This job ad has been posted over 60 days ago...
0
applicants
Forensic Analyst Senior Technical Specialist
at Peraton Virginia in Virginia (Published at 18-09-2021)
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Responsibilities
The candidate will provide forensic analyst expertise support to a United States Government (USG) customer and will be an active contributing member of a security vulnerability and computer forensic analysis team. The candidate must exercise excellent social acumen and operational judgment and be able to respond quickly to high priority tasking. The candidate must understand the importance of using tradecraft to minimize exposure. The candidate should have a comfort level with speaking as s/he may be required to brief assessments at various forums across the Intelligence Community. Furthermore, the ideal candidate will:
Conduct computer forensics and security vulnerability analysis using commercial-off-the-shelf (COTS) and/or customer provided tools,
Evaluate cloud services, web applications, and commercial-off-the-shelf software and hardware
Perform network traffic analysis of web services to analyze raw packet data for anomalies, Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
Provide management with discrepancy reports and end user documentation.
Communicate daily with program managers, management, customer representatives, and end users to ensure delivery of quality products.
Qualifications
Requires 12 to 15 years with BS/BA or 10 to 13 years with MS/MA or 7 to 9 years with Ph.D.
Bachelors degree (or equivalent) in Cybersecurity, Information Technology (IT), Electrical Engineering (EE), Computer Science, Computer Engineering, Information Security, or Computer Forensics
Demonstrated 11 years experience in three or more of the following: analysis, network engineering, networking security, offensive experience, technical collection, penetration testing, red taming, hardware engineering, software reverse engineering, and computer exploitation.
Proven proficiency with at least three (3) or more of the following: mobile device security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), software reverse engineering, computer forensics, network analysis, vulnerability assessment or malware forensics.
Demonstrated experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
Working knowledge of software development and some demonstrated proficiency in scripting and/or programming languages and database development
Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
Desired Qualifications:
MS degree in technical field
Experience within Intelligence Community (IC) community
Relevant Certifications: CCFP, GCIA, OSCP, CEH, CISSP, or Security+
Publications in peer-reviewed journals
Demonstrated familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and/or other forensic tools
Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis
Law Enforcement/Cyber Forensics experience
Demonstrated experience in performing post-incident computer forensics while maintaining proper chain of custody and without destruction of critical data.
BS Equivalent = Minimum 4 years of experience in Cybersecurity, IS, IA, IT, EE, Network engineering, Computer Science/Engineering, Computer forensics or related technical field. Experience used as equivalency for college degree must be in addition to other experience requirements
For Colorado Residents
Colorado Salary Minimum: $113,651.20
Colorado Salary Maximum: $242,944.00
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Responsibilities
The candidate will provide forensic analyst expertise support to a United States Government (USG) customer and will be an active contributing member of a security vulnerability and computer forensic analysis team. The candidate must exercise excellent social acumen and operational judgment and be able to respond quickly to high priority tasking. The candidate must understand the importance of using tradecraft to minimize exposure. The candidate should have a comfort level with speaking as s/he may be required to brief assessments at various forums across the Intelligence Community. Furthermore, the ideal candidate will:
Conduct computer forensics and security vulnerability analysis using commercial-off-the-shelf (COTS) and/or customer provided tools,
Evaluate cloud services, web applications, and commercial-off-the-shelf software and hardware
Perform network traffic analysis of web services to analyze raw packet data for anomalies, Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
Provide management with discrepancy reports and end user documentation.
Communicate daily with program managers, management, customer representatives, and end users to ensure delivery of quality products.
Qualifications
Requires 12 to 15 years with BS/BA or 10 to 13 years with MS/MA or 7 to 9 years with Ph.D.
Bachelors degree (or equivalent) in Cybersecurity, Information Technology (IT), Electrical Engineering (EE), Computer Science, Computer Engineering, Information Security, or Computer Forensics
Demonstrated 11 years experience in three or more of the following: analysis, network engineering, networking security, offensive experience, technical collection, penetration testing, red taming, hardware engineering, software reverse engineering, and computer exploitation.
Proven proficiency with at least three (3) or more of the following: mobile device security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), software reverse engineering, computer forensics, network analysis, vulnerability assessment or malware forensics.
Demonstrated experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
Working knowledge of software development and some demonstrated proficiency in scripting and/or programming languages and database development
Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
Desired Qualifications:
MS degree in technical field
Experience within Intelligence Community (IC) community
Relevant Certifications: CCFP, GCIA, OSCP, CEH, CISSP, or Security+
Publications in peer-reviewed journals
Demonstrated familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and/or other forensic tools
Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis
Law Enforcement/Cyber Forensics experience
Demonstrated experience in performing post-incident computer forensics while maintaining proper chain of custody and without destruction of critical data.
BS Equivalent = Minimum 4 years of experience in Cybersecurity, IS, IA, IT, EE, Network engineering, Computer Science/Engineering, Computer forensics or related technical field. Experience used as equivalency for college degree must be in addition to other experience requirements
For Colorado Residents
Colorado Salary Minimum: $113,651.20
Colorado Salary Maximum: $242,944.00
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Recent jobs at Peraton
-
21 Oct
Telecommunications Engineer/Analyst
Peraton,
Virginia -
27 Aug
AWS Cloud Engineer
Peraton,
Maryland -
27 Oct
Systems Administrator
Peraton,
Virginia -
30 Aug
Entry Level Operator
Peraton,
New York