Solutions³ logo

Host Based Systems Analyst IV

Solutions³
Full-time
On-site
Arlington, Virginia, United States
$112,000 - $131,000 USD yearly

Title: Host Based Systems Analyst IV

Description: 
Solutions³ LLC is supporting our prime contractor and their U.S. Government customer on a large mission-critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber capabilities to address emerging threats. Solutions³ LLC provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. 

Solutions³ LLC is seeking an experienced Host Based Systems Analyst IV to provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility: 
  • Must be a US Citizen 
  • Must have an active TS/SCIclearance
  • Must be able to obtain DHS Suitability prior to starting employment  
  • 8+ years of direct relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools
Responsibilities Include: 
  • Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating data collection/acquisition operations
  • Providing technical assistance on data collection techniques and forensic investigative techniques to appropriate personnel when necessary
  • Writing in-depth reports, supports with peer reviews and provides quality assurance reviews for junior personnel
  • Supporting forensic analysis and mentoring/providing guidance to others on data collection, analysis, and reporting in support of onsite engagements
  • Assisting with leading and coordinating forensic teams in preliminary investigation
  • Planning, coordinating, and directing the inventory, examination and comprehensive technical analysis of computer systems and digital artifacts
  • Distilling analytic findings into executive summaries and in-depth technical reports
  • Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols
  • Tracking and documenting on-site incident response activities and providing updates to leadership throughout the engagement
  • Traveling to incident response locations in the United States, Territories & Possessions
  • Evaluating, extracting and analyzing suspected malicious code
Required Skills: 
  • Ability to create forensically sound duplicates of computer systems (forensic images)
  • Able to write cyber investigative reports documenting digital forensics findings
  • Experience with the analysis and characterization of cyber attacks
  • Experience with proper digital asset collection and preservation procedures and chain of custody protocols
  • Skilled in identifying different classes of attacks and attack stages
  • Knowledge of system and application security threats and vulnerabilities
  • Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources
  • Must be able to work collaboratively across physical locations
Desired Skills:  
  • Experience with or knowledge of two or more of the following tools: EnCase, SIFT, X-Ways, Volatility, WireShark, Sleuth Kit/ Autopsy, Magnet Axiom Cyber, Snort, Splunk or other SIEM Tools (ArcSight, LogRythm, Elastic, Etc.), Other EDR Tools (Crowdstrike, MDE, Trellix, Etc)
  • Proficiency with conducting all-source research
Desired Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP
Required Education: BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics experience