- Ralliant (Raleigh, NC)
- …Suite, Zscaler DLP, and forensic analysis tools (eg, CrowdStrike, EnCase, FTK , X-Ways, ObserveIT, Magnet Forensics). + Experience supporting cybersecurity incidents, ... especially in cross-functional or multi-vendor response contexts. + Familiarity with SIEM, endpoint telemetry, and log analysis related to investigative workflows. + Strong skills in evidence handling, eDiscovery, documentation, and formal report writing. +… more
- Mission Support and Test Services (North Las Vegas, NV)
- …variety of computer forensic hardware and software (preferably familiar with EnCase, FTK , and other forensic suites) and incident investigation tools and techniques. ... + Ability to investigate large data compromise events to mitigate risk to data compromise events and investigating insider threats and incidents. + Knowledge of computer forensic best practices and industry standard methodologies for responding to network… more
- Cayuse Holdings (Omaha, NE)
- …cyber threat analysis. + Experience with digital forensics tools (eg, EnCase, FTK , Cellebrite, X-Ways, Autopsy). + Familiarity with network forensics, malware revers ... engineering, and scripting for automation. + Strong understanding of operational systems, file systems, and memory forensics. + Top Secret SCI clearance is required. + Must be able to pass a background check. May require additional background checks as… more
- ThermoFisher Scientific (Frederick, MD)
- …incident response. + Proficiency in using tools like Magnet Axiom, AccessData FTK , Encase, X-Ways, The Sleuth Kit/Autopsy, Volatility, Windows, Linux, and MacOS + ... Experience automating workflows with PowerShell, Bash, or Python. + Familiarity with the TCP/IP suite of protocols. + Demonstrable experience in leading forensic investigations based on EDR, XDR, memory, disk, and log-based evidence. + Experience conducting… more
- CACI International (Aberdeen Proving Ground, MD)
- …testing or threat hunting + Experience with digital forensics tools such as ( FTK , Autopsy, EnCase) + Experience with binary analysis tools and techniques such as ... Ghidra + Familiarity with Android OS and mobile device debugging techniques + Experience with benchtop equipment such as oscilloscopes, signal/power analyzers, and multimeters + Experience with SDRs (HackRF, Ettus, etc.) and GNURadio + Experience soldering… more
- The Metamorphosis Group (Reston, VA)
- …Demonstrated experience using forensic software including Cellebrite, XRY, WinHex, FTK , and Autopsy. 14. Demonstrated experience with Gateway Redundancy Protocols ... to include HSRP and VRRP. 15. Demonstrated experience with network IP address management. 16. Demonstrated experience with network security such as firewalls and ACL's. 17. Demonstrated experience with Routing Protocols to include OSPF, EIGRP, and BGP. 18.… more
- ManTech (Herndon, VA)
- …Kill Chain, MITRE ATT&CK, Diamond Model) + Demonstrated experience using EnCase, FTK , and Open-Source methods and tools to perform Computer forensic investigations + ... Experience with Splunk, CrowdStrike Falcon, Security Onion, EnCase, Axiom, + Experience with network topologies and network security devices (eg Firewall, IDS/IPS, Proxy, DNS, WAF, etc). **Clearance Requirements:** + Must have a current/active Secret clearance… more
- Amentum (Forest Park, GA)
- …and other media storage devices using hardware/software tools including Cellebrite UFED, XRY, FTK and other forensic tools. Analyze the EDR files to recover data ... that may be of investigative or intelligence value + Perform electronic data extraction and de-soldering techniques of components; (EEProms microcontrollers using In-system programming (ISP) + Document all exploitation results in all required outputs such as… more
- CACI International (Doral, FL)
- …procedures + Utilize and maintain forensic tool suites (eg, EnCase, Sleuthkit, FTK ) for investigations + Conduct forensic analyses across multiple operating system ... environments, including mobile device systems + Analyze anomalous code to determine if it is malicious or benign and process and analyze volatile data and memory dumps to extract critical information + Identify and analyze obfuscation techniques used by threat… more
- HD Supply (Atlanta, GA)
- …SOC tools. + Familiarity with **digital forensics** techniques, tools (eg, EnCase, FTK , Volatility), and procedures for endpoint, network, and cloud environments. + ... Experience with **MITRE ATT&CK** framework and applying it to detection engineering, threat modeling, and gap analysis. + Demonstrated ability to build and lead high-performing SOC teams, including analysts, engineers, and threat hunters, across multiple… more