EOE STATEMENT We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status or any other characteristic protected by law.
ABOUT THE ORGANIZATION Constellation West is an award winning company that delivers Information Technology (IT) engineering services and solutions along with non-IT subject matter expertise world-wide. Established in 1997, Constellation West continues as an industry leader, partnering with key organizations. As a prime contractor or preferred subcontractor, we have a continual list of opportunities to fill across the nation with multiple agencies such as the Department of Veteran Affairs, Department of Defense, civilian agencies, and national intelligence community. Many of the positions supporting U.S. federal government require our employees be granted security clearances.

Constellation West provides fully integrated solutions spanning all aspects of system/network engineering, system/network administration, data management, information assurance, quality assurance, full lifecycle support, software development, and geospatial information services. Constellation West looks for the right people ready to step up and be part of a dynamic team.

If you are looking for a new challenge and a rewarding opportunity to apply your expertise, knowledge, and problem solving skills, come join our team! Constellation West offers competitive salary and benefits including:

• Tuition reimbursement
• Competitive 401(k) plan
• Competitive Health Benefits
• 10 Paid Holidays!!
• 15 PTO Days!
• Veteran Hiring Preference

Constellation West is proud to be an EEO/AA employer M/F/D/V

CATEGORY Information Technology
DESCRIPTION Engility is seeking analysts with computer forensic experience.

  • The analyst will use data collected from a variety of Computer Network Defense (CND) tools to include but not limited to Windows Event logs, system registry, Internet history information, and other relevant system logs to analyze events and correlate with network traffic activity occurring within their environment.
  • Individuals will collect and analyze event information and perform threat or target analysis duties in effort to identify sources for signs of compromise, unauthorized activity and, poor security practices.
  • Provide operations for persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems.
  • Interpret, analyze, and report all activities of interest (AOIs) in accordance with computer network directives, including initiating, responding, and reporting discovered events.
  • Manage and execute first-level responses and address reported or detected incidents.
  • Participate in project review meetings and provide technical INFOSEC guidance and updates.
  • Document policies, procedures, and lessons learned accordingly. Candidate must possess excellent written and verbal communication skills. Mentor junior analysts as required.
POSITION REQUIREMENTS Require at least four years of experience in computer system forensics.


  • Bachelor’s Degree in Computer Science or technical relevant field.
  • In lieu of a Bachelor’s degree, two years of relevant experience is acceptable.
  • Require CISSP and GCIH or CEH certification or the ability to obtain within 6 months of hire.
  • Pass and maintain Mission Qualification Training (MQT), customer training, and qualification requirements.
  • In-depth knowledge of Windows Operating Systems e.g. Registry, Services, Memory management, etc.
  • In-depth knowledge of TCP/IP e.g. IP, TCP, UDP, DNS, HTTP, HTTPS, SMTP.
  • Practical experience analyzing data from Microsoft’s Sysinternals tools.
  • Practical experience collecting host-based information e.g. memorysystem image, volatile data, system logs, related artifacts, etc.
  • Strong familiarity with Linux Operating Systems.
  • Practical experience conducting network analysis.
  • Practical experience with packet capture analysis tools (e.g. Wireshark, TcpDump, etc.).
  • Strong understanding of various related defense-in-depth security devices e.g. firewalls, IDS/IPS, routers, etc.
  • Strong understanding of various host and network-based encryption technologies e.g. TLS/SSL, Bitlocker, etc.
  • Strong familiarity with various computer/network-based threats e.g. Worms, Trojans, Exploit kits, SQL injection, privilege escalation, etc.
  • Familiarity with VMWare Workstation.
  • Active TS/SCI clearance is required.
  • Travel is required up to 20%
  • Practical experience with disassemblers (IDA ProJ) and debugging tools (e.g. OllyDbr, WinDbg, etc.).
  • In-depth knowledge of Linux/Operating Systems.
  • Practical experience reverse engineering malware.
  • Practical experience with memory analysis.
  • Programming languages (Assembly, Ruby, Python, Powershell).
  • GIAC Certifications (GREM, GCFA, GCIA)
SHIFT -not applicable-


Leave a Reply