🚀 Forensics / Malware Analyst

Hiring now — limited positions available!

Quadrant, Inc.

💰 Earn $125.000 – $150.000 / year
  • 📍 Location: Washington
  • 📅 Posted: Oct 28, 2025

Overview

Forensics/Malware Analyst — Washington, DC

Pay From: $55.00 per hour

Must

  • Experienced Forensics/Malware Analyst
  • Must have one of the following certifications: GCIA, GCIH, GMON, GDAT, Splunk Core Power User
  • Priority if you have one of the following certs: SANS, GCFA cert, EnCase Certified Examiner cert or Volatility
  • 5 years of experience performing incident response activities for cloud-based and non-cloud-based environments, such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Zscaler
  • 5 years of experience analyzing forensic artifacts, performing filesystem timeline analyses, and identifying intrusion root causes of operating systems (e.g., Windows, Linux, and macOS)
  • 5 years of experience collecting and analyzing data from compromised systems using EDR agents (e.g., CrowdStrike) and custom scripts
  • 5 years of experience utilizing the following forensics tools:
    • Splunk to perform live forensic analysis
    • Magnet AXIOM to acquire, analyze, and report on digital evidence
    • Volatility framework to analyze volatile memory (RAM) dumps
  • Must have ability to perform required forensics/malware analyst duties, including:
  • Create duplicates of evidence that ensure the original evidence is not unintentionally modified
  • Extracting deleted data using data carving techniques
  • Performing static and dynamic malware analysis to discover indicators of compromise (IOCs)
  • Bachelors degree preferred

DUTIES

  • Provides digital forensics and incident response support to the Security Operations Center (SOC).
  • Collects, analyzes, and evaluates forensic artifacts associated with threat activity against Judiciary networks.
  • Produces forensics reports to assist the SOC and the Courts in understanding the nature and impact of cyber incidents and in prioritizing risk mitigation across the Judicial Branch of Government.
  • Accepts and responds to government technical requests through AOUSC ITSM tickets (e.g., HEAT or Service Now) for advanced SME technical investigative support for real-time incident response (IR).
  • IR includes cloud-based and non-cloud-based applications such as Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (e.g., Zscaler).
  • Create duplicates of evidence that ensure the original evidence is not unintentionally modified. Use AOUSC supplied procedures and tools to acquire the evidence.
  • Analyze forensic artifacts of operating systems (Windows, Linux, macOS) to discover intrusion elements and identify root cause.
  • Perform live forensic analysis based on SIEM data (e.g., Splunk).
  • Perform filesystem timeline analysis for inclusion in forensic reports.
  • Extract deleted data using data carving techniques.
  • Collect and analyze data from compromised systems using EDR agents and custom scripts provided by AOUSC.
  • Perform static and dynamic malware analysis to discover indicators of compromise (IOC).
  • Analyze memory images to identify malicious patterns using Judiciary tools (e.g., Volatility). Document analysis results in forensics reports.
  • Additional forensics/malware analysis activities may include: identify and communicate cybersecurity threats and risks with clarity; reduce adversary dwell time within judicial networks; analyze security incidents for root cause and improvement opportunities.

Quadrant is an affirmative action/equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, status as a protected veteran, or status as an individual with a disability.

#J-18808-Ljbffr
👉 Apply Now

Hurry — interviews are being scheduled daily!