Cyber Host Forensic Analyst II jobs in United States
cer-icon
Apply on Employer Site
company-logo

Nightwing ยท 3 months ago

Cyber Host Forensic Analyst II

Nightwing is an intelligence solutions company providing advanced cyber and data operations support services. They are seeking a Cyber Host Forensic Analyst to assist with incident response and forensic investigations for government agencies experiencing cyber-attacks.

Information Technology & Services
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Acquiring/collecting computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements
Assessing evidentiary value by triaging electronic devices
Correlating forensic findings with network events to further develop an intrusion narrative
When available, collecting and documenting system state information (running processes, network connections, etc.) prior to imaging
Performing incident triage from a forensic perspective to include determining scope, urgency and potential impact
Tracking and documenting forensic analysis from initial involvement through final resolution
Collecting, processing, preserving, analyzing and presenting computer related evidence
Coordinating with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings
Conducting analysis of forensic images and other available evidence and drafting forensic write-ups for inclusion in reports and other written products
Assisting in documenting and publishing Computer Network Defense guidance and reports on incident findings to appropriate constituencies
Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report
Documenting original condition of digital and/or associated evidence by taking photographs and collecting hash information
Assisting team members in imaging digital media
Assisting in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems
Using hashing algorithms to validate forensic images
Working with mentor to identify and understand adversary TTPs
Assisting team members in analyzing the behaviors of malicious software
Under direct guidance and coaching if needed, locating critical items in various file systems to aid more senior personnel in their analysis
Performing analysis of log files from a variety of sources to identify possible threats to computer security
Using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions
Following proper evidence handling procedures and chain of custody protocols
Producing written reports documenting digital forensic findings
Determining programs that have been executed, finding files that have been changed on disk and in memory
Using timestamps and logs (host and network) to develop authoritative timelines of activity
Finding evidence of deleted files and hidden data
Identifying and documenting case relevant file-system artifacts (browser histories, account usage and USB histories, etc.)
Creating forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis
Performing all-source research for similar or related network events or incidents

Qualification

Cyber forensic investigationsForensic tools proficiencyEvidence handling proceduresCyber investigative reportsAnalysis of cyber attacksSystem security threatsCollaborative workTS/SCI clearanceDHS SuitabilityIdentifying attack classesProactive system analysisAll-source researchForensic image creationDigital evidence presentationWritten documentationTeam collaborationTechnical communicationTime management

Required

U.S. Citizenship
Must have an active TS/SCI clearance
Must be able to obtain DHS Suitability
2+ years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools
Ability to create forensically sound duplicates of evidence (forensic images)
Able to write cyber investigative reports documenting digital forensics findings
Experience with the analysis and characterization of cyber attacks
Experience with proper evidence handing procedures and chain of custody protocols
Skilled in identifying different classes of attacks and attack stages
Knowledge of system and application security threats and vulnerabilities
Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources
Must be able to work collaboratively across physical locations
BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree. Two years of related work experience may be substituted for each year of degree level education

Preferred

Experience with two or more of the following tools:--- EnCase--- FTK--- SIFT--- X-Ways--- Volatility--- WireShark--- Sleuth Kit/Autopsy--- Splunk--- Snort--- Other EDR Tools (Crowdstrike, Carbon Black, etc)
Experience with conducting all-source research
Desired Certifications: - GCFA, GCFE, EnCE, CCE, CFCE, CISSP

Company

Nightwing

twitter
company-logo
We are the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

Funding

Current Stage
Late Stage
Company data provided by crunchbase