22 hours

Cyber Forensic Examiner

Chantilly, VA 20151
Apply Now
Apply on the Company Site
Business Group Highlights

Intelligence

The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.


Responsibilities

Our Customer provides technical cyber guidance on use of various technologies; enhances the cyber posture and usability/applicability; provides critical cyber guidance on infrastructure, networks and supply chain issues; conducts systems testing and evaluation and delivers technical support to investigation and insider threat issues. The Customer leverages technology, combined with subject matter expertise, to conduct these activities in support of the Customer as well as the Intelligence Community partners and stakeholders. The customer is seeking a Cyber Forensic Examiner with a background in forensics to augment its digital forensics team. The examiner will provide support to the Customers cyber threat analysis efforts by performing technical assessments of media, mobile devices, network equipment, and technical gear from various origins.

The following experiences are pre-pre-requisites to meet the mandatory requirements/qualifications:

  • Experience with multiple OSs (Windows, Linux, and OSX)
  • Experience with various computer forensics and software reverse engineering tools

The candidate may be required to travel between assigned work location and other customer locations to participate in meeting with the customer and Intelligence Community agencies. Occasional CONUS or OCONUS travel may be required (<5%). The candidate will be located in Chantilly or McLean.

Additional security review process requirement: all personnel coming into the organization undergo an additional security review that may take anywhere from 7 business days to 30 days or more.


Qualifications

Required Qualifications:

  • Demonstrated experience performing computer forensics and security analysis, including the use of commercial or specialty forensics tools (EnCase, FTK, X-Ways, Magnet Axiom, BlackLight, etc.)
  • Demonstrated experience with debuggers and disassemblers (Ollydbg, WinDbg, IDA Pro, Binary Ninja, etc.)
  • Demonstrated experience performing forensic reviews and reverse engineering of mobile devices (Google Android, Apple iOS, Smart devices, Fitbits, etc.)
  • Experience with data extraction from various data sources including files, directories, unallocated space, raw images, and custom databases (e.g., parsing of data types necessary to extract metadata and content of forensic value)
  • Experience with data identification, reduction, and analysis to detect suspicious data types, covert communications tools, modified software and/or other malicious content
  • Experience imaging various types of electronic media (SSD/HDD, thumb drives, volatile memory, compact disks, etc.)
  • Experience working with complex datasets and making analytical assessments of operational and technical data
  • Experience working with virtualization software and virtualized environments (ESXi, VMWare, VirtualBox, etc.)
  • Knowledge/understanding of system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures
  • Knowledge of Intelligence Community issues and the cyber environment.
  • Ability to work independently with minimal supervision and demonstrate flexibility by supporting a variety of cases.
  • Requires a minimum of 10 years experience with bachelors degree in Computer Science, Engineering, IT, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.
  • Five+ years of network/cyber security experience in a secure environment.

Desired Qualifications:

  • Experience with static an dynamic malware analysis and ability to conduct analysis of identified malicious software/code
  • Experience reviewing and reverse engineering hardware, radiofrequency communication systems, and cellular network protocol structures
  • Programming skills withs scripting languages such as Perl, Python, Bash, etc. is preferred. Experience preparing operational correspondence using the customer's internal
  • One or more of the following certifications:
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • Encase Certified Examiner (EnCE)

Education-

BS 10-12, MS 8-10, Phd 5-7

Clearance- TS/SCi W/POLY


About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.

Perspecta is anAA/EEOEmployer - All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

As a government contractor, Perspecta abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).

Industry

  • Information Technology
Posted: 2021-04-20 Expires: 2021-05-20

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Sponsored by:
ADP Logo

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cyber Forensic Examiner

Perspecta
Chantilly, VA 20151

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast