RadiantHire Solutions, Inc.
Host Based System Analyst
RadiantHire Solutions, Inc., Arlington, Virginia, United States, 22201
Title: Host Based Systems Analyst IV
Description:Our client is supporting Their prime contractor and their U.S. Government customer on a large mission-critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber capabilities to address emerging threats. They provide remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities.They are seeking an experienced
Host Based Systems Analyst IV
to provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.Eligibility:Must be a
US CitizenMust have an
active TS/SCI clearanceMust be able to obtain DHS Suitability
prior to
starting employment8+ years
of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic toolsResponsibilities Include:Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operationsProviding technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessaryWriting in-depth reports, supporting peer reviews and providing quality assurance reviews for junior personnelSupporting forensic analysis and mentoring/providing guidance to others on data collection, analysis, and reporting in support of onsite engagementsAssisting with leading and coordinating forensic teams in preliminary investigationPlanning, coordinating, and directing the inventory, examination and comprehensive technical analysis of computer systems and digital artifactsDistilling analytic findings into executive summaries and in-depth technical reportsServing as technical forensics liaison to stakeholders and explaining investigation details including forensic methodologies and protocolsTracking and documenting on-site incident response activities and providing updates to leadership throughout the engagementTraveling to incident response locations in the United States, Territories & PossessionsEvaluating, extracting and analyzing suspected malicious codeRequired Skills:Ability to create forensically sound duplicates of computer systems (forensic images)Able to write cyber investigative reports documenting digital forensics findingsExperience with the analysis and characterization of cyber attacksExperience with proper digital asset collection and preservation procedures and chain of custody protocolsSkilled in identifying different classes of attacks and attack stagesKnowledge of system and application security threats and vulnerabilitiesKnowledgeable in proactive analysis of systems and networks, including creating trust levels of critical resourcesMust be able to work collaboratively across physical locationsDesired Skills:Experience with or knowledge of two or more of the following tools: EnCase, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, Magnet Axiom Cyber, Snort, Splunk or other SIEM Tools (ArcSight, LogRhythm, Elastic, Etc.), Other EDR Tools (Crowdstrike, MDE, Trellix, Etc.)Proficiency with conducting all-source researchDesired Certifications:
GCFA, GCFE, EnCE, CCE, CFCE, CISSPRequired Education:
BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and
10+ years
of host or digital forensics experience
#J-18808-Ljbffr
Description:Our client is supporting Their prime contractor and their U.S. Government customer on a large mission-critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber capabilities to address emerging threats. They provide remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities.They are seeking an experienced
Host Based Systems Analyst IV
to provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.Eligibility:Must be a
US CitizenMust have an
active TS/SCI clearanceMust be able to obtain DHS Suitability
prior to
starting employment8+ years
of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic toolsResponsibilities Include:Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operationsProviding technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessaryWriting in-depth reports, supporting peer reviews and providing quality assurance reviews for junior personnelSupporting forensic analysis and mentoring/providing guidance to others on data collection, analysis, and reporting in support of onsite engagementsAssisting with leading and coordinating forensic teams in preliminary investigationPlanning, coordinating, and directing the inventory, examination and comprehensive technical analysis of computer systems and digital artifactsDistilling analytic findings into executive summaries and in-depth technical reportsServing as technical forensics liaison to stakeholders and explaining investigation details including forensic methodologies and protocolsTracking and documenting on-site incident response activities and providing updates to leadership throughout the engagementTraveling to incident response locations in the United States, Territories & PossessionsEvaluating, extracting and analyzing suspected malicious codeRequired Skills:Ability to create forensically sound duplicates of computer systems (forensic images)Able to write cyber investigative reports documenting digital forensics findingsExperience with the analysis and characterization of cyber attacksExperience with proper digital asset collection and preservation procedures and chain of custody protocolsSkilled in identifying different classes of attacks and attack stagesKnowledge of system and application security threats and vulnerabilitiesKnowledgeable in proactive analysis of systems and networks, including creating trust levels of critical resourcesMust be able to work collaboratively across physical locationsDesired Skills:Experience with or knowledge of two or more of the following tools: EnCase, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/Autopsy, Magnet Axiom Cyber, Snort, Splunk or other SIEM Tools (ArcSight, LogRhythm, Elastic, Etc.), Other EDR Tools (Crowdstrike, MDE, Trellix, Etc.)Proficiency with conducting all-source researchDesired Certifications:
GCFA, GCFE, EnCE, CCE, CFCE, CISSPRequired Education:
BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and
10+ years
of host or digital forensics experience
#J-18808-Ljbffr