Job ID 155896BR Date posted 01/31/2020 City Arlington State VA Country United States
An existing TS/SCI Clearance is required, existing DHS Suitability is desired.
Raytheon Technologies is seeking an experienced Host Based Systems Analyst to join an exciting new opportunity. The Host Based Systems Analyst will assist Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating evidence collection operations, provide technical assistance on digital evidence matters and forensic investigative techniques to appropriate personnel when necessary, write in-depth reports, supports with peer reviews and provides quality assurance reviews for junior personnel, support in overseeing forensic analysis and mentoring/providing guidance to others on data collection, analysis and reporting in support of onsite engagements.
The Host Based Systems Analyst will assist with leading and coordinating forensic teams in preliminary investigation, plan, coordinate and direct the inventory, examination and comprehensive technical analysis of computer related evidence, distill analytic findings into executive summaries and in-depth technical reports, serve as technical forensics liaison to stakeholders and explains investigation details to include forensic methodologies and protocols, track and document on-site incident response activities and provides updates to leadership throughout the engagement, evaluate, extracts and analyzes suspected malicious code.
The Host Based Systems Analyst will acquire/collect computer artifacts (e.g., malware, user activity, link files, etc.) from systems in support of onsite engagements, assess evidentiary value by triaging electronic devices, correlates forensic findings with network events to further develop an intrusion narrative, collect and document system state information (running processes, network connections, etc.) prior to imaging, perform incident triage from a forensic perspective to include determination of scope, urgency and potential impact. The Host Based Systems Analyst will track and document forensic analysis from initial involvement through final resolution, collect, process, preserve, analyze and present computer related evidence, coordinates with others within the Government and with customer personnel to validate/investigate alerts or other preliminary findings, conduct analysis of forensic images and other available evidence and drafts forensic write-ups for inclusion in reports and other written products, and assist to document and publish Computer Network Defense guidance and reports on incident findings to appropriate constituencies.
This role will assist in preliminary analysis by tracing an activity to its source and documenting findings for input into a forensic report, document original condition of digital and/or associated evidence by taking photographs and collecting hash information, assist team members in imaging digital media, assist in gathering, accessing and assessing evidence from electronic devices using forensic tools and knowledge of operating systems, use hashing algorithms to validate forensic images, work with mentor to identify and understand adversary TTPs, assist team members in analyzing the behaviors of malicious software, locate critical items in various file systems to aid more senior personnel in their analysis, perform analysis of log files from a variety of sources to identify possible threats to computer security.
The Host Based Systems Analyst requires proficiency and proven capability in the below areas:
Uses leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions
Follows proper evidence handling procedures and chain of custody protocols
Produces written reports documenting digital forensic findings
Determines programs that have been executed, finds files that have been changed on disk and in memory
Uses timestamps and logs (host and network) to develop authoritative timelines of activity
Finds evidence of deleted files and hidden data
Identifies and documents case relevant file-system artifacts (browser histories, account usage and USB histories, etc.)
Creates forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis
Performs all-source research for similar or related network events or incidents
Skill in identifying different classes of attacks and attack stages
Knowledge of system and application security threats and vulnerabilities
Knowledge in proactive analysis of systems and networks, to include creating trust levels of critical resources
Education & Experience Required:
10+ years host investigations or digital forensics experience with a High school diploma; or a Bachelor's degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with 8+ years of host-based investigations or digital forensics experience
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Raytheon Technologies Corp