Sign Up Sign Up Log In Sign Up
This job has expired and you can't apply for it anymore. Start a new search.

Forensic/Malware Analyst - Fort Huachuca, AZ

Description

SAIC has contingent career opportunities for Forensic/Malware Analysts in  support an Army customer in Fort Huachuca, AZ. These positions are contingent upon contract award.

 

The Forensic Malware Analyst designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducts risk and vulnerability assessment at the network, system and application level. Conducts threat modeling exercises. Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy.

Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff. Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.

Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. May support cyber metrics development, maintenance and reporting. May provide briefings to senior staff.

Complete understanding and wide application of technical principles, theories, and concepts in the field. General knowledge of other related disciplines. Receives assignments in the form of objectives and establishes goals to meet outlined objectives. Provides direction to employees according to established policies and management guidance.

Provides technical solutions to a wide range of difficult problems where analysis of data requires evaluation of identifiable factors. Solutions are imaginative, thorough, practicable and consistent with organization objectives.



Frequent inter-organizational and outside customer contacts. Represents organization in providing solutions to difficult technical issues associated with specific projects.

Capture and perform initial analysis on captured volatile data, log data, captured network traffic data, etc. to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented.

Per ACOIC|FMA|RCC request, coordinate the shipment and/or email of original forensic evidence (hard drive, USB drive, files etc.) to ACOIC G33 DCO FMA for initial forensic imaging.

Conduct coordination with the appropriate team (NDA, NV, other CDAPs) as required. Works and interacts with other DCO professionals internal and external to Army Cyber Command, with Law Enforcement and Counter Intelligence LNO's, and intelligence professionals as a technical specialist to understand higher-level adversary capability. 
 

Qualifications

Education and Experience: Bachelors and five (5) years or more experience;


Clearance: Top Secret/SCI. DCO support must have TS/SCI and CSSP-IS certification requirements


Certifications: IAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler, and IAT Level II Baseline Certification such as CCNA Security, CSA+, GIC SP, GSEC, Sec+ and SSCP.


Additionally, the DoD 8570.01-M also requires a Computing Environment Certification:“8570 Computing Environment (CE) Certification Requirement: The official requirement can be found on page 23 of the current approved DoD 8570.01-M. DoD 8570.01-M, December 19, 2005 "C3.2.4.8.3. In addition to the IA baseline certification requirement for their level, IATs with privileged access must obtain appropriate Computing Environment (CE) certifications for the operating system(s) and/or security related tools/devices they support as required by their employing organization. If supporting multiple tools and devices, an IAT should obtain CE certifications for all the tools and devices they are supporting. At a minimum, the IAT should obtain a certification for the tool or device he or she spends the most time supporting. For example, if an IAT is spending most of his or her time supporting security functions on a CISCO router, the IAT should obtain a CE certification for that equipment."”

Company Name:
Security Clearance:
Top Secret / SCI
Location:
FORT HUACHUCA, Arizona
Country:
United States
Salary:
Not Specified
Job Number:




Send me email alerts for similar jobs

JOIN US