Are you an experienced, passionate pioneer in technology? A cloud solutions builder who wants to work in a collaborative environment. As an experienced Host Forensic Analyst you will have the ability to share new ideas and collaborate on projects as a consultant without the extensive demands of travel.
We have been growing since 2014 with significant, continued growth on the horizon. Interested? Read more about our opportunity below …
Work you’ll do/Responsibilities
- Responsible for the analysis of all corporate IT machines in the environment.
- This includes forensic analysis of Windows and Linux clients and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
- Identify unusual files, scripts, configurations, and user activity based on bulk aggregation via an Endpoint Detection and Response (EDR) or triage tool, deployed at scale.
- Identify potentially malicious filesystem objects for deeper analysis.
The Team
Deloitte’s Government & Public Services practice—our people, ideas, technology and outcomes—is designed for impact. Our team of over 15,000+ professionals bring fresh perspective to help you anticipate disruption, reimagine the possible, and fulfill your mission promise.
The US Cloud Engineering Offering focuses on enabling our client’s end-to-end journey from On-Premise to Cloud, with opportunities in the areas of Cloud Strategy and Op Model Transformation, Cloud Development & Integration, Cloud Migration, and Cloud Infrastructure & Managed Services. Cloud Engineering supports our clients as they improve agility, resilience and identifies opportunities to reduce IT operations spend through automation by enabling Cloud. We accelerate our clients toward a technology-driven future, leveraging vendor solutions, Deloitte-developed.
Qualifications
Required
- Must have an active TS/SCI
- Bachelor's degree with four (4) years of relevant experience
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
- Experience with system administration, Windows and Linux operating systems (OS)
- Experience with mechanics and filesystem structures, disk and memory forensics, commonly abused tools/vectors for persistence, privilege escalation, and lateral movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior, with respect to the environment they are found in.
- This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines.
- Familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint
Preferred
- Active TS/SCI with polygraph