Digital Forensics and Incident Response; DFIR Analyst; Principal Cyber Security Analyst
Listed on 2026-01-28
-
IT/Tech
Cybersecurity, Information Security
Overview
Job Description
Mission Support and Test Services, LLC (MSTS) manages and operates the Nevada National Security Site (NNSS) for the U.S. National Nuclear Security Administration (NNSA). Our MISSION is to help ensure the security of the United States and its allies by providing high-hazard experimentation and incident response capabilities through operations, engineering, education, field, and integration services and by acting as environmental stewards to the Site’s Cold War legacy.
Our VISION is to be the user site of choice for large-scale, high-hazard, national security experimentation, with premier facilities and capabilities below ground, on the ground, and in the air. (See NNSS.gov for our unique capabilities.) Our 2,750+ professional, craft, and support employees are called upon to innovate, collaborate, and deliver on some of the more difficult nuclear security challenges facing the world today.
MSTS offers our full-time employees highly competitive salaries and benefits packages including medical, dental, and vision; both a pension and a 401k; paid time off and 96 hours of paid holidays; relocation (if located more than 75 miles from work location); tuition assistance and reimbursement; and more.
MSTS is a limited liability company consisting of Honeywell International Inc. (Honeywell), Jacobs Engineering Group Inc. (Jacobs), and HII Nuclear Inc.
ResponsibilitiesAre you passionate about national security and protecting critical infrastructure? As a DFIR Analyst at NNSS, you ll be on the front lines, safeguarding against cyber threats to support vital programs like nuclear stockpile stewardship and counter terrorism. Your expertise in incident response and digital forensics will directly contribute to our mission of delivering technical solutions for the U.S. government s most important national security objectives.
NNSS is seeking an experienced candidate for a Principal Cyber Security Analyst specializing in Digital Forensics and Incident Response (DFIR).
- Monitors intrusion detection/prevention systems (IDS/IPS), Security Event and Incident Management (SEIM) tools, endpoint security tools, email gateways, firewalls, network infrastructure, and other appliances for security issues.
- Creates logical and physical forensic images of digital evidence via the network or directly from hosts.
- Analyzes host-based indicators of compromise or network traffic and analyzes additional log, forensic, malware, or other incident response related data, as needed.
- Participates as part of an incident response team to detect, respond to, contain, and remediate cyber-related threats against Information Technology (IT) assets.
- Seize digital evidence in support of investigations and conduct host-based and network-based forensic analysis of digital evidence.
- Create detailed reports of investigative activity for consumption by internal and external organizations to include:
Human Resources, Legal Department, Information Security Officers, and local, state, and federal law enforcement. - Conduct digital investigations involving breaches of Information Technology (IT) infrastructure, forensic investigations, legal and privacy issues requiring digital investigations, and network forensic investigations handling large scale, complex post-incident investigations where techniques such as network forensics, malware reverse engineering, log analysis, timeline creation, and host-based forensics have been applied.
- Have a deep understanding of high-tech investigation skills, techniques, and tools necessary for conducting live forensics on critical systems and being able to produce detailed analysis of the root cause of any incidents.
- Conduct detailed analysis of systems where breaches of critical IT infrastructure may have occurred and provide root cause analysis, impact assessments and rapid response to aid detection of those responsible and make recommendations to assist in prevention of similar incidents.
- Able to conduct reverse engineering of malware and other suspicious code and report the findings. Focus on projects of substantial complexity and broad scope, requiring interdisciplinary coordination.
- Leverage on practical experience to independently perform host based forensic investigations to establish user activity on that system.
- Independently plan, schedule, and direct projects, guided by established objectives, budgets, and schedules.
- Assist in researching, compiling, and analyzing technical data.
- Be relied upon to multitask as required between responsibilities.
- Review Cyber Security threat information and assist with mitigating vulnerabilities identified.
- Develop standards, practices, and procedures as well as increasing technical knowledge to solve problems and complete projects.
- Contribute to an overall productive and respectful work environment by providing excellent customer service and working in a positive, collegial manner. Maintain cooperative and respective working relationships with Cyber Security staff, other divisions, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).