The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Digital Forensics, including Digital Forensics Examiner, Computer Forensic Analyst/Expert, and Digital Forensics Incident Response Analyst/Expert. All positions are in the DHS Cybersecurity Service.
DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the ongoing need for cybersecurity talent, DHS-CS uses "Talent Pools" to pull qualified applicants (i.e., individuals who have successfully completed the multi-phase assessment process for their capability and career track/level) for consideration for these jobs.
This announcement is being used to fill the Digital Forensics Talent Pool. By applying to this job announcement, you are opting to be part of the DHS-CS Talent Pool for ongoing consideration for employment for relevant open jobs and will remain eligible for consideration for up to one year from the date of completion.
There are a variety of Digital Forensics opportunities across the Department, including supporting several specialized programs at DHS Office of Strategy, Policy, and Plans (PLCY ) the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) .
Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track, with a technical capability in Digital Forensics, will generally apply their expertise to perform a range of tasks, including:
- Applying techniques for gathering, recovering, analyzing, interpreting and presenting digital information and evidence from sources such as computers, mobile devices, websites, network packets, etc. to support DHS and Component investigative activities.
- Using forensic artifacts, data, and reports to understand and/or reconstruct a digital process, event, or activities, and assisting others who are less seasoned in these areas.
- Applying various techniques and tools (e.g., hexadecimal dumper, disassembler, debugger) to analyze software/hardware, retrieve its source code, and understand its component parts, functions, and purpose to identify the software's underlying vulnerabilities and exploitable weaknesses.
- Preserving digital media (e.g., hard drives, CDs, mobile phones, GPS, etc.) for examination and analysis to see the intrusion as the user may have seen it, avoiding unintentional alteration to the native environment.
- Conducting analysis of log files, evidence, and other information using network monitoring tools to capture and analyze data and network traffic associated with malicious activities and determine best methods to identify network perpetrators.
- Collecting and analyzing intrusion artifacts (e.g., source code, malware, and system configuration) to identify the TTPs (tactics, techniques and procedures) of an adversary and use discovered data to enable mitigation of potential cyber events.
- Communicating incident findings from a forensic investigation to appropriate stakeholders outlining recommendations to prevent and mitigate future risks and threats using cyber defense techniques.
- Providing key technical input to assist organizational leaders with decision-making and actions related to a variety of critical cybersecurity threats and/or incidents and providing strategic-level analysis to support broader DHS cyber missions.
- Providing technical and non-technical assistance to investigative personnel on digital evidence matters using a full range of investigative tools and processes in accordance with applicable laws, policies, guidelines regulations and procedures.
- Examining recovered data and applying knowledge of malicious software programs and code that interferes with normal computer functions to perform malware analysis.
- Advising Federal and National DHS stakeholder organizations on handing highly complex cybersecurity investigations and influencing policy decision making on a range of technical topics within and outside DHS.
- Leveraging collaborative networks of internal and/or external DHS partners and/or national technical experts to facilitate achievement of strategically important DHS and national cybersecurity goals.
This position is in the Technical Track across a range of career levels. Employees in this career track generally:
- Have between 5-15 years of cybersecurity work experience.
- Range from experienced cybersecurity professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.
DHS Cybersecurity Service employees with a technical capability in Digital Forensics will generally:
- Collect, process, analyze, interpret, preserve, and present digital evidence in support of network vulnerability mitigation, intelligence operations, and different types of investigations (including but not limited to administrative, criminal, counterintelligence and law enforcement).
- Apply tactics, techniques, and procedures (TTPs) for investigative processes.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise. In recruiting for this opportunity, DHS may hire employees at higher or lower career levels and associated salaries. To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal .
This position is focused on Digital Forensics.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities. To learn more about technical capabilities, visit our application portal .