NavitsPartners
Job Title:
Forensics Analyst Location:
Remote Contract Duration:
6 Months Employment Type:
Contract
Position Overview:
We are seeking a skilled
Forensics Analyst
to join our remote team on a 6-month contract. The ideal candidate will be responsible for performing comprehensive digital forensic investigations involving system artifacts, memory, file systems, email, malware, and social media forensics. This role plays a crucial part in identifying, analyzing, and documenting cybersecurity incidents while maintaining the integrity of evidence throughout the investigative process.
Key Responsibilities: Conduct in-depth digital forensic analysis, including acquisition and examination of: Emails Memory dumps File systems Logs Registry User activity Malware samples Browser histories Social media activity Anti-forensic techniques Collect and preserve digital evidence following legal and procedural standards. Analyze and correlate digital artifacts to build timelines and understand incident root cause. Maintain and document a defensible
chain of custody
for all acquired data and devices. Prepare detailed and accurate incident reports, findings, and risk assessments for internal teams and stakeholders. Stay updated on emerging cyber threats, attack techniques, and digital forensic methodologies. Collaborate with security, legal, and compliance teams to support internal investigations and regulatory inquiries. Required Qualifications:
3+ years of experience in digital forensics or incident response. Proficiency in forensic tools such as
EnCase, FTK, Autopsy, X-Ways, Volatility, or Magnet AXIOM . Solid understanding of
Windows, Linux, and Mac file systems ,
registry analysis , and
network log interpretation . Experience with
malware analysis ,
memory forensics , and
data recovery
techniques. Strong verbal and written communication skills, including technical reporting. Ability to manage sensitive investigations and maintain confidentiality. Preferred Qualifications:
Relevant certifications such as
GCFA, GCFE, CCE, EnCE, or CFCE . Familiarity with scripting languages (e.g., Python, PowerShell) for automation or analysis tasks. Experience in law enforcement, military, or enterprise-level security operations a plus.
Forensics Analyst Location:
Remote Contract Duration:
6 Months Employment Type:
Contract
Position Overview:
We are seeking a skilled
Forensics Analyst
to join our remote team on a 6-month contract. The ideal candidate will be responsible for performing comprehensive digital forensic investigations involving system artifacts, memory, file systems, email, malware, and social media forensics. This role plays a crucial part in identifying, analyzing, and documenting cybersecurity incidents while maintaining the integrity of evidence throughout the investigative process.
Key Responsibilities: Conduct in-depth digital forensic analysis, including acquisition and examination of: Emails Memory dumps File systems Logs Registry User activity Malware samples Browser histories Social media activity Anti-forensic techniques Collect and preserve digital evidence following legal and procedural standards. Analyze and correlate digital artifacts to build timelines and understand incident root cause. Maintain and document a defensible
chain of custody
for all acquired data and devices. Prepare detailed and accurate incident reports, findings, and risk assessments for internal teams and stakeholders. Stay updated on emerging cyber threats, attack techniques, and digital forensic methodologies. Collaborate with security, legal, and compliance teams to support internal investigations and regulatory inquiries. Required Qualifications:
3+ years of experience in digital forensics or incident response. Proficiency in forensic tools such as
EnCase, FTK, Autopsy, X-Ways, Volatility, or Magnet AXIOM . Solid understanding of
Windows, Linux, and Mac file systems ,
registry analysis , and
network log interpretation . Experience with
malware analysis ,
memory forensics , and
data recovery
techniques. Strong verbal and written communication skills, including technical reporting. Ability to manage sensitive investigations and maintain confidentiality. Preferred Qualifications:
Relevant certifications such as
GCFA, GCFE, CCE, EnCE, or CFCE . Familiarity with scripting languages (e.g., Python, PowerShell) for automation or analysis tasks. Experience in law enforcement, military, or enterprise-level security operations a plus.