Clearwaters.IT is seeking an experienced Cyber Defense Forensics Analyst Senior to support a program within the Department of Commerce. This role involves applying advanced forensic techniques and methodologies to detect, analyze, and mitigate threats. The analyst will perform hypothesis-based and intelligence-based cyber threat hunts, analyze large data sets, identify novel attack techniques, and work closely with other security teams to defend against potential intrusions. The position requires expertise in forensic evidence collection, intrusion analysis, and reporting to ensure that all cyber incidents are managed effectively and in accordance with federal rules and best practices. This position is contingent on award and requires 100% on-site in Washington D.C.
Responsibilities:
Identify threat tactics, methodologies, gaps, and shortfalls aligned with the MITRE ATT&CK Framework and the Azure Threat Research Matrix (ATRM).
Perform Hypothesis-based or Intelligence-based Cyber Threat Hunts to identify threats and risks within environments.
Use cloud-native techniques and methods to identify and create threat detections for automated response activities.
Use Agile methodology to organize intelligence, hunts and project status.
Able to independently research intelligence reports to find actionable data for conducting intel or hypothesis-based hunts.
Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers.
Conduct analysis of log files, evidence, and other information to determine the best methods for identifying the perpetrator(s) of a network intrusion.
Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.
Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes.
Provide a technical summary of findings in accordance with established reporting procedures.
Ensure that the chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.
Recognize and accurately report forensic artifacts indicative of a particular operating system.
Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).
Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, Engineering, or a related field is required. Master’s degree is preferred.
A minimum of 7 years of experience in cybersecurity, digital forensics, incident response or a related field is required.
Must be a U.S. citizen.
Certified Computer Examiner (CCE), Certified Forensic Computer Examiner (CFCE), Certified Information Systems Security Professional (CISSP), or other relevant certifications in digital forensics or cybersecurity are required. GIAC Cyber Threat Intelligence (GCTI), GIAC Network Forensics (GNFA), or similar certifications are a plus.
In-depth knowledge of cyber forensics and incident investigation techniques, with practical experience using forensic tools such as FTK, EnCase, and Volatility.
Proficient in threat detection, analysis of malware, and use of advanced threat intelligence platforms.
Expertise in forensic tools and techniques for data carving and analysis, including FTK, Foremost, and other digital forensics tools.
Knowledge of the MITRE ATT&CK Framework and Azure Threat Research Matrix (ATRM) to identify and analyze threat actors, tactics, and techniques.
Experience with cloud-native security practices and tools for threat detection and hunting in cloud environments.
Ability to work with large datasets, perform data correlation, and identify patterns indicative of security threats or intrusions.
Proficiency in using Agile methodologies to organize and manage tasks, track progress, and ensure timely delivery of threat intelligence and forensic analysis reports.
Excellent written and verbal communication skills, with the ability to clearly document findings, communicate technical issues, and present complex data to both technical and non-technical stakeholders.
Experience working within the federal government or a similar public-sector environment, with a focus on cybersecurity operations or digital forensics.
Competitive salary and benefits package, including:
...Job Skills / Requirements Unarmed Security Officers perform a variety of security-related duties depending on the post. Patrolling and... ...Must have a current and valid Maryland Unarmed Security Guard Card/permit knowledgeable of the security industry Must...
...be required to assist in lab and field tests of electronic systems. Familiarity with AS9100 is desirable. US Citizenship only.Belcan is an equal opportunity employer. Your application and candidacy will not be considered based on race, color, sex, religion, creed,...
...Job Title: Locum Tenens - Diagnostic Radiology/Nuclear Medicine Physician Location: Kentucky State Position Overview: Our team at Vitaly Health is looking for a Diagnostic Radiology/Nuclear Medicine Physician to join our Medical Center on an ongoing Locum Tenens...
...Domino's Pizza is seeking an enthusiastic and dedicated Assistant Manager to join our team at our 3988 Maryvile Rd location in Granite City, United States. As an Assistant Manager, you will play a crucial role in ensuring the smooth operation of our store, delivering...
...distribution. We currently operate over 100,000 sq. ft. of self-owned warehouses in Pomona and Irwindale, California with more locations on... ...-term partnerships and stable growth. We handle e-commerce and Amazon FBA operations for a wide range of clients, from small online...