The Cyber Forensic Analyst is responsible for assisting with analyzing all digital evidence, malware and malicious code found on any client or criminal investigation device. They are also responsible for conducting computer forensics evidence recovery,responding to investigative requests from within the agency, city, state and federal law enforcement agencies to retrieve information from computers and other types of data storage devices. The Cyber Threat Analyst will work to identify threat patterns and anomalous system behavior, reconstruct events based on analysis of malware, malicious code, network endpoint, and log analysis. The Cyber Forensics Analyst will work on a team in a dynamic,fast paced,security sensitive environment requiring excellent teamwork,reporting, and communication skills.
•Knowledge of security investigation techniques,the rules of evidence and practical experience of computer forensics
•In-depth technical knowledge of Windows,MacOS and Linux
•In-depth experience with security forensics and incident response
•Ability to analyze malware and obfuscated code
•Experience with scripting languages such as Python and Power Shell
•Strong verbal and written social skills
•Bachelor’s in Information Technology, Security or related degree or experience
•Demonstrated understanding of networking and application layer protocols
•Certification in information security: GREM,CCFE,GCIA,GCIH,CEH,CISSP, SSCP,is a plus
•Knowledge of common malware analysis and remediation sites and utilities
•Ability to perform malware reversal and analysis
•Excellent teamwork skills and ability to collaborate with a diverse team of skilled cybersecurity professionals
•Ability to document technical reports detailing computer evidence discovery and steps taken during the retrieval process
•Excellent working knowledge of all aspects of the computer including but not limited to hard drives, networking, and encryption
Cyber Forensic Analyst shall provide the following deliverable's in support of the client
Police & Emergency Management Security Technologies:
Conduct forensic investigations for the client on applicable social media and internet platforms and on all computing devices to include cell phones, computers, laptops, tablets and other computing devices.
Analyzes all malicious code, malware, viruses, worms etc. to determine key information to help in investigations, responses, remediation and future protection.
Perform Memory Forensics & Malware reverse engineering, analysis and extract Indicators of Compromise (IOCs). Investigate incidents using SIEM and other forensic tools
Key Deliverable: Analyze, escalate, and assist in remediation of critical information security incidents
Act as subject matter expert for analysis functions, providing support on more involved cases and guiding the activity of incident response analysts through collaboration.
Develop and support briefings to Security management as a cyber- forensic subject matter expert.468
Participate in cyber security incident response activities, including investigation, coordination, and reporting.
Key Deliverable: Assist in the collection and preservation of evidence associated with cyber security incident response activities following industry best practices and established procedures.