Mantech International - Herndon, VA

posted 3 days ago

Full-time
Herndon, VA
Professional, Scientific, and Technical Services

About the position

Transform the future of federal services with ManTech! Join a vibrant, diverse team committed to enhancing national security and public services through innovative tech. Since 1968, we've partnered with Federal Civilian sectors to deliver impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite your career and drive change. Your journey starts now-innovate and excel with ManTech! Become an integral part of a diverse team while working at an Industry Leading Organization, where our employees come first. At ManTech International, you'll help protect our national security while working on innovative projects that offer opportunities for advancement. We are seeking a highly skilled and motivated Cyber Security Forensics Analyst to join our team, providing crucial support to the Network Operations Security Center (NOSC). You will be responsible for conducting advanced digital forensics investigations, analyzing cyber threats, and developing strategies to mitigate risks. This role requires a deep understanding of cyber forensics, the MITRE ATT&CK framework, and the MITRE D3FEND framework.

Responsibilities

  • Lead and conduct complex digital forensics investigations, including data recovery, analysis, and reporting.
  • Utilize the MITRE ATT&CK framework and other techniques to identify, assess, and address cyber threats and vulnerabilities.
  • Apply the MITRE D3FEND framework to develop and implement defensive measures against cyber threats.
  • Collaborate with other cybersecurity professionals, law enforcement agencies, and intelligence organizations to share information and coordinate response efforts.
  • Conduct technical analysis against target systems and networks, identify vulnerabilities, and support the development of new exploitation techniques.
  • Analyze cyber activities to identify entities of interest, determine malicious behavior, and recognize patterns and linkages.
  • Conduct dynamic malware analysis and performing memory and dead-box forensics.
  • Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems.
  • Perform long-term and time-sensitive in-depth technical analysis of malicious code (malware), developing defensive countermeasures, and producing reports for dissemination.
  • Using static and dynamic methodologies for malware analysis, such as debuggers, disassemblers, and sandbox execution.
  • Write forensics and incident response reports, investigate computer attacks, and extract data from electronic systems.
  • Perform technical analysis on suspicious or unknown activities.
  • Draft and brief contract and government leadership, as needed.
  • Collaborate with the Splunk team to implement, enhance, or change existing use cases.
  • Assess scope of malware campaigns and determine necessary remediation actions.
  • Conduct remote compromise assessments and producing assessment reports.
  • Develop and maintain standard operating procedures (SOPs) and rules of engagement (ROE) templates.
  • Cross-train and mentor other forensic analysts and staff on analysis, tools, and reporting.

Requirements

  • An 8570 compliant certifications in IAT Level III
  • One of the following relevant certifications: GIAC Certified Forensic Analyst (GCFA), Certified Information Systems Security Professional (CISSP), or Certified Cyber Forensics Professional (CCFP)
  • A bachelor's degree in computer science, engineering, information technology, cybersecurity, or related field of study
  • A minimum of (9) nine years of progressively responsible experience in cyber security, incident response, or forensic investigations including malware analysis
  • Knowledge and experience with Threat Intel Frameworks (e.g. Cyber Kill Chain, MITRE ATT&CK, Diamond Model)
  • Demonstrated experience using EnCase, FTK, and Open-Source methods and tools to perform Computer forensic investigations
  • Experience with Splunk, CrowdStrike Falcon, Security Onion, EnCase, Axiom, FTK, Volatility, or Suricata
  • Proficient with Windows and Linux operating systems
  • Experience with network topologies and network security devices (e.g. Firewall, IDS/IPS, Proxy, DNS, WAF, etc).
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service