Cyber Incident Response and Forensic Analyst (Senior)
Washington, DC
Full Time Senior-level / Expert Clearance required USD 63K - 147K *
cFocus Software Incorporated
Our exclusive ATO as a Service™ software & expert services automate FISMA RMF & FedRAMP compliance.
cFocus Software seeks a Cyber Incident Response Analyst (Senior) to join our program supporting US Courts in Washington, DC. This position has remote capabilities. This position requires an active Public Trust clearance and must meet 8570 requirements.
Required Qualifications include:
Required Qualifications include:
- 5 years of experience analyzing forensic artifacts, performing filesystem timeline analyses, and identifying intrusion root causes of operating systems (e.g., Windows, Linux, and macOS)
- 5 years of experience utilizing the following forensics tools:
- Magnet AXIOM to acquire, analyze, and report on digital evidence;
- SANS SIFT Workstation for disk/memory analysis, network forensics, and malware analysis;
- Encase to collect, analyze, and report on digital evidence;
- Velociraptor to collect and analyze data from multiple endpoints;
- KAPE (Eric Zimmerman’s tools) to collect and process files;
- SUMURI TALINO Workstations/Laptops
- Cellebrite
- Bi-Weekly Threat Assessment Reports (BTARs)
- Must have ability to perform required forensics/malware analyst duties, including:
- Create duplicates of evidence that ensure the original evidence is not unintentionally modified;
- Extracting deleted data using data carving techniques
- Performing static and dynamic malware analysis to discover indicators of compromise (IOCs)
- Must be able to work 80% (Monday thru Thursday) onsite at AOUSC office in Washington, DC
- One of the following certifications:
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Certified Incident Handler (GCIH)
- GIAC Continuous Monitoring (GMON)
- GIAC Defending Advanced Threats (GDAT)
- Splunk Core Power User
- Provides digital forensics and incident response support to the AOUSC Security Operations Center (SOC). Collects, analyzes, and evaluates forensic artifacts associated with threat activity against Judiciary networks. Products created by the analyst assist the SOC and the Courts in understanding the nature and impact of cyber incidents, allowing for informed decision making in prioritizing, addressing, and mitigating risk across the Judicial Branch of Government.
- Accept and respond to government technical requests through the AOUSC ITSM ticket (e.g., HEAT or Service Now) for advanced subject matter expert (SME) technical investigative support for real-time incident response (IR). IR includes cloud-based and non-cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (e.g., Zscaler).
- Create duplicates of evidence that ensure the original evidence is not unintentionally modified. AOUSC supplied procedures and tools shall be used to acquire the evidence.
- Analyze forensic artifacts of operating systems (e.g., Windows, Linux, and macOS) to discover elements of an intrusion and identify root cause.
- Perform live forensic analysis based on SIEM data (e.g., Splunk).
- Perform filesystem timeline analysis for inclusion in forensic report.
- Extract deleted data using data carving techniques.
- Collect and analyze data from compromised systems using EDR agents and custom scripts provided by the AOUSC.
- Perform static and dynamic malware analysis to discover indicators of compromise (IOC).
- Analyze memory images to identify malicious patterns using Judiciary tools (e.g. Volatility). Analysis results documented in forensics report.
- Additional forensics/malware analysis activities may include:
- Perform efficient and prioritized identification of cyber security threats and incidents with an emphasis on clear articulation of the potential threat(s) and actualized risks associated with such threats and incidents.
- Objectively measure reduction of adversary dwell time within judicial networks.
- Perform comprehensive analysis of security incidents for identification of root cause in support of detection improvements and risk mitigations.
- Image Duplication: Duplication of evidence for processing by multiple analysts. Requests received via AOUSC ITSM (Heat or Service Now)
- Deleted Files: Deleted files supplied to requestor.
- Advanced SME IR Reports: Timely Advanced SME IR Support for Priority 1 Security Events. SME actively participating in IR activities within 4 hours of request (7x24x365).
- Incident Reports: All forensic reports include a timeline. The timeline includes network, endpoint, and application events (if available). The report contains all data required, is free from errors in grammar, spelling, content, and submitted in the specified times that are stated in the deliverable section.
- Forensic Reports: Document the results of a forensic investigation. Report will include a table of contents, executive summary, timeline of events, and a conclusion.
- Malware Analysis Reports: Document the results of analyzing a specific malware specimen. Report shall include a table of contents, executive summary, technical details, indication of persistence mechanisms and a conclusion.
- Provide Weekly Reports to the AOUSC Program Manager that documents all activities, tasks, tickets and documents worked on.
- Document repeatable Standard Operation Procedures (SOPs) and playbooks for security use cases.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Analyst Jobs
Forensics Jobs
Incident Response Jobs
Tags: Active Directory Azure Business Intelligence Clearance Cloud DFIR DoDD 8570 EDR EnCase Forensics GCIA GCIH GIAC Incident response Linux MacOS Malware Monitoring SANS SIEM SOC Splunk Windows
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Systems Security Officer jobsInformation System Security Officer jobsSenior Cybersecurity Engineer jobsSenior Cloud Security Engineer jobsInformation Security Specialist jobsInformation Security Manager jobsSecurity Consultant jobsSenior Network Security Engineer jobsCyber Security Specialist jobsIT Security Engineer jobsSecurity Specialist jobsSenior Information Security Analyst jobsIT Security Analyst jobsSenior Cyber Security Engineer jobsSystems Engineer jobsSenior Penetration Tester jobsChief Information Security Officer jobsSystems Administrator jobsStaff Security Engineer jobsInformation System Security Officer (ISSO) jobsThreat Intelligence Analyst jobsSenior Product Security Engineer jobsSecurity Operations Analyst jobsPrincipal Security Engineer jobsInformation Systems Security Engineer jobs
Java jobsPowerShell jobsEncryption jobsDevSecOps jobsGDPR jobsIDS jobsSaaS jobsSplunk jobsIPS jobsTop Secret jobsSDLC jobsRMF jobsIntrusion detection jobsThreat detection jobsSQL jobsBash jobsActive Directory jobsOWASP jobsDoDD 8570 jobsCompTIA jobsDocker jobsITIL jobsGIAC jobsUNIX jobsCRISC jobs
Finance jobsClearance Required jobsCISO jobsTCP/IP jobsIndustrial jobsHIPAA jobsBanking jobsJavaScript jobsTerraform jobsOSCP jobsSANS jobsSOC 2 jobsVPN jobsMITRE ATT&CK jobsIT infrastructure jobsCCSP jobsSOAR jobsDNS jobsSOX jobsJira jobsPolygraph jobsData Analytics jobsGCIH jobsMachine Learning jobsNIST 800-53 jobs