Full-Time

Senior Cyber Security Analyst

Core One

Core One

No salary listed

No H1B Sponsorship

Chantilly, VA, USA

In Person

US Top Secret Clearance Required

Category
IT & Security (1)
Required Skills
Malware Analysis
WinDBG
Data Structures & Algorithms
iOS/Swift
VMWare
Android Development
Linux/Unix
Data Analysis
Requirements
  • Demonstrated experience in digital forensics and hands-on forensic reviews.
  • Proficiency in the use of forensic tools such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
  • Experience with evidence handling and imaging from various storage media.
  • Competence in data extraction and analysis from diverse data sources.
  • In-depth understanding of multiple operating systems (Windows, Linux, iOS, Android).
  • Experience with virtualization software and virtualized environments.
Responsibilities
  • Conduct hands-on forensic reviews of devices, including laptops and mobile devices, using open source or commercial forensic tools such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
  • Handle and image various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
  • Extract and analyze data from various sources, including files, logs, directories, unallocated space, raw images, and custom databases.
  • Parse data types to extract metadata and content of forensic value from diverse data sources.
  • Demonstrate expertise in multiple operating systems, including Windows, Linux, iOS, and Android.
  • Perform hands-on forensic reviews and reverse engineering of modern mobile devices such as Google Android or Apple iOS.
  • Work with virtualization software and virtualized environments, including ESXi, VMWare, or VirtualBox.
  • Conduct analysis of identified malicious software or code using both static and dynamic malware analysis.
  • Utilize debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
  • Understand system kernel-level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures.
Desired Qualifications
  • Programming skills using scripting languages such as Perl, Python, or Bash.
  • Familiarity with Sponsor’s enterprise and operational activities, technical development programs, information cybersecurity policies, and regulations.
  • Knowledge of risk management standards, CNSSP 1253, FIPS 140-2, 199, 200, and NIST SP 800-37, 800-39, 800-53.

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A