Posted today
Top Secret/SCI
Unspecified
Unspecified
IT - Security
Washington, DC (On-Site/Office)
Description
The Cyber Forensics and Digital Exploitation Specialist is responsible for identifying, collecting, preserving, analyzing, and exploiting digital evidence from a wide range of systems and media. This role supports investigations, incident response, intelligence operations, and legal or regulatory proceedings by providing technically sound and defensible digital forensic analysis and exploitation.
Key Responsibilities
• Conduct digital forensic examinations of computers, mobile devices, networks, cloud environments, and removable media
• Perform data acquisition and preservation using forensically sound methods and tools
• Analyze file systems, memory, logs, network traffic, malware, and artifacts to identify malicious activity or recover evidence
• Perform digital exploitation of seized or captured systems to extract intelligence, credentials, communications, and data
• Support cyber incident response efforts, including root cause analysis and impact assessment
• Develop timelines and reconstruct user and system activity
• Prepare detailed technical reports, findings, and briefings for technical and non-technical audiences
• Maintain chain of custody and ensure evidence handling meets legal and organizational standards
• Collaborate with cybersecurity, legal, intelligence, and law enforcement teams
• Stay current with emerging threats, tools, techniques, and forensic methodologies
The Cyber Forensics and Digital Exploitation Specialist is responsible for identifying, collecting, preserving, analyzing, and exploiting digital evidence from a wide range of systems and media. This role supports investigations, incident response, intelligence operations, and legal or regulatory proceedings by providing technically sound and defensible digital forensic analysis and exploitation.
Key Responsibilities
• Conduct digital forensic examinations of computers, mobile devices, networks, cloud environments, and removable media
• Perform data acquisition and preservation using forensically sound methods and tools
• Analyze file systems, memory, logs, network traffic, malware, and artifacts to identify malicious activity or recover evidence
• Perform digital exploitation of seized or captured systems to extract intelligence, credentials, communications, and data
• Support cyber incident response efforts, including root cause analysis and impact assessment
• Develop timelines and reconstruct user and system activity
• Prepare detailed technical reports, findings, and briefings for technical and non-technical audiences
• Maintain chain of custody and ensure evidence handling meets legal and organizational standards
• Collaborate with cybersecurity, legal, intelligence, and law enforcement teams
• Stay current with emerging threats, tools, techniques, and forensic methodologies
group id: 10490032