Digital Forensics Analyst

Portland, OR

UltraViolet Cyber

Evolve your security operations into your proactive risk reducing superpower through the combination of MDR with Red Teams that validate every alert.

View all jobs at UltraViolet Cyber

Apply now Apply later

Make a difference here.
UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams.
By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. 
The Digital Forensics Analyst will be responsible for conducting computer forensic investigations, data recovery, and electronic discovery. The support will include a variety of tasks in support of the forensics program. The team consists of 6 individuals with vast experience in threat intelligence, digital forensics, and incident response.
The position does require 6 days per month onsite in Portland, OR. Culture, team integration and team collaboration are key pieces to our success as a service provider.

What You'll Do:

  • Apply well known, substantiated and generally accepted principles in retrieving, recovering and preserving digital evidence.
  • Collect, examine, and perform thorough technical analyses of computer-related evidence/information such as magnetic media storage devices (floppy disks, hard disks, magnetic tapes, optical disks, memory cards, magnetic strip cards, and the like).
  • Use various forensic tools such as Encase or FTK to search for and prepare information and evidence.
  • Search a wide range of digital devices and computers with various operating systems such as Windows, Linux and UNIX. 
  • Retrieves, recovers, and preserves digital evidence.
  • Uses various host based forensic tools such as Encase or FTK to search for and prepare information and evidence.
  • Review operating practices and procedures to determine whether improvements can be made in areas such as workflow, reporting procedures, and/or expenditures.
  • Examines, and performs thorough technical analyses of computer-related evidence/information.
  • Prepares accurate clear and comprehensive reports of findings which can be understood by non-technical personnel. Provides advice and guidance in implementing IT security policies and procedures in the development and operation of network systems.
  • Interacts with other organizations and other agencies on forensics techniques to develop, implement, and coordinate forensics activities to protect systems and to monitor compliance.
  • Manages multiple threat analysis sources and their integration and use in the enterprise incident response teams.
  • Performs vulnerability research methodologies and sources.
  • Maintains and supports all forensically related equipment and software.

What You Have:

  • Experience leveraging Forensics ToolKit to perform remote image capturing post incident – they use FTK to host an image
  • Experience using Discovery Core to search user email for legal parties
  • Experience with Knowbe4
  • Experience leveraging Cellbrite for end-to-end Investigative Digital Intelligence (DI) Platform that provides the ability to collect and review, analyze and manage a range of digital evidence sources, including mobile phones, computers, cloud-based evidence and open-source information.
  • Experience using Axiom
  • Expertise in performing phishing investigations and asset discovery
  • Experience dealing with litigation, data preservation, and legal experience
  • Experience participating in Threat analysis
  • Prior work in government is desired
  • Threat Intelligence background is desired
  • Experience working with a Forensics sandbox for imaging, payload detonation, etc.

What We Offer:

  • 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed  
  • Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment)  
  • Group Term Life, Short-Term Disability, Long-Term Disability  
  • Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness  
  • Participation in the Discretionary Time Off (DTO) Program  
  • 11 Paid Holidays Annually 
We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable.
UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. 
If you want to make an impact, UltraViolet Cyber is the place for you!
Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  13  7  0

Tags: Cloud Compliance EnCase Forensics Incident response Linux Threat intelligence UNIX Windows

Perks/benefits: 401(k) matching Health care Insurance

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.