Cyber Defense Forensics Analysts - Mid

Posted 6 Days Ago
Be an Early Applicant
Washington, DC, USA
In-Office
103K-118K Annually
Mid level
Artificial Intelligence • Cloud • Information Technology • Security • Software
The Role
The position involves performing cyber forensics, threat hunting, and developing defense techniques. Responsibilities include analyzing security threats, conducting forensic investigations, and applying the MITRE ATT&CK framework to enhance detection capabilities.
Summary Generated by Built In
Job Summary & Responsibilities

Everforth ECS is seeking a Cyber Defense Forensics Analysts - Mid to work in our Washington, DC office. 


Position Summary: 

ECS Federal is a leading information security and information technology company in Washington, DC. We are looking to hire a mid-level Cyber Defense Forensics Analyst to support a full range of cyber security services on a long-term contract in Washington DC. The position is full time/permanent and will support a US Government civilian agency. The position is available immediately upon finding a qualified candidate with the appropriate background clearance. 


Security Clearance Requirement: 

  • Active Secret clearance 

Job Requirements: 

  • Strong written and verbal communication skills. 
  • Create detections and automation to detect, contain, eradicate, and recover from security threats. 
  • Develop new and novel defense techniques to identify and stop advanced adversary tactics and techniques. 
  • Perform forensics on network, host, memory, and other artifacts originating from multiple operating systems, applications, or networks and extract IOCs (Indicators of Compromise) and TTPs (Tactics, Techniques, and Procedures). 
  • Conduct proactive hunts through enterprise networks, endpoints, or datasets in order to detect malicious, suspicious, or risky activities that have evaded detection by existing tools. 
  • Solid knowledge of TCP/IP networking, and network services such as DNS, SMTP, DHCP, etc. 
  • Solid understanding of attacker tradecraft associated with email, app-based, cloud threats and the ability to apply defensive tactics to protect against threats. 
  • Good knowledge of operating system internals, OS security mitigations, understanding of Security challenges in Windows, Linux, Mac, Android & iOS platforms 
  • Experience using forensic tools (e.g., EnCase, Sleuthkit, FTK). 
  • Ability to perform deep analysis of captured malicious code (e.g., malware forensics). 
  • Skill in analyzing anomalous code as malicious or benign. 
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). 
  • Incorporate agile, threat intelligence-driven or hypothesis-based threat hunting, and the MITRE ATT&CK framework to identify and prioritize development of missing or ineffective detection capabilities to detect, prevent, and respond to cyber events originating from threat actors. 

Certifications/Licenses: 

  • Bachelor’s degree or higher 
  • 5+ years’ performing cyber threat hunting and forensics support for incident response. 
  • Certifications addressing identification of malicious system and user activity, incident response in an enterprise environment, timeline artifact analysis, timeline collection, timeline processing, volatile data collection, analysis of profiling of systems and devices, analysis of file and program activity, acquisition, preparation, and preservation of digital evidence, analysis of user communications, advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment (e.g., snort, bro), IDS rules (e.g., snort, bro), IPv6, network architecture and event correlation, network traffic analysis and forensics, or packet engineering. 
  • Active Secret clearance or higher 

Salary Range: $102,600 - $117,500

General Description of Benefits


Preferred Qualifications

Position Responsibilities: 

  • Identify threat tactics, methodologies, gaps, and shortfalls aligned with the MITRE ATT&CK Framework and the Azure Threat Research Matrix (ATRM). 
  • Perform Hypothesis-based or Intelligence-based Cyber Threat Hunts to identify threats and risks within environments. 
  • Use cloud-native techniques and methods to identify and create threat detections for automated response activities. 
  • Use Agile methodology to organize intelligence, hunts and project status. 
  • Be able to independently research intelligence reports to find actionable data for conducting intel or hypothesis-based hunts. 
  • Explore and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers. 
  • Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion. 
  • Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. 
  • Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes.  
  • Provide a technical summary of findings in accordance with established reporting procedures. 
  • Ensure that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence. 
  • Recognize and accurately report forensic artifacts indicative of a particular operating system. 
  • Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost). 
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. 

Skills Required

  • Bachelor's degree or higher
  • 5+ years' experience in cyber threat hunting and forensics support
  • Active Secret clearance or higher

ECS Compensation & Benefits Highlights

The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about ECS and has not been reviewed or approved by ECS.

  • Healthcare Strength ECS advertises multiple national-network medical plan options with HSA eligibility alongside dental and vision coverage. Coverage generally begins quickly and is paired with company-paid short- and long-term disability, adding stability to the health package.
  • Retirement Support A 401(k) with Safe Harbor and immediate vesting on employer contributions is emphasized, with an employer match available. Access to an employee stock purchase plan via the parent company provides an additional savings avenue.
  • Parental & Family Support Paid parental leave up to 30 days, adoption assistance, and other family-oriented leaves are highlighted. Feedback suggests these offerings add meaningful value beyond base pay for many roles.

ECS Insights

Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Fairfax, VA
2,129 Employees
Year Founded: 1993

What We Do

ECS, a segment of ASGN (NYSE: ASGN), delivers advanced solutions and services in cloud, cybersecurity, artificial intelligence (AI), machine learning (ML), application and IT modernization, and science and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence and commercial industries. ECS maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, ECS has more than 3,400 employees throughout the U.S. and has been recognized as a Top Workplace by The Washington Post for the last five years.

Similar Jobs

CrowdStrike Logo CrowdStrike

Consultant

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
2 Locations
10000 Employees
70K-95K Annually

MongoDB Logo MongoDB

Manager, Candidate Experience

Big Data • Cloud • Software • Database
Easy Apply
Remote or Hybrid
United States
5550 Employees
73K-143K Annually

CrowdStrike Logo CrowdStrike

Artificial Intelligence Engineer

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
USA
10000 Employees
125K-180K Annually

CrowdStrike Logo CrowdStrike

Sales Operations Analyst

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
USA
10000 Employees
70K-110K Annually

Similar Companies Hiring

Golden Pet Brands Thumbnail
Digital Media • eCommerce • Information Technology • Marketing Tech • Pet • Retail • Social Media
El Segundo, California
178 Employees
Kepler  Thumbnail
Fintech • Software
New York, New York
6 Employees
Onshore Thumbnail
Artificial Intelligence • Fintech • Software • Financial Services
New York, New York
60 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account