Computer Forensics Analyst - Military veterans preferred

2018-10-27
Raytheon (www.raytheon.com)
Other

/yr

  full-time   employee


Fort Bragg
North Carolina
United States

Computer Forensics Analyst:
*** CONTINGENT UPON CONTRACT AWARD ***

Summary: This effort is supporting the Organization’s J2 Directorate of Intelligence as they conduct 24/7/365 Processing, Exploitation and Dissemination (PED) of biometrics, forensics, and Document and Media Exploitation (DOMEX) intelligence for deployed military commanders and national decision-makers. The customer has major responsibilities in the areas of threat identification, Sensitive Site Exploitation (SSE), Weapons Technical Intelligence, Force Protection, Vetting of Friendly Force Personnel, Identity Protection and Biometrics.
*** OCONUS Travel associated with this position***


Duties & Responsibilities:

  • Provide forensic and analytical PED support (which includes processing, exploitation and dissemination of latent fingerprints, digitized latent prints, forensic reports, production statistics for management status reporting and standard operating procedures / SOPs).

  • Provide Digital Media and CELLEX processing and analytical support to ensure rapid and accurate exploitation of captured enemy materials.

  • Devise a Digital Media Enabled Watch List (WL) for media of interest in accordance with all applicable SOPs. Manage the Digital Media WL in coordination with NMEC and SOF components to include SOF nominations with all applicable SOPs.

  • Provide DOMEX capability briefings to supported military units and visiting senior leaders.

  • Provide DOMEX production statistics to the COR weekly.

  • Deliver to the COR standardized weekly reporting to include metrics and vignettes of all WL encounters and i2 information of interest collected globally during the week and any future requirements gathering and process development.


Minimum Requirements:
Education: Bachelor's degree (BSEE, BSCS, BSCE) B.S. in Electrical Engineering (BSEE), or B.S. in Computer Science, or B.S. in Civil Engineering or equivalent Forensic degree from a four-year college or university; or equivalent combination of forensic training, certifications (from other DoD or USG training sources), and 3 years of experience with current forensics hardware, software, and methodologies.

Experience: Three (3) or more years of all source analysis experience with military applications and a thorough knowledge of SOF i2 operations, intelligence, and interagency processes and procedures; Proficiency in collecting, reviewing, analyzing, exploiting, fusing, authoring, and disseminating digital multimedia, i2 information and hardcopy products; Proficient in collecting, reviewing, analyzing and disseminating i2 products.

Certificates: None
Clearance: TS/SCI Clearance required
US Passport: Required for OCONUS travel
Language: Must speak fluent English

Computers: Proficient in SSE collection platforms (SEEK, Guardian-R, EL-1003 Trace Element Detector, XRY Cell Phone Extraction, FRED-L high level computer analysis, ADF G-2 low level computer exploitation, Tableau TD-1 disk imager, latent print collection kits, and Trace Element Analysis tools such as HAZMAT ID, AHURA, and SABRE 4000/5000).

A minimum 1-year experience in a combination of the following:
    • Using FTK 1x/3x, EnCase 5x or 6x, iLook, P2 Commander, or similar forensic examination toolsets.
    • With new technologies and programming techniques for multiple software languages, including, but not limited to SQL programming, C#, C/C++, Perl, Python.
    • Using regular expression patterns in order to conduct bit-by-bit live searches on media.
    • Producing forensically sound images of digital media, i.e., SATA, IDE, flash drives using imaging software, such as FTK imager or other command line tools, both internal & external write block hardware.
    • Wiping, verifying, and validating media before and after conducting an examination.
    • Using virtual platforms such as VMware Server / Workstation in order to mount & view media in its native operating system.
    • Data recovery/carving experience using WinHEX, X-Ways Forensics or similar tool.
    • Using regular expression patterns in order to conduct bit-by-bit live searches on media.
    • Understanding Basic Unix commands for study of CACHE Flow Logs & of hexadecimal code, file structures to include file headers and footers.
    • Using Web filtering, Spam Filtering, and Message Capturing Technologies.
    • Conducting cell phone exploitation and extracting pertinent data using cell phone analysis tools such as Device Seizure, Neutrino, BitPim, .XRY/.XACT and other open source tools.
    • Using Hyper Terminal to communicate with cell phones using AT commands.
    • Using cell phone analysis tools such as Device Seizure, BitPim, .XRY/.XACT.

Desired or Preferred Knowledge, Skills, & Abilities:


Physical Demands - The physical demands described here are representative of those that may need to be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

While performing the duties of this Job, the employee is regularly required to sit and talk or hear. The employee is frequently required to walk; use hands to finger, handle, or feel and reach with hands and arms. The employee is occasionally required to stand; climb or balance and stoop, kneel, crouch, or crawl. The employee must occasionally lift and/or move up to 20 pounds. 126656

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.