Cyber Forensics Analyst
9615 Ashburn VA Non-specific Customer Site
Full Time Entry-level / Junior USD 81K - 146K
Leidos is seeking an experienced Cyber Forensics Analyst to join our team. As a member of this highly technical
digital forensics team supporting U.S. Customs and Border Protection (CBP), you will be responsible for in-depth
cyber forensics, root cause analyses, spillage investigations, and ensure chain of custody during incident investigations
in support of the protection of the customers’ systems, networks, and assets.
Primary Responsibilities:
The candidate shall provide support to CBP OIT’s Cyber Defense Forensics (CDF) team in support of insider threat
and security operations according to established policies, handbooks, and CBP CDF Standard Operating Procedures
(SOPs). This support includes monitoring activities, conducting threat analysis, investigating policy violations,
identifying mitigation and/or remediation courses of action, and assessing risk posed by trusted insiders. The main
focus of this task is to work with the OIT Data Loss Prevention (DLP) tools to process incidents, investigate spillages
of multiple types of classified and/or controlled data, conduct root cause analyses into suspicious or malicious activity,
and assist with SOC Incidents / OPR investigations as needed.
· Provide recommendations for Information Spillage Incident Response efforts on handling and sanitization
methods pursuant to industry best practices, NIST 800-88 recommendations, and Federal guidelines.
· Conduct enterprise and system(s) endpoint analysis (e.g., Windows, Linux, Mac, Cloud, and mobile systems)
and network based digital forensic analysis
· Conduct formal digital forensic investigations and document findings in formal, forensically sound investigation reports. ·
Perform Email hygiene activities in support of CBP investigations. · Support enterprise recovery efforts as necessary to ensure that security events and incidents are properly remediated prior to restitution. · Utilize state of the art forensic tools (FTK/Encase, etc) to perform computer, mobile phone forensics and memory analysis (volatility, rekall) in support of incident response. · Conduct reverse engineering of suspicious files utilizing dynamic, automated and static analysis. ·
Properly preserve evidence, maintain chain of custody and write malware analysis or forensic reports. ·
Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response. · Install, secure, maintain and recommend forensic software and hardware within a Forensic Lab environment while following established configuration management processes. ·
Develop and build security content, scripts, tools, or methods to enhance forensic processes. · Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership. · Develop and maintain Standard Operating Procedures (SOPs) and playbooks as deemed necessary.
Basic Qualifications: · Requires BS degree and 4-8 or more years of direct relevant experience. · Degree in computer science, IT, Information/Cyber Security field from an accredited college or university. ·
Flexible and adaptable self-starter with strong relationship-building skills ·
Effective communication skills with emphasis on attention to detail, ability to accurately capture and document technical remediation details, and ability to brief stakeholders on incident statuses, recovery and root causes. ·
Demonstrable experience performing forensic analysis, digital media analysis, and in-depth system & network log analysis in support of forensic investigations. ·
Ability to generate forensically sound cyber analysis reports detailing forensically sound analysis procedures, findings, and recommendations from incident investigations. ·
Strong problem-solving abilities with an analytic and qualitative eye for reasoning under pressure. ·
Ability to independently prioritize and complete multiple tasks with little to no supervision.
Preferred Qualifications: ·
Experience performing computer forensics in Federal Government, DOD or Law Enforcement environments. · Ability to script in one more of the following computer languages Python, Bash, Visual Basic or PowerShell. ·
Knowledge of the Cyber Kill Chain and MITRE ATT&CK framework · Advanced understanding of multiple Operating Systems, monitoring and detection techniques and methods, and Incident Response Lifecycle. ·
Prior experience with CBP/DHS · Between 2-3 years of experience in two or more of these specialized areas: · Insider Threat · Digital media forensic · Monitoring and detection · Incident Response Required certifications: The candidate should have at minimum ONE of the following certifications: · CompTIA Cyber Security Analyst (CySA+) · CompTIA Linux Network Professional (CLNP) · CompTIA Pentest+
Original Posting Date:
2024-07-02While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $81,250.00 - $146,875.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Tags: APT Bash Cloud CompTIA Computer Science Cyber defense Cyber Kill Chain DoD EnCase Forensics Incident response Linux Log analysis Malware MITRE ATT&CK Monitoring NIST PowerShell Python Reverse engineering SOC Windows
Perks/benefits: Equity / stock options Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Cybersecurity Engineer jobs
- Open Cloud Security Architect jobs
- Open Security Operations Engineer jobs
- Open Information Security Officer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Product Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Information System Security Officer (ISSO) jobs
- Open Information System Security Officer jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open DoD-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open TS/SCI-related jobs