Contact Details:
Poonam Khandelwal
Email:
Cell:
Job Title: Cyber Command Forensic Analyst
Location: Brooklyn NY (Hybrid 3 days in office/2 days remote)
Duration: 48 months
Years of Experience: 8 years
Required Hours/Week: 35hrs/week
Job Description:
The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause extent and consequences of the breach.
- Research and develop new techniques and procedures to continually improve the digital forensics process.
- Produce high quality written work product presenting complex technical issues clearly and concisely.
- Managing and maintaining the analysis labs and forensics tools leveraged for investigations.
- Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements.
- Assisting the Cyber Emergency Response Team during critical incidents.
- Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based forensic analysis.
Mandatory Skills/ Experience:
Notes: Candidates who do not have the mandatory skills will not be considered.
Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools.
Desirable Skills/ Experience:
Experience with a wide range of forensic tools (FTK X-Ways SIFT AXIOM EnCase etc.)
Experience with memory analysis tools (i.e. Volatility MemProcFS)
Experience with Linux and open source tools
Experience investigating intrusions on Windows and Linux/Unix operating systems
Experience with performing forensics collections in cloud environments (AWS Azure GCP)
Knowledge of gathering accessing and assessing evidence from computer systems and electronic devices
Knowledge of virtual environments
Knowledge of forensic imaging techniques
Knowledge of Microsoft Windows operating system and Windows artifacts
Knowledge of Linux/UNIX operating systems and artifacts
Knowledge of macOS operating system and forensics artifacts
Knowledge of file systems
Strong analytical skills
Contact Details: Poonam Khandelwal Email: Cell: Job Title: Cyber Command Forensic Analyst Location: Brooklyn NY (Hybrid 3 days in office/2 days remote) Duration: 48 months Years of Experience: 8 years Required Hours/Week: 35hrs/week Job Description: The forensics Analyst will investiga...
Contact Details:
Poonam Khandelwal
Email:
Cell:
Job Title: Cyber Command Forensic Analyst
Location: Brooklyn NY (Hybrid 3 days in office/2 days remote)
Duration: 48 months
Years of Experience: 8 years
Required Hours/Week: 35hrs/week
Job Description:
The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause extent and consequences of the breach.
- Research and develop new techniques and procedures to continually improve the digital forensics process.
- Produce high quality written work product presenting complex technical issues clearly and concisely.
- Managing and maintaining the analysis labs and forensics tools leveraged for investigations.
- Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements.
- Assisting the Cyber Emergency Response Team during critical incidents.
- Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based forensic analysis.
Mandatory Skills/ Experience:
Notes: Candidates who do not have the mandatory skills will not be considered.
Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment
Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools.
Desirable Skills/ Experience:
Experience with a wide range of forensic tools (FTK X-Ways SIFT AXIOM EnCase etc.)
Experience with memory analysis tools (i.e. Volatility MemProcFS)
Experience with Linux and open source tools
Experience investigating intrusions on Windows and Linux/Unix operating systems
Experience with performing forensics collections in cloud environments (AWS Azure GCP)
Knowledge of gathering accessing and assessing evidence from computer systems and electronic devices
Knowledge of virtual environments
Knowledge of forensic imaging techniques
Knowledge of Microsoft Windows operating system and Windows artifacts
Knowledge of Linux/UNIX operating systems and artifacts
Knowledge of macOS operating system and forensics artifacts
Knowledge of file systems
Strong analytical skills
View more
View less