MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious
3

Mobile Forensic Analyst

Location Silver Spring, United States
Posted 10-September-2021
Description
Raytheon Intelligence & Space (RIS) - Cybersecurity, Training & Services (CTS) has an immediate opening for a Mobile Forensic Analyst to support a U.S. Federal Agency contract to enable mission accomplishment by investigating electronic data and digital devices in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts about the digital information. Responsibilities include obtaining, accessing, and analyzing data from hard drives, emails, smartphones, and tablets.

* An active TS clearance is required.

Work Location: National Capital Region (Rosslyn, VA)

Job Description:

Resolve highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Discover, analyze, diagnose, and report on malware events, files and network intrusion and vulnerability issues. Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems. Conduct reverse engineering for known and suspected malware files. Develop analysis and make recommendations for the purchase of hardware and or software that will mitigate malware intrusions. Develop policies and procedures to investigate malware incidents for the entire computer network. Assist in the development and delivery of malware security awareness products and briefings.

Responsibilities:

Shall perform specific activities that include, but not limited to the following:

* Perform advanced network threat hunting to detect malicious or suspicious behavior on Department on-premises and cloud-based networks
* Respond to security events received from CIRT, provide comprehensive findings and recommended remediation steps. Activities include the following:
* Advanced code analysis (eg reverse engineering of malicious code)
* Advanced traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns
* Perform forensic analysis of suspected systems (eg mobile devices, on and off premise network devices, and storage media) impacted by malicious activity

* Create, troubleshoot, configure and operate complex Scripting solutions with the ability to output the results in a variety of formats (eg HTML, XML, etc.) and to repurpose the results for reports targeting different technical levels (eg other analysts, management, etc.)
* Implement and use cyber security frameworks (eg MITRE-ATARC, Kill Chain, etc.)
* Provide advanced forensic analysis of Department-owned mobile devices (eg GFE) with abnormalities, assist in conducting testing of mobile devices and policies

Required Skills:

* Knowledge with digital exploitation and skills such as computer forensics, Document and Media Exploitation (DOMEX), reverse engineering, and malware analysis
* Experience designing, implementing and documenting computer forensics services to include evidence seizure, computer forensic analysis and data recovery
* Skill with malicious code reverse engineering to isolate, review, analyze, and reverse-engineer potentially malicious programs recovered from compromised mobile devices.
* Research new trends, techniques, and packaging of malicious software to stay current and ready to identify and handle zero-day exploits.
* An in-depth understanding of computer forensic and cyber security principles including intrusion response and network monitoring
* Ability to understand hardware configuration and network/data communications, software development and scripting, and database technology and database exploitation/forensics
* Demonstrated success and understanding of accepted frameworks such as, ISO/IEC 27001, COBIT, and NIST, including 800-53 and the Cybersecurity Framework Experience with forensic processes and procedures (chain of custody, computer acquisition techniques, and memory acquisition techniques)
* Determination of wrong doing facilitated by IT systems or mobile devices
* Mitigation for insider threat and disgruntled employee data loss
* Malicious code scans - before and after overseas travel
* Hard drive forensics
* Intellectual property theft
* Misuse and abuse cases (ie, viewing adult content, timecard fraud, etc.)
* HR/EEOC related cases
* Recovery of files (maliciously deleted or accidental)
* System sabotage
* Misuse of computer equipment (USB, phones)
* Exposure or loss of company property data
* Employee termination/RIF to analyze hard drive for data loss

* In-depth knowledge and familiarity of cyber forensic technologies
* Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity
* Demonstrated ability to document processes
* Proficiency with MS Office Applications
* Must be able to work collaboratively across teams and physical locations
* Willing to work rotating shifts

Required Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:

* Certified Cyber Forensics Professional (CCFP)
* AccessData Certified Examiner (ACE)
* GIAC Advanced Smartphone Forensics Certification (GASF)
* GIAC Certified Forensic Analyst (GCFA)
* GIAC Certified Forensic Examiner (GCFE)
* GIAC Network Forensic Analyst (GNFA)
* GIAC Certified Incident Handler (GCIH)
* GIAC Reverse Engineering Malware (GREM)
* Computer Hacking Forensic Investigator (CHFI)
* Certified Computer Examiner (CCE)
* Certified Computer Forensics Examiner (CCFE) from IACRB
* Certified Forensic Computer Examiner (CFCE) from IACIS
* EnCase Certified Examiner (EnCE)

Desire Skills:

* Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer
* Experience with firewalls, Routers or antivirus appliances
* Experience working on a 24x7x365 watch desk environment
* Experience with industry standard help desk tools

Desired Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:

* Certified Information Systems Security Professional (CISSP)
* GIAC Certified Incident Handler (GCIH)
* GIAC Certified Enterprise Defender (GCED)
* GIAC Security Expert (GSE)
* Certified Information Security Manager (CISM)
* Certified Ethical Hacker (CEH)
* GIAC Intrusion Analyst (GCIA)
* GIAC Cyber Threat Intelligence (GCTI)

Required Education (including Major):

Bachelor of Science Degree with major in Computer Science/Electrical Engineering, Engineering, Science or related field. Must have a minimum of 5+ years' experience or equivalent education and experience.

* US Citizen with active or ability to attain TS or TS/SCI clearance
* Occasional travel within CONUS and OCONUS is required

185814

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender orientation, gender identity, national origin, disability, or protected Veteran status.

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url