drjobs Host Based Systems Analyst IV

Host Based Systems Analyst IV

Employer Active

drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Alexander City - USA

Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Job Description

JOB DESCRIPTION

Host Based Systems Analyst IV to provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility:

  • Must be a US Citizen
  • Must have an active TS/SCI clearance
  • Must be able to obtain DHS Suitability prior to starting employment
  • 8 years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools

Responsibilities Include:

  • Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operations
  • Providing technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessary
  • Writing indepth reports supports with peer reviews and provides quality assurance reviews for junior personnel
  • Supporting forensic analysis and mentoring/providing guidance to others on data collection analysis and reporting in support of onsite engagements
  • Assisting with leading and coordinating forensic teams in preliminary investigation
  • Planning coordinating and directing the inventory examination and comprehensive technical analysis of computer systems and digital artifacts
  • Distilling analytic findings into executive summaries and indepth technical reports
  • Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols
  • Tracking and documenting onsite incident response activities and providing updates to leadership throughout the engagement
  • Traveling to incident response locations in the United States Territories & Possessions
  • Evaluating extracting and analyzing suspected malicious code

Required Skills:

  • Ability to create forensically sound duplicates of computer systems (forensic images)
  • Able to write cyber investigative reports documenting digital forensics findings
  • Experience with the analysis and characterization of cyber attacks
  • Experience with proper digital asset collection and preservation procedures and chain of custody protocols
  • Skilled in identifying different classes of attacks and attack stages
  • Knowledge of system and application security threats and vulnerabilities
  • Knowledgeable in proactive analysis of systems and networks to include creating trust levels of critical resources
  • Must be able to work collaboratively across physical locations

Desired Skills:

  • Experience with or knowledge of two or more of the following tools: EnCase SIFT XWays Volatility WireShark Sleuth Kit/ Autopsy Magnet Axiom Cyber Snort Splunk or other SIEM Tools (ArcSight LogRythm Elastic Etc.) Other EDR Tools (Crowdstrike MDE Trellix Etc)
  • Proficiency with conducting allsource research

Desired Certifications: GCFA GCFE EnCE CCE CFCE CISSP
Required Education: BS Computer Science Cybersecurity Computer Engineering or related degree; or HS Diploma and 10 years of host or digital forensics experience

Employment Type

Full Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.