Digital Forensics SOC Analyst III

Crownsville, MD, United States

DMI

DMI provides enterprise-grade, intelligent digital transformation services that simplify and scale technology to meet you where you are and support you as you grow.

View all jobs at DMI

Apply now Apply later

About DMI

DMI is a leading provider of digital services and technology solutions, headquartered in Tysons Corner, VA. With a focus on end-to-end managed IT services, including managed mobility, cloud, cybersecurity, network operations, and application development, DMI supports public sector agencies and commercial enterprises around the globe. Recognized as a Top Workplace, DMI is committed to delivering secure, efficient, and cost-effective solutions that drive measurable results. Learn more at www.dminc.com

About the Opportunity

DMI (Digital Management, LLC.) is seeking a Digital Forensics SOC Analyst III. The role will work closely with Government counterparts to provide support in cybersecurity incident response, mitigation, analysis, & information dissemination. Provide analysts Tier 3 support, systems, and network forensic investigation support for the Security Operations Center (SOC) activities.  Work as a technical leader within the State of Maryland DoIT SOC & responsible for maintaining the integrity of the cybersecurity related analysis. This role will be responsible for performing the following tasks:

 

Duties and Responsibilities:

  • Report to Director of Security Operations or his/her designee
  • Provide SOC Analyst Tier 3 escalation support
  • Plan, initiate, and conduct investigations for cybersecurity incidents response efforts
  • Perform forensic examinations on compromised systems
  • Understand and use forensic tools and techniques for cybersecurity incidents
  • Create forensic root cause and scope of impact analysis reports
  • Contribute to technical briefings on the details of forensics exams and report
  • Provide support in conducting malware analysis of attacker tools
  • Stay current on incident response and digital forensics skills, best practices, and tools
  • Train SOC analysts on usage of SIEM tools (Splunk), and basic event analysis
  • Develop rules and tune SIEM and related tools to streamline the event analysis done by the SOC
  • Assist developing new processes and procedures for SOC monitoring
  • Monitor networks for threats from external and internal sources
  • Analyze network traffic of compromised systems and networks
  • Correlate actionable security events from various sources
  • Review threat data and develop custom detection signatures
  • Gather and analyze threat intelligence data and conduct threat hunting
  • Understand cybersecurity attacks and tactics, techniques, and procedures (TTPs) associated with advanced threats
  • Communicate clearly with Government counterparts, and SOC customers
  • Development and implementation and operational and technical incident response processes, procedure, guidance, and standards
  • Ability to work outside of regular business hours, the role may require on-call support after regular business hours or weekends.

 

Qualifications

Education and Years of Experience: 

  • Bachelor’s degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or related scientific or technical discipline and 4+ years of experience. Associate degree and/or cyber courses/certifications or 5 years of experience in directly related fields may be substituted in lieu of bachelor’s degree

Required Skills/Certifications:

  • Hands-on experience with security monitoring and SIEMs tools - Splunk Enterprise Security is preferred
  • Demonstrated working knowledge of cyber forensics and incident handling best practice processes, procedures, standards, and techniques
  • Hands-on experience with forensics image capture tools i.e., FTK Imager, MAGNET ACQUIRE
  • Hands-on experience with system image/file system/registry forensics tools i.e., Encase, FTK, X-Ways, Magnet AXIOM, Sleuthkit, Access Data Registry Viewer, Registry Recon, or other)
  • Hands-on experience with PCAP analysis tools i.e., Wireshark, TCP Dump, Network Miner, Xplico, or other
  • Hands-on experience with memory forensics tools i.e., BlackLight, Volatility, SANS SIFT, Magnet RAM Capture, or FireEye Memoryze, CrowdStrike Crowd Response
  • Hands-on experience with Endpoint Detection & Response solutions - Tanium Threat Response, McAfee or other

Desired Skills/Certifications (Not Required): 

  • Practical hands-on experience with static in malware analysis
  • Hands-on experience with malware anti-forensics, obfuscation, packing techniques
  • Hands-on experience with malware Analysis - Miscellaneous dynamic & static analysis tools (IDA Pro, Ghidra, OllyDBG, WinHex, HexEdit, HexDump, PeSTudio, REMux, OLEDUMP)
  • Hands-on experience with Custom Signature Creation - YARA
  • Scripting/Programming experience - Python, Perl, C, C++, Go
  • Highly desired industry certifications include Certified Forensics Computer Examiner (CFCE), Computer Hacking Forensic Investigator (CHFI), GIAC Certified Forensic Examiner (GCFE), Certified Computer Examiner (CCE)
  • Relevant industry certifications such as Certified Ethical Hacker (CEH), GIAC Reverse Engineering Malware (GREM), Certified Reverse Engineering Analyst (CREA) etc.

Additional Requirements: Must be able to pass a Fingerprint background check.

 

Min. Citizenship Status Required: Must be a U.S Citizenship.

 

Physical Requirement(s): No Physical requirement needed for this position.

 

Location: Crownsville, MD/ Remote

Working at DMI

DMI is a diverse, prosperous, and rewarding place to work. Being part of the DMI family means we care about your wellbeing. Employees are valued for their talents and contributions. We all take pride in helping our customers achieve their goals, which in turn contributes to the overall success of the company.

 

Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information. US citizenship may be required for some positions.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: C CEH CFCE CHFI Cloud Computer Science CrowdStrike EnCase Forensics GCFE Ghidra GIAC GREM IDA Pro Incident response Malware Monitoring NetOps OllyDbg PCAP Perl Python Reverse engineering SANS Scripting SIEM SOC Splunk Threat intelligence TTPs

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.