Cyber Command Forensic Analyst - CCFA 25-32956


IT - NY - Brooklyn, NY
Kings County, New York
Locations: Kings County, Astoria, Bushwick, Long Island City
Posted On: November 17, 2025
Last Day to Apply: December 01, 2025
Pay: From $70.00 per hour

Cyber Command Forensic Analyst

Location: Brooklyn, NY
Duration: 2-Year Contract
Work Model: Hybrid (3 days onsite / 2 days remote)

Position Overview

We are seeking an experienced Forensic Analyst to support cyber investigations, incident response operations, and forensic examinations across diverse platforms. The ideal candidate will have hands-on experience analyzing network intrusions, conducting host-based and network-based forensics, and ensuring evidence integrity throughout the investigative lifecycle.

This role involves supporting cyber emergency response activities, developing new investigative techniques, and producing clear, high-quality technical reports.

Key Responsibilities

  • Investigate network intrusions and cybersecurity incidents to determine cause, scope, impact, and remediation steps.

  • Conduct host-based and network-based forensic analysis across Windows, Linux/Unix, and macOS environments.

  • Collect, preserve, and analyze digital evidence following industry-standard forensic and chain-of-custody best practices.

  • Research, identify, and implement new methodologies to continuously enhance digital forensics processes.

  • Develop comprehensive written reports clearly conveying complex technical findings.

  • Support Cyber Emergency Response Team (CERT) activities during critical incidents.

  • Manage, maintain, and optimize forensic analysis labs, tools, and platforms used for investigations.

  • Assist in cloud forensic collections and analysis across AWS, Azure, and Google Cloud environments.

Mandatory Qualifications

(Candidates without these qualifications will not be considered.)

  • Minimum 4 years of experience in Threat Management, Digital Forensics, and/or Incident Response environments.

  • Proficiency in performing digital forensic investigations across multiple operating systems.

  • Strong understanding of forensic methodologies, evidence handling, and industry-standard tools.

Preferred Skills & Experience

  • Hands-on experience with forensic tools such as FTK, X-Ways, SIFT, AXIOM, EnCase, etc.

  • Experience with memory analysis tools including Volatility, MemProcFS.

  • Strong familiarity with Linux and open-source investigative tools.

  • Experience performing investigations on Windows and Linux/Unix systems and artifacts.

  • Experience in cloud forensic collections (AWS, Azure, GCP).

  • Knowledge of examining and interpreting digital evidence from computers and electronic devices.

  • Understanding of virtual environments and forensic imaging techniques.

  • In-depth knowledge of OS artifacts across Windows, Linux/Unix, and macOS.

  • Strong understanding of file systems, log artifacts, and system internals.

  • Excellent analytical, troubleshooting, and problem-solving skills.

Skip to the main content