DCO Watch Analyst Tier III Forensics Stuttgart

Adapt Forward
Stuttgart, Germany
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Shift work
Languages
English
Experience level
Intermediate

Job location

Stuttgart, Germany

Tech stack

Microsoft Windows
C++
Computer Security
Computer Programming
Data Transmissions
Linux
Digital Forensics
Intrusion Detection Systems
Python
Network Connections
Powershell
Rust
Data Logging
Operational Systems
3-tier Architectures
Purple Team (Cyber Security)
Cyber Warfare
Splunk
Go

Job description

As a Tier 3 Defensive Cyber Operations (DCO) Watch Analyst you will be responsible for leading complex incident responses, conducting proactive threat hunting, and enhancing detection capabilities within a Cybersecurity Service Provider (CSSP) environment. You will oversee incident analysis, coordinate with external entities, and drive purple team activities to strengthen security posture. This role requires advanced expertise and compliance with CJCSM 6510.01B., * Examine system, software, security, and user hives for evidence of program execution, USB usage, network connections, and user activity

  • Execute forensic imaging of computers and storage media
  • Acquire and analyze digital evidence using industry-standard forensic tools and techniques on Windows and Linux systems including prefetch, jump lists, shellbags, and other operating system specific artifacts.
  • Acquire and analyze memory captures to recover additional artifacts and evidence.
  • Decode and interpret various file formats and digital communications
  • In-depth understanding of digital forensic methodologies, incident response workflows, and forensic tools
  • Lead incident response efforts, including analysis, mitigation, and reporting of significant incidents per CJCSM 6510.01B
  • Manage incident response campaigns by developing strategies, coordinating multi-team efforts, and ensuring comprehensive resolution and reporting
  • Conduct proactive threat hunting to identify advanced threats and vulnerabilities within the network
  • Lead purple team exercises to evaluate and enhance detection and response capabilities in collaboration with red and blue teams
  • Evaluate and refine detection mechanisms, including IDS/IPS signatures and log correlation rules, to improve accuracy and reduce false positives
  • Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations
  • Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents
  • Develop and maintain internal SOP documentation, ensuring alignment with CJCSM 6510.01B and other directives
  • Provide 24/7 support for incident response during non-core hours, and mentor junior analysts
  • Lead program reviews, product evaluations, and onsite certification evaluations
  • Overtime may be required to support incident response actions (Surge).
  • Operations are conducted 24/7/365 across three regional operation centers (ROC)
  • Each ROC works four ten-hour shifts (Sunday-Wednesday or Wednesday-Saturday)
  • Shift placement is at the discretion of assigned managers

Requirements

Do you have experience in Windows?, Do you have a Bachelor's degree?, * Bachelor's Degree in relevant discipline and 5 years or at least 8 years of experience working in a CSSP, SOC, or similar environment

  • 2+ years of experience performing tactical forensics duties
  • Must be a U.S. Citizen

Desired Qualifications

  • Experience and expertise in incident response forensic activities
  • Proficient programming skills in a common language such as PowerShell, Python, Golang, Rust or C/C++
  • Forensic focused certification such as GCFA, GCFE, etc.
  • Comprehensive knowledge of CJCSM 6510.01B
  • Deep expertise in IDS/IPS solutions, including signature development and optimization
  • Extensive experience with Digital Forensics across multiple operating systems
  • Demonstrated expert-level knowledge of Incident Response Procedures
  • Advanced proficiency with host-based tools and operating system logging
  • Expertise in log aggregation tools (e.g., Splunk, Elastic, Sentinel) for complex correlation analysis
  • Exceptional logical thinking and analytical ability
  • Superior verbal and written communication skills
  • Proven ability to solve complex problems independently

Required Certifications

  • Must have requisite certifications to fulfill DoD 8570 IAT Level II and CSSP-specific requirements

Benefits & conditions

  • Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan.
  • 401k Retirement Plan with Matching Contribution is immediately available and vested.
  • Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses.
  • Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month.
  • Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered.

About the company

Adapt Forward is a cybersecurity solutions provider for some of the nation's most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.

Apply for this position