions, and lessons learned.
  • Develop and enhance forensic processes, detection capabilities, scripts, automation tools, and security content to improve investigative efficiency and threat detection.
  • Coordinate and support insider threat investigations by collecting, analyzing, and preserving digital evidence in accordance with organizational and legal requirements.
  • Produce recurring technical status reports and communicate investigative progress, trends, and risks to cybersecurity leadership and stakeholders.
  • Collaborate with security operations, incident response, and cybersecurity engineering teams to strengthen enterprise detection, response, and defensive capabilities.

Benefits

  • 3 weeks of Personal Leave your first year
  • 11 paid Holidays each year
  • 5 days of Flexible Time Off each year for approved training or certifications (self-study is ineligible)
  • 401(k) company match at 50% up to 10% of your salary
  • Medical, Dental and Vision Insurance
  • Life and Disability Insurance
  • Public Transportation Subsidies
  • Certifications and Training Allowance - Up to $5,000/year!
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service