Digital Forensic Chief

, VA

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

BOOST LLC

BOOST provides outsourced back-office solutions for government contractors such as accounting, contracts, HR, recruiting & sourcing, and strategic pricing. Learn more.

View all jobs at BOOST LLC

Apply now Apply later

BOOST LLC is a dynamic management consulting firm that offers an array of government-compliant back-office solutions to support our teaming partners within the GovCon space. Our consultants are experts in the areas of Accounting, Contracts, Human Resources, Recruiting & Sourcing, and Strategic Pricing and our passion is to guide and propel our partners towards success within this competitive sector.

BOOST is partnering with a cleared small business that provides mission-critical, AI-driven cyber defense and reverse engineering solutions for U.S. Government clients to hire a Digital Forensic Chief. This opportunity is 100% onsite located in the Northern Virginia area.

Position Summary:

As the Digital Forensic Chief, you will serve as the senior authority on all aspects of digital forensics and incident response (DFIR) for sensitive, classified mission operations. You will acquire, preserve, and analyze digital evidence across host, network, mobile, and cloud systems, producing high-fidelity forensic products that stand up to legal and technical scrutiny. Your work will directly enable rapid threat containment and attribution under zero tolerance for mission failure. As a trusted senior leader, you will uphold mission-first, people-always values, mentoring junior analysts, driving readiness, and ensuring the highest levels of forensic excellence in support of national security.

Responsibilities:

  • Plan, execute, and lead forensically sound collections of disks, volatile memory, mobile devices, and cloud assets.

  • Acquire, preserve, and examine digital evidence across a variety of complex mission platforms while maintaining proper chain-of-custody.

  • Perform detailed timeline, registry, event, and log analysis to reconstruct attacker actions, exfiltration pathways, and persistence techniques.

  • Develop and maintain lab Standard Operating Procedures (SOPs), validation processes, and documentation for evidence-handling and toolchain controls.

  • Prepare detailed forensic reports, executive summaries, and briefings suitable for senior mission stakeholders and legal review.

  • Collaborate closely with hunt teams, incident response elements, and law-enforcement partners to coordinate containment, response, and attribution activities.

  • Provide expert-level testimony or technical briefings to support legal or investigative outcomes.

  • Evaluate and integrate emerging forensic and AI-enabled toolsets (e.g., Hayabusa) to maintain cutting-edge capabilities.

  • Mentor and guide junior analysts, while developing and leading tabletop exercises to maintain mission DFIR readiness.

Required Qualifications:

  • 12+ years of DFIR experience supporting classified, highly regulated, or mission-critical environments.

  • Advanced proficiency with industry-leading forensic suites (e.g., EnCase, X-Ways, FTK), open-source analysis frameworks, and hardware collection tools (e.g., Tableau write-blockers).

  • Certifications such as GCFA, CFCE, or CCE demonstrating advanced digital forensic expertise.

  • Deep knowledge of Windows, Linux, and mobile operating system internals.

  • Excellent technical writing, reporting, and oral briefing skills, including experience presenting findings to senior leadership and in legal testimony.

  • Proven ability to perform in high-stakes, zero-fail mission environments, with a clear mission-first, people-always mindset.

Preferred Qualifications:

  • Bachelor’s degree or higher in Computer Science, Computer Engineering, Cybersecurity, or a related field.

  • Experience performing cloud-based forensics in secure and hybrid architectures.

  • Familiarity with SIEM platforms (Splunk, Elastic) and threat-intelligence enrichment.

  • Scripting skills in Python, PowerShell, or similar to automate artifact parsing and triage workflows.

  • Background integrating forensic outputs into AI/ML-enabled detection or response pipelines.

  • Experience participating in joint operations with federal law enforcement or cross-agency task forces.

Clearance Requirement:

  • Active TS/SCI with Poly

Salary Range:

  • $245K-$256K (Salary commensurate with experience)

BOOST is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.

Apply now Apply later
Job stats:  1  0  0

Tags: CFCE Clearance Cloud Computer Science Cyber defense DFIR EnCase Forensics GCFA Incident response Linux Log analysis PowerShell Python Reverse engineering Scripting SIEM Splunk TS/SCI Windows

Perks/benefits: Competitive pay

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.