FIND_THE_RIGHTJOB.
JOB_REQUIREMENTS
Hires in
Not specified
Employment Type
Not specified
Company Location
Not specified
Salary
Not specified
Title: Cyber Command Forensic Analyst
Location: Brooklyn, NY
Duration: 2 Years
The Cyber Command Forensic Analyst will support the client’s ability to respond to citywide cybersecurity incidents and lead investigative efforts. This role is critical for minimizing the likelihood and impact of cyber events that could otherwise require extensive remediation.
The Forensics Analyst is responsible for investigating network intrusions and cybersecurity events to determine their cause, scope, and impact. This role involves performing advanced digital forensics across multiple platforms and environments.
Research, develop, and implement new methodologies to strengthen digital forensics capabilities.
Produce high-quality written reports clearly presenting complex technical findings.
Manage and maintain analysis labs, forensic tools, systems, and environments.
Ensure proper collection, preservation, and documentation of digital evidence according to industry best practices and integrity standards.
Support the Cyber Emergency Response Team during critical security incidents.
Conduct host-based and network-based forensic analysis to investigate intrusions, breaches, and cyber incidents.
(Candidates without the mandatory skills will not be considered.)
Minimum 4 years of experience in Threat Management, Digital Forensics Investigations, or Incident Response.
Proficiency conducting digital forensic investigations across various platforms and operating systems.
Deep understanding of digital forensics tools, processes, methodologies, and investigative workflows.
Experience with industry-leading forensic tools: FTK, X-Ways, SIFT, AXIOM, EnCase, etc.
Experience with memory analysis tools: Volatility, MemProcFS.
Experience with Linux and open-source forensic utilities.
Background in investigating intrusions on Windows, Linux, and Unix systems.
Experience performing forensic collections in cloud platforms (AWS, Azure, GCP).
Knowledge of gathering, acquiring, and assessing electronic evidence across devices and systems.
Understanding of virtual environments and virtualization artifacts.
Knowledge of forensic imaging techniques.
Strong knowledge of Windows OS internals and artifacts.
Knowledge of Linux/UNIX artifacts and system forensics.
Knowledge of macOS forensics and file system artifacts.
Strong understanding of file systems.
Excellent analytical and problem-solving skills.
Similar jobs
No similar jobs found
© 2025 Qureos. All rights reserved.