More jobs:
Cyber Host Forensic Analyst II Security Clearance
Job in
Arlington, Arlington County, Virginia, 22201, USA
Listed on 2026-01-06
Listing for:
Nightwing
Full Time
position Listed on 2026-01-06
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Cyber Host Forensic Analyst to support this critical customer mission.
Responsibilities:
- Acquiring/collecting computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements - Assessing evidentiary value by triaging electronic devices
- Correlating forensic findings with network events to further develop an intrusion narrative - When available, collecting and documenting system state information (running processes, network connections, etc.) prior to imaging - Performing incident triage from a forensic perspective to include determining scope, urgency and potential impact - Tracking and documenting forensic analysis from initial involvement through final resolution - Collecting, processing, preserving, analyzing and presenting computer related evidence - Coordinating with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings - Conducting analysis of forensic images and other available evidence and drafting forensic write-ups for inclusion in reports and other written products - Assisting in documenting and publishing Computer Network Defense guidance and reports on incident findings to appropriate constituencies - Assisting in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report - Documenting original condition of digital and/or associated evidence by taking photographs and collecting hash information - Assisting team members in imaging digital media - Assisting in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems - Using hashing algorithms to validate forensic images - Working with mentor to identify and understand adversary TTPs
- Assisting team members in analyzing the behaviors of malicious software - Under direct guidance and coaching if needed, locating critical items in various file systems to aid more senior personnel in their analysis - Performing analysis of log files from a variety of sources to identify possible threats to computer security - Using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions - Following proper evidence handling procedures and chain of custody protocols - Producing written reports documenting digital forensic findings - Determining programs that have been executed, finding files that have been changed on disk and in memory - Using timestamps and logs (host and network) to develop authoritative…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×