IS3 Solutions ยท 1 month ago
Cyber Command Forensic Analyst
IS3 Solutions is seeking a Cyber Command Forensic Analyst to investigate network intrusions and cyber incidents for their clients. The role involves researching and developing techniques for digital forensics, managing analysis labs, and assisting during critical incidents to determine the cause and extent of breaches.
Cyber SecurityData CenterInformation TechnologyIT Infrastructure
Responsibilities
Research and develop new techniques, and procedures to continually improve the digital forensics process
Produce high quality written work product presenting complex technical issues clearly and concisely
Managing and maintaining the analysis labs and forensics tools leveraged for investigations
Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements
Assisting the Cyber Emergency Response Team during critical incidents
Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based forensic analysis
Qualification
Required
Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools
Preferred
Experience with a wide range of forensic tools (FTK, X-Ways, SIFT, AXIOM, EnCase, etc.)
Experience with memory analysis tools (i.e. Volatility, MemProcFS)
Experience with Linux and open source tools
Experience investigating intrusions on Windows and Linux/Unix operating systems
Experience with performing forensics collections in cloud environments (AWS, Azure, GCP)
Knowledge of gathering, accessing, and assessing evidence from computer systems and electronic devices
Knowledge of virtual environments
Knowledge of forensic imaging techniques
Knowledge of Microsoft Windows operating system and Windows artifacts
Knowledge of Linux/UNIX operating systems and artifacts
Knowledge of macOS operating system and forensics artifacts
Knowledge of file systems
Strong analytical skills