Booz Allen Hamilton has been at the forefront of strategy and technology for more than 100 years Today, the firm provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe. Booz Allen partners with public and private sector clients to solve their most difficult challenges through a combination of consulting, analytics, mission operations, technology, systems delivery, cybersecurity, engineering and innovation expertise.
Perform forensic analysis of digital information and gather and handle evidence. Use forensically sound procedures to identify network computer intrusion evidence and identify perpetrators. Employ forensic tools and techniques to support the investigation of computer fraud or other electronic crimes, crack files and system passwords, detect steganography, and recover deleted, fragmented, and corrupted data from digital media of all types. Observe proper evidence custody and control procedures, document procedures and findings in a manner suitable for courtroom presentation, and prepare comprehensive written notes and reports. Exercise considerable latitude in determining the technical objectives of an assignment. Guide the successful completion of major programs and function in a project leadership role, as needed. Represent the organization as the prime technical contact on contracts and projects.
-5+ years of experience in a Cybersecurity role, including security operations, threat analyst, malware analyst, or systems administrator
-Experience with using Windows, Linux, and Mac OSX
-Knowledge of basic internal protocols, including TCP/IP
-Ability to perform network forensics with tools, including Wireshark, tcpdump, tshark, or Networkminer
-Ability to review and analyze raw packet or netflow data
-Ability to identify Cyber threat tactics, techniques, and procedures (TTPs) and attribution
-Ability to perform static and dynamic malware analysis
-Active TS/SCI clearance
-Experience with programming or scripting languages, including Perl, Python, or bash
-Experience with using virtual machines
-Experience with writing or developing SNORT signatures
-BA or BS degree
-Active Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Security Essentials (GSEC), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Examiner (GCFE), or GIAC Certified Forensic Analyst (GCFA) Certification
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Integrating a full range of consulting capabilities, Booz Allen is the one firm that helps clients solve their toughest problems. by their side to help them achieve their missions. Booz Allen is committed to delivering results that endure.
We are proud of our diverse environment, EOE, M/F/Disability/Vet.