Cyber Command Forensic Analyst
Location: Brooklyn NY
Duration: 2 Years
Work Model: Hybrid (3 days onsite / 2 days remote)
Scope of Services
The Cyber Command Forensic Analyst will be responsible for investigating network intrusions and cybersecurity incidents to determine the cause scope and impact of breaches. The role involves advanced digital forensic analysis incident response support and the enhancement of forensic methodologies and tools.
Responsibilities
Conduct investigations of network intrusions and cyber incidents determining root cause extent and operational impact.
Perform both host-based and network-based forensic analysis.
Research develop and enhance forensic techniques tools and procedures to improve investigative capabilities.
Produce clear concise and high-quality written reports explaining complex technical findings.
Manage and maintain forensic labs tools and analysis environments.
Ensure data collection preservation and handling meets industry best practices and evidence integrity standards.
Support the Cyber Emergency Response Team during major incidents and critical events.
Ensure all forensic activities align with established processes policies and legal requirements.
Mandatory Skills & Experience
Candidates must meet all mandatory qualifications to be considered.
Minimum 4 years of experience in Threat Management Digital Forensics and/or Incident Response.
Strong proficiency in performing digital forensic investigations across multiple operating systems and environments.
In-depth understanding of digital forensic methodologies incident response workflows and forensic tools.
Desirable Skills & Experience
Hands-on experience with forensic tools such as FTK X-Ways SIFT AXIOM EnCase etc.
Experience using memory analysis tools (e.g. Volatility MemProcFS).
Strong background in Linux and open-source forensic utilities.
Experience investigating incidents across Windows Linux/Unix and macOS operating systems.
Experience conducting forensic collections in cloud environments (AWS Azure GCP).
Knowledge of:
Evidence acquisition and assessment methods
Virtualization environments
Forensic imaging techniques
Windows artifacts and registry/data structures
Linux/Unix artifacts
macOS forensic artifacts
File systems and storage structures
Strong analytical problem-solving and investigative skills.
For more details reach at
About Navitas Healthcare LLC: It is a certified WBENC and one of the fastest-growing healthcare staffing firms in the US providing Medical Clinical and Non-Clinical services to numerous hospitals. We offer the most competitive pay for every position we cater. We understand this is a partnership. You will not be blindsided and your salary will be discussed upfront.
Required Experience:
IC
Cyber Command Forensic AnalystLocation: Brooklyn NY Duration: 2 Years Work Model: Hybrid (3 days onsite / 2 days remote)Scope of ServicesThe Cyber Command Forensic Analyst will be responsible for investigating network intrusions and cybersecurity incidents to determine the cause scope and impact of ...
Cyber Command Forensic Analyst
Location: Brooklyn NY
Duration: 2 Years
Work Model: Hybrid (3 days onsite / 2 days remote)
Scope of Services
The Cyber Command Forensic Analyst will be responsible for investigating network intrusions and cybersecurity incidents to determine the cause scope and impact of breaches. The role involves advanced digital forensic analysis incident response support and the enhancement of forensic methodologies and tools.
Responsibilities
Conduct investigations of network intrusions and cyber incidents determining root cause extent and operational impact.
Perform both host-based and network-based forensic analysis.
Research develop and enhance forensic techniques tools and procedures to improve investigative capabilities.
Produce clear concise and high-quality written reports explaining complex technical findings.
Manage and maintain forensic labs tools and analysis environments.
Ensure data collection preservation and handling meets industry best practices and evidence integrity standards.
Support the Cyber Emergency Response Team during major incidents and critical events.
Ensure all forensic activities align with established processes policies and legal requirements.
Mandatory Skills & Experience
Candidates must meet all mandatory qualifications to be considered.
Minimum 4 years of experience in Threat Management Digital Forensics and/or Incident Response.
Strong proficiency in performing digital forensic investigations across multiple operating systems and environments.
In-depth understanding of digital forensic methodologies incident response workflows and forensic tools.
Desirable Skills & Experience
Hands-on experience with forensic tools such as FTK X-Ways SIFT AXIOM EnCase etc.
Experience using memory analysis tools (e.g. Volatility MemProcFS).
Strong background in Linux and open-source forensic utilities.
Experience investigating incidents across Windows Linux/Unix and macOS operating systems.
Experience conducting forensic collections in cloud environments (AWS Azure GCP).
Knowledge of:
Evidence acquisition and assessment methods
Virtualization environments
Forensic imaging techniques
Windows artifacts and registry/data structures
Linux/Unix artifacts
macOS forensic artifacts
File systems and storage structures
Strong analytical problem-solving and investigative skills.
For more details reach at
About Navitas Healthcare LLC: It is a certified WBENC and one of the fastest-growing healthcare staffing firms in the US providing Medical Clinical and Non-Clinical services to numerous hospitals. We offer the most competitive pay for every position we cater. We understand this is a partnership. You will not be blindsided and your salary will be discussed upfront.
Required Experience:
IC
View more
View less