Host Based Cybersecurity Systems Analyst (TS/SCI)other related Employment listings - Arlington, VA at Geebo

Host Based Cybersecurity Systems Analyst (TS/SCI)

Introduction Information and Data are some of the most important organizational assets in today's businesses.
As a Security Consultant, you will be a key advisor for IBM's clients, analyzing business requirements to design and implement the best security solutions for their needs.
You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Your Role and Responsibilities In this exciting role, you will be responsible for:
Assessing evidentiary value by triaging electronic devices Correlating forensic findings with network events to further develop an intrusion narrative When available, collecting and documenting system state information (running processes, network connections, etc.
) prior to imaging Performing incident triage from a forensic perspective to include determining scope, urgency and potential impact Tracking and documenting forensic analysis from initial involvement through final resolution Collecting, processing, preserving, analyzing and presenting computer related evidence Coordinating with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings Conducting analysis of forensic images and other available evidence and drafting forensic write-ups for inclusion in reports and other written products Assisting in documenting and publishing Computer Network Defense guidance and reports on incident findings to appropriate constituencies Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report Assisting team members in imaging digital media Assisting in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems Using hashing algorithms to validate forensic images Under direct guidance and coaching if needed, locating critical items in various file systems to aid more senior personnel in their analysis Performing analysis of log files from a variety of sources to identify possible threats to computer security Using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions Determining programs that have been executed, finding files that have been changed on disk and in memory Required Technical and Professional Expertise US Citizenship Must have an active/current TS/SCI clearance to be considered for this position Must be able to obtain DHS Suitability 2
years of directly relevant experience in cyber forensic investigations using leading edge technologies and industry standard forensic tools Ability to create forensically sound duplicates of evidence (forensic images) Able to write cyber investigative reports documenting digital forensics findings Experience with the analysis and characterization of cyber attacks Experience with proper evidence handing procedures and chain of custody protocols Skilled in identifying different classes of attacks and attack stages Knowledge of system and application security threats and vulnerabilities Knowledgeable in proactive analysis of systems and networks, to include creating trust levels of critical resources Must be able to work collaboratively across physical locations Preferred Technical and Professional Expertise Experience with two or more of the following tools:
EnCase/FTK/SIFT/X-Ways/Volatility/WireShark/Sleuth Kit/Autopsy/GRR Experience with conducting all-source research.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.