Mobile Exploitation Analyst- Mid Level

ID
2019-1830
Job Location
US-MD-Bethesda

Overview

Bluehawk is looking for a Mobile Exploitation Analyst- Mid Level to work in Bethesda, MD.

 

Responsibilities

In providing Mobile Exploitation Analyst support, the Contractor shall provide
some or all of services as required:

 

  • Conduct forensic examination of High Priority Digital Media derived from
    mobile devices to include:
    Full-Scope forensic examinations
    Advanced registry and Internet history analysis
  • Steganography detection and analysis
  • Large data set analysis and Target language Keyword search
  • Forensic tool and script development
  • Sector-level entity extraction
  • Metadata extraction and analysis
  • Network forensics and analysis
  • Generate forensic reports of interest to OTE customers and the Intel
    Community
  • Perform application and internet activities analysis to support source
    vetting, digital profiling, and other requirements
  • Apply reverse engineering techniques to detect and identify malware
  • Coordinate, develop and promulgate forensic and technical exploitation
    standards for forward deployed IC/DoD assets
  • Provide technical support for federated partners, internal customer, and
    NMEC deployed platforms
  • Provide global Technical Exploitation response capabilities to include:
  • Provide deployable technical exploitation personnel to meet DOD
    & partner contingency requirements
  • Provide expert multi-functional exploitation expertise as required
  • Coordinate with NMEC Operations on
    MEDEX/CELLEX/VIDEX platform & training related issues
  • Plan, Integrate & Execute full-spectrum technical exploitation plans,
    exercises, training and operations as required
  • Assist in the conduct of Site Exploitation (SE) activities as required
  • Provide technical support to field collection and other operational partner
    elements to include:
  • Diverse set of technical exploitation tools & tradecraft
  • Hardware Exploitation
  • Firmware Exploitation
  • Assist asset validation & credibility assessments by providing baseline
    assessments of digital media and cellular telephones

Qualifications

Contractor personnel assigned shall have the following
qualifications:

 

  • Must have a Bachelor's degree in Computer Science or STEM discipline
    and at least four (4) years of related experience.
  • Minimum of 2 years of demonstrated technical exploitation experience and
    skills such as computer forensics, DOMEX, reverse engineering, and malware
    analysis
  • Experience designing, implementing and documenting computer forensics
    services to include evidence seizure, computer forensic analysis and data recovery
  • Experience conveying technical information effectively and concisely to a
    wide range of audiences
  • One or more industry-standard forensic certifications (EnCe, ACE, CCFE,
    GCFH, GCFE, GASF. CCE)
  • Working experience in hardware configuration and network/data
    communications
  • Working experience with software engineering and scripting
  • Working experience in database technology and database
    exploitation/forensics
  • Working experience in law enforcement evidence seizure
  • Working experience conducting intelligence analysis and writing finished
    intelligence reporting

Bluehawk, LLC. is an Equal Opportunity/Affirmative Action Employer/

/EOE Minority/Female/Disabled/Veteran/Sexual Orientation/Gender Identity/

 

Connect With Us!

Not ready to apply? Connect with us for general consideration.