Digital Forensics SME (Must have Top Secret with SCI Eligibility)
Employment Type: Full-Time
Industry: Advertising/Marketing/Public Relations
SAVA Workforce Solutions, LLC an Akima Company, delivers enterprise IT and mission support solutions to the federal government, serving the federal civilian, defense, law enforcement and intelligence communities. SAVA helps our customers strengthen national security, improve communications and collaboration and secure the integrity of their data, information systems and networks. Our personnel enjoy competitive benefits packages and challenging roles in work environments committed to innovation, diversity and opportunity for career growth. As an Alaska Native Corporation (ANC), 100% of our company’s profits go back to our 14,300 Iñupiat shareholders that have resided near and above the Arctic Circle for more than 10,000 years. Our business helps support their way of life and contributes to the survival of a culture that has thrived in a challenging environment. Responsibilities: Provide advice, recommendations, and consultation to the NDCAC Director in the area of digital forensics. Inform NDCAC program personnel regarding current training, tool sharing, and techniques for evidence collection, data collection, and processing requirements. Provide SME reach back to the Technical Resource Group (TRG) in their assistance and knowledge sharing with other Federal, State, and local law enforcement agencies (LEAs) regarding their challenges with evidence collection from communication devices. Produce accurate, evidence-based, high quality reports and presentations. Continuously improve forensic skills through ongoing research, development and education in order to develop training programs and curriculum to provide instruction for forensic examinations of cell phones and other digital computer forensics subjects. Identify and become knowledgeable in new digital and mobile device forensic methodologies and techniques as new technologies emerge. Provide weekly and monthly reports detailing activities during the time period and report on future planned activities for the upcoming week and month respectively.
We are looking for a Digital Forensics SME with expertise and experience in the exploitation of communications technology in criminal investigations at the State and local level.
Educational and Clearance Requirements: Must have a B.A. or B.S. degree or equivalent in mobile and computer forensics or related field. Must have a Top Secret Security Clearance.
General/Specialized Experience: Must have 10 years of experience in the required subject field, including 6 years of specialized experience.
Additional education may be substituted for years of experience. Must have at least 6 years practical technical experience directly related to the required area of expertise within the law enforcement community, intelligence community or other related Government Agency.
Experience Requirements: Must have demonstrated knowledge and development of current digital forensic techniques and procedures in the recovery of embedded memory devices including: JTAG/ISP Data Extraction and Data Analysis Techniques, Chip-Off Data Extraction and Data Analysis Techniques, Advanced SQLite Data parsing, Mobile Device Database application decryption and analysis, Mobile Device Repair, Mobile Device Best Practices, and Mobile Device Training Best Practices.
Must have documented industry involvement and leadership within the Digital Evidence community.
Examples of industry involvement include: The American Academy of Forensic Advisors (AAFS), The Organization of Scientific Area Committees (OSAC), or the Scientific Working Group on Digital Evidence (SWGDE).
Deep knowledge and experience with the forensic laboratory accreditation process and accreditations such as American Society of Crime Laboratory Directors / Laboratory Accreditation Board (ASCLAD/LAB).
Electrical Engineering or Computer Engineering experience with a demonstrated history of a competent level of data recovery and repair. Experience with using IR Rework Stations for the removal of surface mounted devices (SMDs) such as Ball Grid Array (BGA). Experience with a device similar to ERSA IR550.
Work effectively as a team contributor and independently with minimal supervision or direction.
Strong verbal and written communication skills
Familiar with programming languages used to develop computer forensics tools such as: Objective C (Apple), Perl (ActiveState and Strawberry), Python (2.x/3.x) , C++, Bash Shell, C-Shell (tcsh), and Batch Scripting (MS DOS).
Proficiency in forensic techniques and tools (e.g., X-Ways, EnCase, FTK Suite, Cellebrite, Nuix).
Proficiency in mobile forensic tools such as, UFED4PC, UFED Touch, UFED Physical Analyzer, UFED Classic, Device Seizure, Riff Box, Infinity Box.
Experience with scripting languages to automate investigative and routine functions.
Experience with Microsoft, Apple, and Linux-based operating systems.
Experience with server, workstation and mobile device hardware and software.
Familiar with network infrastructure components, as well as virtual and cloud environments.
Creative problem solving abilities.
Ability to anticipate and respond to changing priorities in a professional manner (triage, prioritization, multi-tasking, project scheduling).
Available for occasional travel.
Current forensic certification (e.g., CCE, GCFE, GCFA, EnCE, CFE).
Loading some great jobs for you...