MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious
3

Senior Mobile Forensics Analyst

Location Washington, United States
Posted 09-September-2021
Description

ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We is seeking aSenior Mobile Forensics Analyst who is a motivated individual with strong technical competency that will research and implement detection measures using data from a wide spectrum of sources. The candidate will also perform opportunistic threat hunting and forensic analysis when required during incidents for a customer in the federal market. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

Roles and Responsibilities

Use Network and Host Based data to drive detection, monitoring, and response capabilitiesCreate detection analytics based off the MITRE ATT&CK Framework and other security frameworksPerform unique research on adversarial Tools, Techniques, and Procedures (TTPs)Aid the Ops Watch team in response to incidents by analyzing host behavior and network trafficAuthorized to view audit records on Central Log ServerAuthorized to view alerts of IDS/IPSAuthorized to modify auditable events on Central Log ServerOvertime may be required as needed to support incident response actions (Surge)

Required Skills

Experience, breadth and depth of knowledge of customermobile devices across the enterprise, whether attached to the network though network or controlled interface connection or as stand-alone devicesof mobile devices across the enterprise, whether attached to the network though network or controlled interface connection or as stand-alone devicesPerform advanced forensic analysis of suspected mobile system malicious activityPerform advanced network threat hunting to detect malicious or suspicious behavior on Agency on-premises and cloud-based networksRespond to incident response events by providing comprehensive findings and recommended remediation stepsConduct packet-level traffic analysis detect anomalies, trends, and patternsCreate, troubleshoot, configure and operate complex Scripting solutions with the ability to output the results in a variety of formats and to repurpose the results for reports targeting different technical levelsImplement and use cyber security frameworks including MITRE ATT&CKProvide advanced forensic analysis through testing of mobile devices and policiesFamiliarity with iOS or Android operating systemsKnowledge with digital exploitation and skills such as computer forensics, Document and Media Exploitation (DOMEX), reverse engineering, and malware analysisExperience designing, implementing and documenting computer forensics services to include evidence seizure, computer forensic analysis and data recoverySkill with malicious code reverse engineering to isolate, review, analyze, and reverse-engineer potentially malicious programs recovered from compromised mobile devices

Desired Skills

Research new trends, techniques, and packaging of malicious software to stay current and ready to identify and handle zero-day exploits.An in-depth understanding of computer forensic and cyber security principles including intrusion response and network monitoringAbility to understand hardware configuration and network/data communications, software development and scripting, and database technology and database exploitation/forensicsDemonstrated success and understanding of accepted frameworks such as, ISO/IEC 27001, COBIT, and NIST, including 800-53 and the Cybersecurity Framework Experience with forensic processes and procedures (chain of custody, computer acquisition techniques, and memory acquisition techniques)Determination of wrong doing facilitated by IT systems or mobile devicesMitigation for insider threat and disgruntled employee data lossMalicious code scans - before and after overseas travelHard drive forensicsIntellectual property theftMisuse and abuse cases (ie, viewing adult content, timecard fraud, etc.)Recovery of files (maliciously deleted or accidental)Misuse of computer equipment (USB, phones)Demonstrated ability to document processesExperience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA ArcherExperience utilizing commercial imaging tools such as Cellebrite and XRYReverse engineering or application tear-down experienceCompiles and maintains internal standard operating procedure (SOP) documentation.Participates in program reviews, product evaluations, and onsite certification evaluationsThe ability to solve problems independently

Education Requirement

Bachelors in Cybersecurity, Computer Science/Electrical Engineering, Engineering or IT

Years of Experience Requirement

5 Years of Cybersecurity experience with concentration in mobile forensics and Incident Response, and or practical experience performing mobile forensics

Desired Certification

Certified Cyber Forensics Professional (CCFP)Certified Computer Forensics Examiner (CCFE) from IACRBCertified Forensic Computer Examiner (CFCE) from IACISEnCase Certified Examiner (EnCE)AccessData Certified Examiner (ACE)GIAC Advanced Smartphone Forensics Certification (GASF)GIAC Certified Forensic Analyst (GCFA)GIAC Certified Forensic Examiner (GCFE)GIAC Network Forensic Analyst (GNFA)GIAC Certified Incident Handler (GCIH)GIAC Reverse Engineering Malware (GREM)Computer Hacking Forensic Investigator (CHFI)Certified Computer Examiner (CCE)

Location

Washington D.C.

Security Clearance

Top Secret with SCI Eligibility

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url