Forensic Analyst

Job Description

The Forensic Analyst provides forensic and analytical PED support (which includes processing, exploitation and dissemination of latent fingerprints, digitized latent prints, forensic reports, production statistics for management status reporting and standard operating procedures / SOPs).


Provide Digital Media and CELLEX processing and analytical support to ensure rapid and accurate exploitation of captured enemy materials.


Devise a Digital Media Enabled Watch List (WL) for media of interest in accordance with all applicable SOPs. Manage the Digital Media WL in coordination with NMEC and SOF components to include SOF nominations with all applicable SOPs.


Provide DOMEX capability briefings to supported military units and visiting senior leaders.


Provide DOMEX production statistics to the COR weekly.


Deliver to the COR standardized weekly reporting to include metrics and vignettes of all WL encounters and i2 information of interest collected globally during the week and any future requirements gathering and process development.


Bachelor’s degree (BSEE, BSCS, BSCE) B.S. in Electrical Engineering (BSEE), or B.S. in Computer Science, or B.S. in Civil Engineering or equivalent Forensic degree from a four-year college or university; or equivalent combination of forensic training, certifications (from other DoD or USG training sources), and 3 years of experience with current forensics hardware, software, and methodologies.


  • A minimum 1-year experience in a combination of the following:
    • Using FTK 1x/3x, EnCase 5x or 6x, iLook, P2 Commander, or similar forensic examination toolsets.
    • With new technologies and programming techniques for multiple software languages, including, but not limited to SQL programming, C#, C/C++, Perl, Python.
    • Using regular expression patterns in order to conduct bit-by-bit live searches on media.
    • Producing forensically sound images of digital media, i.e., SATA, IDE, flash drives using imaging software, such as FTK imager or other command line tools, both internal & external write block hardware.
    • Wiping, verifying, and validating media before and after conducting an examination.
    • Using virtual platforms such as VMware Server / Workstation in order to mount & view media in its native operating system. > Data recovery/carving experience using WinHEX, X-Ways Forensics or similar tool.
    • Using regular expression patterns in order to conduct bit-by-bit live searches on media.
    • Understanding Basic Unix commands for study of CACHE Flow Logs & of hexadecimal code, file structures to include file headers and footers.
    • Using Web filtering, Spam Filtering, and Message Capturing Technologies.
    • Conducting cell phone exploitation and extracting pertinent data using cell phone analysis tools such as Device Seizure, Neutrino, BitPim, .XRY/.XACT and other open source tools.
    • Using Hyper Terminal to communicate with cell phones using AT commands.
    • Using cell phone analysis tools such as Device Seizure, BitPim, .XRY/.XACT.

As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer – Minorities/Females/Protected Veterans/Individuals with Disabilities.


. . . . . . . .

Leave a Reply