Digital Forensics Analyst

Full Time
Arlington, VA
Areas of Interest: Digital Forensics, Investigation, Vulnerability Assessment and Management
report a problem
Overview

OVERVIEW: phia LLC is seeking highly skilled Digital Forensics Analyst to support a large Federal Security Operations Center (SOC) and its 24x7 SOC mission.

DUTIES:

  • The Digital Forensics Analyst performs a variety of highly technical analyses and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence.
  • Responsible for disseminating and reporting cyber-related activities, conducting vulnerability analyses and risk management of computer systems and recovering information from computers and data storage devices.
  • Use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files.
  • This expert is not only proficient in the latest forensic, response, and reverse engineering skills, but is astute in the latest exploit methodologies, including:
    • Recover information from computers and data storage devices. Analysts often work alongside law enforcement officers helping to solve cyber-crimes or find electronic evidence of other kinds of crime.
    • The role of the analyst is to recover data like documents, photos and e-mails from computer hard drives and other data storage devices, such as zip and flash drives, that have been deleted, damaged or otherwise manipulated. Analysts often work on cases involving offenses committed on the Internet (‘cyber-crime ‘) and examine computers that may have been involved in other types of crime in order to find evidence of illegal activity. As an information security professional, a computer forensic analyst may also use their expertise in a corporate setting to protect computers from infiltration, determine how a computer was broken into or recover lost files.
    • Computer forensic analysts use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files. They use their technical skills to hunt for files and information that have been hidden, deleted or lost. They help detectives and other officials analyze data and evaluate its relevance to the case under investigation. Analysts also transfer the evidence into a format that can be used for legal purposes (i.e. criminal trials) and often testify in court themselves.
  • The Digital Forensics Analyst performs a variety of highly technical analyses and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence.
  • Responsible for disseminating and reporting cyber-related activities, conducting vulnerability analyses and risk management of computer systems and recovering information from computers and data storage devices.
  • Use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files.
  • This expert is not only proficient in the latest forensic, response, and reverse engineering skills, but is astute in the latest exploit methodologies, including:
    • Recover information from computers and data storage devices. Analysts often work alongside law enforcement officers helping to solve cyber-crimes or find electronic evidence of other kinds of crime.
    • The role of the analyst is to recover data like documents, photos and e-mails from computer hard drives and other data storage devices, such as zip and flash drives, that have been deleted, damaged or otherwise manipulated. Analysts often work on cases involving offenses committed on the Internet (‘cyber-crime ‘) and examine computers that may have been involved in other types of crime in order to find evidence of illegal activity. As an information security professional, a computer forensic analyst may also use their expertise in a corporate setting to protect computers from infiltration, determine how a computer was broken into or recover lost files.
    • Computer forensic analysts use forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files. They use their technical skills to hunt for files and information that have been hidden, deleted or lost. They help detectives and other officials analyze data and evaluate its relevance to the case under investigation. Analysts also transfer the evidence into a format that can be used for legal purposes (i.e. criminal trials) and often testify in court themselves.
  • This position supports the HIRT ( Hunt & Incident Response Team)OVERVIEW: phia LLC is seeking highly skilled Digital Forensics Analyst to support a large Federal Security Operations Center (SOC) and its 24x7 SOC mission.
  • This position supports the HIRT ( Hunt & Incident Response Team)

DUTIES:
REQUIREMENTS
Level II or III

  • Effectively communicates to technical and non-technical audiences; influences others to comply with policies and conform to standards and best practices.
  • Contributes to the design and development to innovative research projects
  • Attends and participates in professional conferences to stay abreast of new trends and
  • Independently manages, plans, evaluates and advocates for compliance systems, plans, and
  • Bachelors Degree in relevant area of study and 3-9 years experience involving work
    directly related to listed skill areas.
    OR
  • Degrees from a designated CAE/IAE and 3-9 years of directly related experience
  • Possession and demonstrated application of relevant certifications
  • TOP SECRET with SCI eligibility
  • DODD 8570 certification
  • Strong team player with the ability to conduct daily duties autonomously
  • DHS Suitability (EOD)
  • Familiarity with NOC/SOC operations
  • Familiarity with Cyber Kill Chain innovations in the field of information systems.
  • Functions, and is responsible for the management of complex projects, programs, and initiatives with high threat and large scope;(e.g department or agency-wide), with on-going systems monitoring

Desired:

  • Additional Key Competencies identified for this role (for senior management
  • positions)
  • Leadership & People Management
  • Written & Oral Communication
  • Creative Problem Solving
  • Project/Program Management


WORK SCHEDULE: Shift
WORK LOCATION: Arlington, VA
TRAVEL: N/A
TELEWORK ELIGIBILITY: N/A
SECURITY REQUIREMENTS: TS with SCI eligibility

BENEFITS
phia LLC ("phia") is a Northern Virginia based, 8a certified small business established in 2011 with focus in Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, Information Assurance/Security, Compliance, Certification & Accreditation, Communications Security, Traditional Security, and Facilities Security. phia also provides cyber operations support functions such as: Program and Process Management, Engineering, Development, and Systems Administration that allows for Cyber Operations to efficiently integrate our customer’s missions and objectives. phia supports various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.

phia offers excellent benefits to enhance the work-life balance, these include the following:
  • Medical Insurance
  • Dental Insurance
  • Vision Insurance
  • Life Insurance
  • Short Term & Long Term Disability
  • 401k Retirement Savings Plan with Company Match
  • Paid Holidays
  • Paid Time Off (PTO)
  • Tuition and Professional Development Assistance



Share this job:

phia, LLC

phia, LLC is a Northern Virginia based, 8(a) certified small business established in 2011 focused on the Cybersecurity and Information Technology (IT) space. Functional areas include Cyber Intelligence, Cyber Defense (Detection & Prevention, Intrusion Analysis, Incident Handling/Response, Mitigation/Countermeasure Development and Execution, Forensic Media Analysis, Malware Analysis & Reverse Engineering), Cyber Architecture & Engineering, Cyber Capability Analysis, Cyber Policy & Strategy, Information Assurance, Compliance, Certification & Accreditation, Communications Security, and Personnel, Physical and Facilities Security. phia also provides cyber operations support functions such as Program Management, Process Management & Optimization, Software Development and Network & Systems Engineering and Administration. We provide support across the public (Defense, Intelligence and Federal Civilian) and private sectors.

Specialties
Cybersecurity, Cyber Operations, Cyber Analysis, Intrusion Detection/Prevention, Incident Response, Information Assurance, Forensic Media Analysis, Malware Analysis & Reverse Engineering, Cyber Intelligence, Information Technology, Security Architecture
Visit phia, LLC's Social Media pages:
Company Industry: Computer & Network Security
Company Type: Privately Held
Company Size: 11 - 50