Enable job alerts via email!

Cyber Defense Forensics Analyst

CACI International Inc.

Fort Wayne, Bellevue (IN, NE)

On-site

USD 70,000 - 110,000

Full time

20 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is on the lookout for a Cyber Defense Forensics Analyst to join their specialized team supporting critical national security missions. This exciting role involves conducting in-depth digital forensic examinations and analyses to support cyber incident responses and investigations. You will utilize advanced forensic tools and methodologies to recover data, perform malware analysis, and prepare comprehensive reports. The company fosters a collaborative and engaging workplace culture, emphasizing continuous professional development and training. If you are passionate about cybersecurity and eager to contribute to national security, this opportunity is perfect for you.

Benefits

Gamified cyber concepts
Team contests
Informative lunch-and-learn sessions
Opportunities to attend industry conventions

Qualifications

  • Must possess one of the required certifications like GCFA or GCFE.
  • 5+ years of cybersecurity experience with a focus on digital forensics.

Responsibilities

  • Conduct digital forensic analysis and evidence preservation.
  • Prepare detailed reports of forensic findings and collaborate with teams.

Skills

Digital Forensics
Incident Response
Malware Analysis
Analytical Skills
Problem-Solving
Communication Skills

Education

Bachelor's degree in Information Technology
Bachelor's degree in Cybersecurity
Bachelor's degree in Computer Science
Bachelor's degree in Digital Forensics

Tools

EnCase
FTK
Sleuth Kit
Volatility
Wireshark
Foremost

Job description

Cyber Defense Forensics Analyst

Job Category: Security

Time Type: Full time

Minimum Clearance Required to Start: TS/SCI

Employee Type: Regular

Percentage of Travel Required: Up to 10%

Type of Travel: Continental US

CACI is seeking a meticulous and experienced Cyber Defense Forensics Analyst to join our specialized team supporting the U.S. Strategic Command (USSTRATCOM) Cybersecurity Service Provider (CSSP). This pivotal role directly aligns with the DoD 8140 Cyber Workforce Framework work role for Cyber Defense Forensics Analyst (ID: 212) at the Advanced level. The successful candidate will conduct in-depth digital forensic examinations of various media to support cyber incident response, investigations, and threat analysis. Responsibilities include evidence acquisition, forensic analysis, malware forensics, data recovery, and detailed reporting. This position requires the ability to work rotating shifts as necessary to support 24/7 mission requirements.

The Opportunity:

Join a CACI team where the mission is critical, and the team culture is paramount. We are building a positive, fun, collaborative, and light-hearted environment focused on collective success and individual growth. Our leadership is committed to:

Culture: Fostering an engaging workplace through gamified cyber concepts (tabletop exercises, Backdoors & Breaches card game), team contests, informative lunch-and-learn sessions, active participation in local youth cyber programs, and opportunities to attend leading industry conventions like DEFCON and BSIDES.

Training: Championing life-long learning. We prioritize robust training programs aligned with your career goals and DoD requirements. Our leadership provides mentorship and resources to ensure continuous professional development, vital for mastering forensic techniques and tools.

Talent Management: Investing in your future. Every team member receives a detailed and fully customized Individual Development Plan (IDP). We facilitate cross-training and exploration of different roles within CACI, ensuring you remain challenged, engaged, and never bored.

This is more than just a job; it's an opportunity to apply your specialized forensic skills to critical national security investigations while growing within a supportive and cutting-edge environment.

Responsibilities:

As a Cyber Defense Forensics Analyst, you will perform comprehensive digital forensic analysis, including but not limited to:

  1. Digital Evidence Acquisition & Preservation: Perform forensically sound collection, imaging, and preservation of digital evidence from diverse media (hard drives, mobile devices, memory, logs) following strict chain of custody procedures and legal guidelines.
  2. Forensic Examination & Analysis: Conduct deep-dive forensic analysis of file systems (NTFS, FAT, EXT, etc.), operating systems (Windows, Linux, macOS), memory dumps, network traffic captures, and log files to identify intrusion artifacts, malware, and evidence of compromise. Perform timeline analysis, file signature analysis, and hash analysis.
  3. Data Recovery & Carving: Utilize data carving tools and techniques (e.g., Foremost, FTK) to recover deleted files, hidden data, and relevant artifacts from forensic images.
  4. Malware Forensics: Perform static and dynamic analysis of malware samples to understand their behavior, capabilities, indicators, and impact. Analyze anomalous code and identify obfuscation techniques.
  5. Tool Proficiency: Utilize industry-standard forensic tool suites (e.g., EnCase, FTK, Sleuth Kit), memory analysis tools (e.g., Volatility), binary analysis tools (e.g., HexEdit), and network analysis tools (e.g., Wireshark).
  6. Reporting & Documentation: Prepare detailed technical reports and summaries of forensic findings, adhering to established procedures and legal standards. Document analysis steps and conclusions clearly. Ensure reporting meets JFHQ-DODIN timelines per CJCSM 6510.01B.
  7. Collaboration & Support: Provide technical expertise on digital evidence matters to incident responders, analysts, and other stakeholders. Work with internal and external partners to improve overall security posture.
  8. Security Enhancement & Tuning: Analyze findings to identify security gaps and recommend improvements for security tools and configurations (tuning).
  9. Threat Hunting: Leverage forensic findings and techniques to proactively hunt for related malicious activity or previously undetected threats within the environment.
  10. Research & Development: Maintain knowledge of current forensic methodologies, anti-forensic techniques, malware trends, operating system internals, and legal/ethical considerations.
  11. Additional Duties: Perform other related duties as assigned by leadership to meet mission requirements and support USSTRATCOM objectives. Depending on experience and team structure, this role may involve working under direct supervision or potentially providing guidance, training, or supervision to others.

Qualifications:

Required Certifications (Must possess one):

  1. GIAC Certified Forensic Analyst (GCFA)

Conditional Alternative Certifications (Considered):

  1. GIAC Certified Forensic Examiner (GCFE)
  2. OpenText EnCase Certified Examiner (EnCE)

Education & Experience:

  1. Bachelor's degree (BS) in Information Technology, Cybersecurity, Computer Science, Digital Forensics, or a related technical field is required.
  2. A minimum of 5 years of relevant cybersecurity experience is preferred, with a strong emphasis on digital forensics, incident response support, or malware analysis.
  3. Experience working in a Security Operations Center (SOC), CSSP, or dedicated forensic lab environment is highly desirable.
  1. Expert-level knowledge of digital forensics principles, methodologies, evidence handling procedures, and legal considerations (e.g., chain of custody, rules of evidence).
  2. Deep understanding of operating system internals (Windows, Linux), file systems, memory structures, and network protocols (TCP/IP).
  3. Demonstrated proficiency with forensic tool suites (e.g., EnCase, FTK, Sleuth Kit), memory analysis tools, data carving tools, and malware analysis techniques.
  4. Strong analytical and problem-solving skills with meticulous attention to detail.
  5. Excellent written and verbal communication skills, capable of producing comprehensive forensic reports and explaining complex findings.
  6. Must be willing and able to work rotating shifts (days, evenings, nights, weekends, holidays) as required by mission needs.
  7. Must possess an active or be eligible to acquire Top Secret w/ SCI security clearance.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.