Network Forensic Analyst


As our ideal candidate, you will have worked in a 24/7 365 Secure environment & can work shift work. We need candidates who can describe their work as monitoring real time data & identifying issues & being able to analyses these issues.

What you will be doing.

  • Monitor sensors & SOC (Security Operations Center) systems for incidents & malicious activity
  • Analyze security events & identify relevant incidents
  • Correlate & discover relationships between seemingly unrelated events & incidents
  • Generate high quality reports
  • Perform packet analysis & analyze network traffic for security events
  • Coordinate with both Tier 1 & Tier 3 teams while providing incident handling & response support for the agency
  • Contribute to process improvement & efficiency

What you need to work here.

  • BS degree in Computer Science, with 2+ years related experience
  • Experience reviewing & analyzing large amounts of raw log data
  • Experience with information security related tools: Wireshark, Kali, Netcat, TCPDump & NMAP
  • Familiarity in a command line environment in all operating systems
  • Ability to obtain a government security clearance (US Citizenship is required)
  • Desired:
  • Experience working in a mission critical security operations team, preferably 24x7
  • Experience with enterprise level security incident event management tools such as ArcSight or Splunk
  • Scripting (Python, Perl or Shell)
  • CEH, Security+, CISSP, &/or GCIA are desired certifications


  • Competitive Compensation Package
  • Comprehensive insurance packages
  • National career opportunities
  • 401(k) with generous company match and immediate vesting
  • Career-oriented education assistance
  • Paid time-off benefits
Go to top