2 days old

Cyber Security Forensic Scientist IV

Chantilly, VA 20151
Business Group Highlights

Intelligence

The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.

Responsibilities

The customer provides technical CI guidance on use of various technologies; enhances the CI posture and usability/applicability; provides critical CI guidance on infrastructure, networks and supply chain issues; conducts systems testing and evaluation and delivers technical support to investigations and insider threat issues. The Customer leverages technology, combined with subject matter expertise, to conduct these activities in support of the Customer as well as Intelligence Community partners and stakeholders.

The Customer is seeking a Cyber Forensic Analyst with a background in software engineering to support digital forensic analysis for the purpose of identifying CI issues to mitigate operational risks and to perform reverse engineering of various technologies. The Customer focuses on examinations of information technology media, mobile devices, network equipment, foreign technical gear assessing the equipment at all points along the hardware/software spectrum. The analyst will support the customer' s overall counterintelligence threat analysis efforts by performing technical assessments on.

Candidate will be required to work independently with little supervision and should be flexible to work and support IT Operation needs as requested. As the Cyber Security Forensic Analyst, the candidate may often find him/herself attending meeting at various other sites, and/or collecting/facilitating the gathering of customer requirements.

The following experiences are pre-requisites to meeting the mandatory requirements:

  • Experience with multiple OS's (Windows, Linux, and OSX)
  • Experience with various computer forensics and software reverse engineering tools

ADDITIONAL SECURITY REVIEW PROCESS Requirement

Qualifications

Required skills

  • Experience working complex data analysis, experience with analytical assessments of operational and technical data
  • Experience with data identification, reduction, and analysis to detect suspicious data types, special comms tools, modified software and/or other malicious content
  • Capable of imaging various types of electronic media (SSD/HDD, Thumb Drives, Volatile Memory, Compact Disks, etc.)
  • Experience with data extraction from various data sources including files, directories, unallocated space, raw images, custom databases (e.g. include parsing of data types necessary to extract metadata and content of forensic value)
  • Knowledge/understanding of system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data
  • Knowledge and familiarity with IC issues and environments
  • Hands on experience with multiple (Windows, Linux, Mac OSX, etc.) operating
  • Demonstrated Experience performing computer forensics and security analysis including use of commercial or specialty forensic tools (EnCase, FTK, X-Ways, Magnet IEF, BlackLight, etc.)
  • Understanding of network vulnerability analysis and penetration testing with both open source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, BackTrack,
  • Demonstrated on-the-job experience with programming skills with scripting languages such as Perl, Python, Bash, etc. is preferred.
  • Bachelor's Degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work Five+ years of network/cyber security experience in a secure environment.

Desired skills:

  • Knowledge and experience with the customer
  • Experience performing hands-on forensic review / reverse engineering of modern mobile devices (Google Android, Apple iOS, )
  • Experience working with virtualization software and virtualized environments (ESXi, VMWare, VirtualBox, )
  • Experience with both static and dynamic malware analysis/ ability to conduct analysis of identified malicious software/code
  • Experience reviewing and reverse engineering hardware, radiofrequency communication systems, and cellular network protocol structures
  • Demonstrated experience working with debuggers and disassemblers (OllyDbg, WinDbg, IDA Pro, Binary Ninja, )
  • One or more of the following Certifications
    • Certified Information Systems Security Professional (CISSP)
    • Certified Ethical Hacker (CEH)
    • Encase Certified Examiner (EnCE)

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.

Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.

Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed




As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)

Industry

  • Information Technology
Posted: 2019-11-09 Expires: 2019-12-08

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Sponsored by:
Farm Credit Services of America Logo
Sponsored by:
Bank of America Logo

Featured Jobs[ View All ]

Featured Employers

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cyber Security Forensic Scientist IV

Perspecta
Chantilly, VA 20151

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast