Cybersecurity Host Based Forensics Analyst (L4)
Solutions3 - Arlington, Virginia, United States, 22201
Work at Solutions3
Overview
- View job
Overview
Host Based Systems Analyst IV
Description:
Solutions LLC is supporting our prime contractor and their U.S. Government customer on a large mission-critical development and sustainment program to design, build, deliver, and operate a network operations environment, including introducing new cyber capabilities to address emerging threats. Solutions LLC provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Solutions LLC is seeking an experienced
Host Based Systems Analyst IV
to provide front line response for digital forensics/incident response (DFIR) and proactively hunt for malicious cyber activity. Eligibility:
Must be a
US Citizen Must have an
active TS/SCI
clearance Must be able to obtain DHS Suitability prior to starting employment 8+ years
of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools Responsibilities Include:
Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operations Providing technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessary Writing in-depth reports, supporting peer reviews, and providing quality assurance reviews for junior personnel Supporting forensic analysis and mentoring/providing guidance to others on data collection, analysis, and reporting in support of onsite engagements Assisting with leading and coordinating forensic teams in preliminary investigation Planning, coordinating, and directing the inventory, examination, and comprehensive technical analysis of computer systems and digital artifacts Distilling analytic findings into executive summaries and in-depth technical reports Serving as technical forensics liaison to stakeholders and explaining investigation details, including forensic methodologies and protocols Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement Evaluating, extracting, and analyzing suspected malicious code Required Skills:
Ability to create forensically sound duplicates of computer systems (forensic images) Able to write cyber investigative reports documenting digital forensics findings Experience with the analysis and characterization of cyber attacks Experience with proper digital asset collection and preservation procedures and chain of custody protocols Skilled in identifying different classes of attacks and attack stages Knowledge of system and application security threats and vulnerabilities Knowledgeable in proactive analysis of systems and networks, including creating trust levels of critical resources Must be able to work collaboratively across physical locations Desired Skills:
Experience with or knowledge of two or more of the following tools: EnCase, FTK, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, Snort, Splunk, or other EDR Tools (Crowdstrike, Carbon Black, etc.) Proficiency with conducting all-source research Desired Certifications:
GCFA, GCFE, EnCE, CCE, CFCE, CISSP Required Education:
BS in Computer Science, Cybersecurity, Computer Engineering, or related degree; or HS Diploma with
10+ years
of host or digital forensics experience.
Provide the level of Security Clearance you currently hold.* Do you understand the job responsibilities and feel you would be successful in executing these tasks? If yes, please be prepared to provide examples during an interview or email them in advance. Do you understand the required job skills and feel you have those skills? If yes, please be prepared to provide examples during an interview and/or email them in advance. Is the location shown in the Job Description within communicating distance for you? Assuming typical traffic patterns, the prime will not accept anyone more than 2 hours from the site location.* The client will require their own suitability process, which must be completed BEFORE an official start date can be determined. This process could take 4-6 weeks. Would this inhibit you from moving forward?* If you were referred to us by a Solutions team member or partner, please indicate here: #J-18808-Ljbffr