Title: Host Based Systems Analyst IV

Description: 
Our client is supporting Their prime contractor and their U.S. Government customer on a large mission-critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber capabilities to address emerging threats. They provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. 

They are seeking an experienced Host Based Systems Analyst IV to provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility: 

  • Must be a US Citizen 

  • Must have an active TS/SCIclearance

  • Must be able to obtain DHS Suitability prior to starting employment  

  • 8+ years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools

Responsibilities Include: 

  • Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operations

  • Providing technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessary

  • Writing in-depth reports, supports with peer reviews and provides quality assurance reviews for junior personnel

  • Supporting forensic analysis and mentoring/providing guidance to others on data collection, analysis, and reporting in support of onsite engagements

  • Assisting with leading and coordinating forensic teams in preliminary investigation

  • Planning, coordinating, and directing the inventory, examination and comprehensive technical analysis of computer systems and digital artifacts

  • Distilling analytic findings into executive summaries and in-depth technical reports

  • Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols

  • Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement

  • Traveling to incident response locations in the United States, Territories & Possessions

  • Evaluating, extracting and analyzing suspected malicious code

Required Skills: 

  • Ability to create forensically sound duplicates of computer systems (forensic images)

  • Able to write cyber investigative reports documenting digital forensics findings

  • Experience with the analysis and characterization of cyber attacks

  • Experience with proper digital asset collection and preservation procedures and chain of custody protocols

  • Skilled in identifying different classes of attacks and attack stages

  • Knowledge of system and application security threats and vulnerabilities

  • Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources

  • Must be able to work collaboratively across physical locations

Desired Skills:  

  • Experience with or knowledge of two or more of the following tools: EnCase, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/ Autopsy, Magnet Axiom Cyber, Snort, Splunk or other SIEM Tools (ArcSight, LogRythm, Elastic, Etc.), Other EDR Tools (Crowdstrike, MDE, Trellix, Etc)

  • Proficiency with conducting all-source research

Desired Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP
Required Education: BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics experience

Apply for position now