- Cybersecurity Recruiters and Staffing Specialists Forensics Analyst
Cybersecurity Jobs
- Application Security Engineer
- Chief Information Security Officer (CISO)
- Cloud Security Architect
- Cloud Security Engineer
- Cyber Risk Analyst
- Cybersecurity Engineer
- Data Privacy Officer
- Data Security Engineer
- Database Administrator (DBA)
- DevOps Engineer
- Forensics Analyst
- GRC Analyst
- Identity and Access Management Engineer
- Information Assurance Analyst
- Information Security Manager
- Information Security Officer
- Internet Analyst
- Intrusion Analyst
- IT Compliance Analyst
- IT Security Project Manager
- Network Engineer
- Network Security Analyst
- Network Security Engineer
- Networking Specialist
- Penetration Tester
- Risk Analyst
- Security Analyst
- Security Architect
- Security Compliance Analyst
- Security Engineer
- Senior IT Security Consultant
- Senior Network Engineer
- Software Developer
- Threat and Incident Manager
- Vulnerability Management Analyst
We are now looking for a forensic analyst to carry out investigations involving data collection, forensic data, file, and email analysis, as well as data recovery, in a wide range of dynamic contexts. In a consulting and advising role, you will engage with internal and external clients to determine their needs for the data collecting, processing, and reporting processes. An important component of the position will be consulting on data gathering and investigations. You will perform full forensic analysis, from data collection through analysis and reporting, using programs like EnCase, FTK, XWays, IEF, Celebright, or NUIX.
Typical Duties and Responsibilities
- Consult with key stakeholders to determine the project’s scope, gather needs, and provide accurate data gathering, research, and reporting
- Collaborate with the project team to decide on and carry out established computer forensic protocols and chain of custody
- Write affidavits, reports, and depositions, and take part in court testimony as necessary
- Perform forensic data acquisition and preservation tasks
- Gather data from a variety of platforms and information technology environments, such as social media and mobile devices, and take part in data collection and imaging both locally and remotely
- Coordinate and monitor all electronic collection activities, maintain chain of custody, and document project lifecycles
- Perform analysis on datasets including hard drives, mobile phones, pen traps, operating system logs from computers, and log-ins and activity connections to uncover linkages, patterns, trends, and statistics using network theory and data mining ideas
- Provide clients with effective professional communication through all means of communication, including direct contact, voice, e-mail, and fax
- Assist case managers with client conferences and queries, and address client inquiries about reports using output data that has been made available to them
- Discover the correct procedures and approaches for carrying out forensic investigations
- Function as part of an on-call program that occasionally requires 24/7 availability
- Document information and teach it to engineering and/or sales teams
- Identify and document case relevant file-system artifacts (browser histories, account usage and USB histories, etc.)
- Create forensically sound duplicates of evidence to use for data recovery and analysis
- Find evidence of deleted files and hidden data
Education
- Bachelor’s degree in computer forensics or a related field
Required Skills and Experience
- Understanding of network architectures
- Expertise with data recovery tools
- Knowledge of analysis and reporting applications like EnCase, FTK, XWays, IEF, Celebright, or NUIX
- Extensive practical knowledge of laptops, desktop computers, etc.
- Practical knowledge of system forensic investigations
- Experience providing support for LANs, problem-solving, audits, and security risks
- Experience with the administration of Linux/Netware-based systems and networks
- Experience in either civil or criminal investigations
- Knowledge of proper evidence handling procedures and chain of custody protocols