Today
Top Secret/SCI
Unspecified
Unspecified
HI (On-Site/Office)
Overview
Bluehawk is seeking two mid level Computer Forensics Specialists who shall perform work at designated government-owned factilities at USINDOPACOM HQ Camp H.M. Smith; USINDOPACOM JIOC, Joint Base Pearl Harbor-Hickam, HI; and other military locations on the island of Oahu, HI. Locations also may include OCONUS & CONUS U.S. Government Controlled Facilities within the USINDOPACOM's Area of Responsibility (AOR) or their Joint Detachment (JDET) Offices in Denver, CO; Minneapolis, MN; or Ft. Worth, TX.
Primary work location is Pearl Harbor, Hawaii, however government will determine based on mission requirements.
Responsibilities
Qualifications
Special Mandatory Qualifications/Certifications:
Bluehawk, LLC. is an Equal Opportunity/Affirmative Action Employer
EOE Minority/Female/Disabled/Veteran/Sexual Orientation/Gender Identity
Bluehawk is seeking two mid level Computer Forensics Specialists who shall perform work at designated government-owned factilities at USINDOPACOM HQ Camp H.M. Smith; USINDOPACOM JIOC, Joint Base Pearl Harbor-Hickam, HI; and other military locations on the island of Oahu, HI. Locations also may include OCONUS & CONUS U.S. Government Controlled Facilities within the USINDOPACOM's Area of Responsibility (AOR) or their Joint Detachment (JDET) Offices in Denver, CO; Minneapolis, MN; or Ft. Worth, TX.
Primary work location is Pearl Harbor, Hawaii, however government will determine based on mission requirements.
Responsibilities
- Computer forensic specialists combine computer science with forensic skills to recover information from computers and storage devices to recover data like documents, photos, and e-mails from computer hard drives and other data storage devices that have been deleted, damaged, or otherwise manipulated.
- The specialist uses forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images, and other files. They use their technical skills to hunt for files and information that have been hidden, deleted or lost. They help officials analyze data and evaluate its relevance. The specialist may also use their expertise to protect computers from infiltration, determine how a computer was broken into, or recover lost files. The specialist creates detailed notes on processes undertaken and develops intelligence-based reporting. The specialist may also provide testing and evaluation of emerging trends in digital forensics software and hardware and assist in developing new and innovative forensic processes and procedures.
- Certification through the International Society of Forensic Computer Examiners (ISFCE) or the International Association of Computer Investigative Specialists (IACIS) is preferred.
Qualifications
Special Mandatory Qualifications/Certifications:
- A degree in Electrical Engineering, Computer Science, Information Technology, Systems Engineering, or a related qualification.
- At least 2 years of work experience with incident detection, incident response, cyber security, and digital forensics.
- Experience with Firewalls (functionality and maintenance), Office 365 Security, VSX and Endpoint Security.
- Proficiency in Python, C++, Java, Ruby, Node, Go and/or Power Shell.
- Great awareness of cybersecurity trends and hacking techniques. Certified Ethical Hacking certification preferred
Bluehawk, LLC. is an Equal Opportunity/Affirmative Action Employer
EOE Minority/Female/Disabled/Veteran/Sexual Orientation/Gender Identity
group id: 90767879