Location: Brooklyn, NY
Duration: 2-Year Contract
Work Model: Hybrid (3 days onsite / 2 days remote)
We are seeking an experienced Forensic Analyst to support cyber investigations, incident response operations, and forensic examinations across diverse platforms. The ideal candidate will have hands-on experience analyzing network intrusions, conducting host-based and network-based forensics, and ensuring evidence integrity throughout the investigative lifecycle.
This role involves supporting cyber emergency response activities, developing new investigative techniques, and producing clear, high-quality technical reports.
Investigate network intrusions and cybersecurity incidents to determine cause, scope, impact, and remediation steps.
Conduct host-based and network-based forensic analysis across Windows, Linux/Unix, and macOS environments.
Collect, preserve, and analyze digital evidence following industry-standard forensic and chain-of-custody best practices.
Research, identify, and implement new methodologies to continuously enhance digital forensics processes.
Develop comprehensive written reports clearly conveying complex technical findings.
Support Cyber Emergency Response Team (CERT) activities during critical incidents.
Manage, maintain, and optimize forensic analysis labs, tools, and platforms used for investigations.
Assist in cloud forensic collections and analysis across AWS, Azure, and Google Cloud environments.
(Candidates without these qualifications will not be considered.)
Minimum 4 years of experience in Threat Management, Digital Forensics, and/or Incident Response environments.
Proficiency in performing digital forensic investigations across multiple operating systems.
Strong understanding of forensic methodologies, evidence handling, and industry-standard tools.
Hands-on experience with forensic tools such as FTK, X-Ways, SIFT, AXIOM, EnCase, etc.
Experience with memory analysis tools including Volatility, MemProcFS.
Strong familiarity with Linux and open-source investigative tools.
Experience performing investigations on Windows and Linux/Unix systems and artifacts.
Experience in cloud forensic collections (AWS, Azure, GCP).
Knowledge of examining and interpreting digital evidence from computers and electronic devices.
Understanding of virtual environments and forensic imaging techniques.
In-depth knowledge of OS artifacts across Windows, Linux/Unix, and macOS.
Strong understanding of file systems, log artifacts, and system internals.
Excellent analytical, troubleshooting, and problem-solving skills.