Threat Level: green Handler on Duty: Russ McRee

SANS ISC: InfoSec Jobs InfoSec Jobs

Watch ISC TV. Great for NOCs, SOCs and Living Rooms:

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Host Based Systems Analyst (Level II)
Company NAIS
Location Arlington, VA
Preferred GIAC Certifications GCIH, GCFA
Travel 5%
Salary $74K-$84K
Contact Name Josh Carlisle
Contact Email joshua.carlisle/at/
Expires 2020-10-31

Job Description

Host Based Systems Analyst (Level II)

These positions will be in support of the National Cybersecurity & Communications Integration Center’s (NCCIC’s) Hunt and Incident Response Team (HIRT) under the Department of Homeland Security (DHS).

Core Competencies:

Uses leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions
Follows proper evidence handling procedures and chain of custody protocols
Produces written reports documenting digital forensic findings
Determines programs that have been executed, finds files that have been changed on disk and in memory
Uses timestamps and logs (host and network) to develop authoritative timelines of activity
Finds evidence of deleted files and hidden data
Identifies and documents case relevant file-system artifacts (browser histories, account usage and USB histories, etc.)
Creates forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis
Performs all-source research for similar or related network events or incidents
Skill in identifying different classes of attacks and attack stages
Knowledge of system and application security threats and vulnerabilities
Knowledge in proactive analysis of systems and networks, to include creating trust levels of critical resources
Level II (Possess GCIH and GCFA) (4-6 years host investigations or digital forensics experience with a High school diploma; or a Bachelor’s degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with 2-4 years of host-based investigations or digital forensics experience) Proficiency at level II includes all skills defined at level I in addition to the following:

Acquires/collects computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements
Assesses evidentiary value by triaging electronic devices
Correlates forensic findings with network events to further develop an intrusion narrative
When available, collects and documents system state information (running processes, network connections, etc.) prior to imaging
Performs incident triage from a forensic perspective to include determination of scope, urgency and potential impact.
Tracks and documents forensic analysis from initial involvement through final resolution
Collects, processes, preserves, analyzes and presents computer related evidence
Coordinates with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings
Conducts analysis of forensic images and other available evidence and drafts forensic write-ups for inclusion in reports and other written products
Assists to document and publish Computer Network Defense guidance and reports on incident findings to appropriate constituencies
Job Type: Full-time

Pay: $74,000.00 - $84,000.00 per year