Computer Forensic and Intrusion Analyst (Journeyman) in Linthicum, Maryland

Company Name:
General Dynamics Information Technology
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors. With approximately 28,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Disabled
General Dynamics has an immediate opening for a Computer Forensics and Intrusion Analyst (Journeyman) to join our team at the DC3 Crime Labs in Linthicum MD. We are honored to be a mission partner with the Department of Defense Cyber Crime Center (DC3) - home to the world's largest accredited digital forensics lab. This position provides an opportunity to develop the cutting-edge technology that supports some of our nation's fundamental defense services.
Provides forensic examination support for the Department of Defense Cyber Crime Center (DC3)and supporting organizations. Conducts forensic processes on a variety of digital media including hard drives, thumb drives, media cards, cell phones and other devices. Creates detailed notes on processes undertaken and develops forensic reports in support of counterintelligence or criminal investigations and other types of inquiries. Assists the customer in developing new and innovative forensic processes and procedures. Conducts peer reviews of other examiners' reporting. Provides expert witness testimony in both military and civilian courts in support of forensic examinations conducted by the examiner.
Demonstrated experience in the field of digital media forensics
Understanding of computer file systems
In-depth experience with file system forensics
In-depth experience with registry analysis
In-depth experience with Internet history analysis
Understanding of steganography and encryption detection and analysis
Understanding of managing complex large data set analysis
In-depth experience with timeline analysis
Experience with forensic media imaging
In-depth experience with email analysis
In-depth experience with signature and hash analysis
Demonstrated experience with forensics tools such as EnCase, Forensic Toolkit, and Xways.
Strong documentation and written communication skills with technical report writing experience
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
8-10 years of related experience in data security administration.
Industry standard certification(s) such as: CFCE, EnCE, ACE, GIAC, DoD
Forensic tool and script development
Programming experience
Law enforcement investigation experience and understanding of search and seizure
Department of Defense TOP SECRET / SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Candidates must show a passion for innovation, a sophisticated understanding of software systems and applications, and the ability to effectively manage, grow and evolve GDIT software solutions.
Relocation: No
Security Clearance Level: Top-Secret
Security Clearance Basis: Sensitive Compartmented Information (SCI)
Security Clearance Polygraph: None
Job ID Number: 225890
Job Function: Information Technology
Potential for Deployment: No
Location: Linthicum, MD

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.