"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Defensive Cyber Operations Forensic Analyst Tier…

    Adapt Forward (North Charleston, SC)



    Apply Now

    DCO Watch Forensics Analyst Tier 3

     

    North Charleston, SC

     

    Secret Clearance, with ability to obtain TS/SCI

     

    As a Tier 3 Defensive Cyber Operations (DCO) Watch Forensics Analyst, you will be responsible for leading complex digital forensic investigations on compromised systems across both unclassified and classified networks. You will be responsible for the entire forensic lifecycle, including the collection and preservation of digital evidence, in-depth analysis of host and network artifacts to determine the timeline and scope of intrusions, and the creation of detailed Forensic Summary Reports (FSRs). You will leverage deep technical expertise in file systems, operating system internals, and memory analysis to uncover evidence of attacker activity, support large-scale incident response campaigns, and provide actionable intelligence to enhance detection and mitigation strategies.

    Position Requirements and Duties

    + Examine system, software, security, and user hives for evidence of program execution, USB usage, network connections, and user activity

    + Execute forensic imaging of computers and storage media

    + Acquire and analyze digital evidence using industry-standard forensic tools and techniques on Windows and Linux systems including prefetch, jump lists,  shellbags, and other operating system specific artifacts

    + Acquire and analyze memory captures to recover additional artifacts and evidence

    + Decode and interpret various file formats and digital communications

    + In-depth understanding of digital forensic methodologies, incident response workflows, and forensic tools

    + Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations

    + Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents

    + Develop and maintain internal SOP documentation, ensuring alignment with CJCSM 6510.01B and other directives

    + Provide 24/7 support for incident response during non-core hours, and mentor junior analysts

    + Lead program reviews, product evaluations, and onsite certification evaluations

    + Overtime may be required to support incident response actions (Surge).

    + Up to 10% travel may be required, may include international travel

    + Must maintain a current US passport

    Minimum Qualifications

    + Bachelor’s Degree in relevant discipline and 3 years or at least 8 years of experience working in a CSSP, SOC, or similar environment

    + At least 2 years of hands-on experience conducting digital forensic investigations utilizing enterprise forensic suites (e.g., EnCase, FTK, Axiom, etc) to acquire, preserve, and analyze evidence from Windows and/or Linux systems

    + At least 1 year of experience performing detailed host-based and/or memory forensics by utilizing frameworks such as Volatility or Rekall to identify running processes, network connections, and injected code

    + Must be a U.S. Citizen

    Desired Qualifications

    + Extensive experience with Digital Forensics across multiple operating systems

    + Demonstrated expert-level knowledge of Incident Response Procedures

    + Expertise in log aggregation tools (e.g., Splunk, Elastic, Sentinel) for complex correlation analysis

    + Experience conducting forensic investigations in cloud environments, including analysis of cloud-native logs and acquisition of virtual machine snapshots

    + Proficiency in scripting (e.g., using Python, PowerShell) to automate forensic tasks, such as parsing custom log formats, automating timeline creation, or bulk-analyzing artifacts

    + Possession of a recognized digital forensics certification, such as GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), EnCase Certified Examiner (EnCE), or AccessData Certified Examiner (ACE)

    + Demonstrated passion for digital forensics through active participation in DFIR-focused challenges on platforms such as CyberDefenders, BlueTeamLabs Online, or the "Sherlocks" category on Hack The Box

    Required Certifications

    + Must have DoD 8570 IAT Level II and CSSP IR compliant certifications

     

    Company Overview

     

    Adapt Forward is a cybersecurity solutions provider for some of the nation’s most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers’ business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.

     

    Summary of Benefits

     

    + Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan.

    + 401k Retirement Plan with Matching Contribution is immediately available and vested.

    + Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses.

    + Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month.

    + Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered.

     

    Equal opportunity employer as to all protected groups, including protected veterans and individuals with disabilities.

     

    Adapt Forward’s Veteran/Disability Affirmative Action Plan narrative section is available for inspection upon request during normal business hours at the Human Resources office and may be requested by contacting Human Resources at [email protected].

     

    Powered by JazzHR

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • Defensive Cyber Operations Forensic Analyst Tier III
    Adapt Forward (North Charleston, SC)
  • Regional Strategic Sales Manager
    Fujifilm (Boston, MA)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2026 Alerted.org