Expert Cyber Security Analyst

3 Months ago • All levels
Cyber Security

Job Description

Kavaliro is seeking an Expert Cyber Security Analyst to support a client in Virginia. The role requires demonstrated experience in hands-on forensic review of devices like laptops and mobile devices using tools such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight. Responsibilities include handling and imaging various evidence types, data extraction and analysis from diverse sources, and parsing data for forensic value. A deep understanding of operating systems like Windows, Linux, iOS, and Android is essential, along with experience in mobile device forensic review and reverse engineering. Experience with virtualization software (ESXi, VMWare, VirtualBox) and analyzing malicious software using static and dynamic techniques is also required. Familiarity with system kernel level processing to detect root kits and other significant kernel events is highly important.
Good To Have:
  • Scripting skills (Perl, Python, Bash)
  • Experience with Sponsor's enterprise activities
  • Knowledge of Sponsor's cyber security policies
  • Familiarity with risk management standards (NIST, CNSSP, FIPS)
Must Have:
  • Forensic review of laptops and mobile devices
  • Experience with forensic tools (EnCase, FTK, X-Ways, etc.)
  • Handling and imaging evidence from various media
  • Data extraction and analysis from diverse sources
  • Understanding of Windows, Linux, iOS, Android
  • Mobile device forensic review and reverse engineering
  • Experience with virtualization software
  • Malware analysis (static and dynamic)
  • Understanding of system kernel processing

Add these skills to join the top 1% applicants for this job

risk-management
data-structures
linux
virtualbox
vmware
python
perl
bash

Kavaliro is seeking an Expert Cyber Security Analyst to support a client in Virginia.

Required Skills:
Required skills and demonstrated experience The candidate shall have the following required skills, certifications and demonstrated experience: 
  • Demonstrated experience performing hands-on forensic review of devices to include laptops and mobile devices, using open source or commercial forensic tools, such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
  • Demonstrated experience handling and imaging various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
  • Demonstrated experience with data extraction and analysis from various data sources including files, logs, directories, unallocated space, raw images, and custom databases.
  • Demonstrated experience parsing data types necessary to extract metadata and content of forensic value from various data sources.
  • Demonstrated experience and in depth understanding of multiple operating systems such as Windows, Linux, iOS, and Android.
  • Demonstrated experience performing hands-on forensic review or reverse engineering of modern mobile devices such as Google Android or Apple iOS.
  • Demonstrated experience working with virtualization software and virtualized environments to include ESXi, VMWare, or VirtualBox.
  • Demonstrated experience conducting analysis of identified malicious software or code using both static and dynamic malware analysis.
  • Demonstrated experience using debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
  • Demonstrated experience understanding system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures. Highly
Desired skills and demonstrated experience
Other skills and demonstrated experiences that are highly desired but not mandatory to perform the work, include:
  • Demonstrated experience using programming skills using scripting languages such as Perl, Python, or Bash.
  • Demonstrated experience with Sponsor’s enterprise and operational activities, capabilities, technical development programs.
  • Demonstrated experience with Sponsor’s information cyber security policies and regulations.
  • Demonstrated experience with risk management standards, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, and National Institute of Standards and Technology (NIST) Special Publication 800-37, 800-39, 800-53.
Location:
  • Chantilly, VA
  • This position is onsite and there is no remote availability 
Clearance Requirement:
  • Candidates must have an active TS/SCI security clearance with a Full Scope Polygraph
Kavaliro provides Equal Employment Opportunities to all employees and applicants. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Kavaliro is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Kavaliro will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please respond to this posting to connect with a company representative.
 

Set alerts for more jobs like Expert Cyber Security Analyst
Set alerts for new jobs by Kavalirio
Set alerts for new Cyber Security jobs in United States
Set alerts for new jobs in United States
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙