
Contract Subject Matter Expert – Cyber Defense Forensics Analyst
Freedom
contract
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Tech Stack
About the role
- Complete a practitioner-level skills assessment
- Complete a short post-assessment survey
- No meetings, facilitation, reviews, or follow-up work
- This is a finite, transactional engagement with clearly defined deliverables.
- Estimated assessment length: ~120 items
- Estimated completion time: Approximately 1 hour
- Assessment window: Must be completed within a defined access period (typically 5 business days once access is granted)
- Once started, the assessment must be completed within 24 hours
Requirements
- Candidates must be current practitioners with applied, real-world experience analyzing digital evidence and supporting cybersecurity investigations.
- Familiarity should align with one or more of the following areas:
- Conducting digital forensic analysis in support of cybersecurity investigations
- Collecting, preserving, and analyzing digital evidence from endpoints, servers, or network sources
- Applying forensic principles to maintain evidence integrity and chain of custody
- Investigating computer security incidents to determine scope, impact, and root cause
- Analyzing logs, memory, disk images, and network artifacts
- Using forensic and investigative tools to support incident response and vulnerability mitigation
- Understanding common attack techniques, malware behaviors, and adversary tradecraft
- Supporting incident response teams with forensic findings and technical insights
- Documenting investigative processes, findings, and conclusions in clear reports
- Understanding legal, policy, and procedural considerations related to forensic investigations.
- Participants must score above 50% on the assessment
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
digital forensic analysisanalyzing digital evidenceevidence preservationchain of custodyincident investigationlog analysismemory analysisdisk image analysisnetwork artifact analysisforensic principles
Soft Skills
clear documentationtechnical insightsanalytical thinkingattention to detail