All Positions

Cybersecurity

Digital Forensics Specialist

Position QualificationType 1Type 2

About This Position

Sameas Type2 The National Incident Management System(NIMS) Not Specified Type2Digital Forensics Specialist: 1.Collects,processesandpreservescomputer-related evidenceinsupportofnetworkvulnerabilitymitigation andcriminalfraudcounterintelligenceorlaw enforcementinvestigations 2.Worksunderthetechnicaldirectionofthe NIMS Type1Digital Forensics Specialist

Training Requirements

Sameas Type2 Completionofthefollowing: 1.Anyuseoftheterm“forensics”isdescriptiveofaskill 1.IS-100:Introductionto Incident Command System, orcapabilityanddoesnotimplyalawenforcementrole ICS-100 2.NIMSTraining Programdefinesanationalbaseline 2.IS-200:Basic Incident Command Systemfor Initial toguideandpromote NIMStraining.Itprovides Response,ICS-200 recommendationstoassist Authorities Having 3.IS-700:An Introductiontothe National Incident Jurisdiction(AHJ)indevelopingtheirowntraining Management System plans,tailoredtotheirspecificneeds 4.IS-800:National Response Framework,An Introduction 1.4-SEPTEMBER2025 DIGITALFORENSICSSPECIALIST 1OF5 Position Qualificationfor Cybersecurity Cybersecurity COMPONENT TYPE1 TYPE2 NOTES

Experience

Sameas Type2,PLUS: AHJ-validatedknowledge,skillsandabilities Theknowledge,skillsandabilitiesalignwiththe Knowledge,Skillsand Abilities: demonstratedinthefollowingareas: National Initiativefor Cyber Education(NICE)National 1.Securityeventcorrelationtools 1.Electronicevidencelaw Cybersecurity Workforce Framework 2.Debuggingproceduresandtools 2.Legalrulesofevidenceandcourtprocedure 3.Reverseengineeringconcepts 3.Recognizingdifferenttypesofdigitalforensicsdata 4.Networksecurityarchitectureconcepts,including 4.Deployableforensics topology,protocols,componentsandprinciples 5.Anti-forensictactics,techniquesandprocedures 5.Basicsystemadministration,networkandoperating 6.Commonforensictoolconfigurationandsupport hardeningtechniques applicationsfromtheleadingindustrytools 6.Malwareanalysistools 7.Datacarvingtoolsandtechnique 7.Conductingforensicanalysesinmultipleoperating 8.Computer Fraudand Abuse Act systemenvironments 9.Virtualmachineawaremalware,awaredebugger 8.Analysisofcapturedmaliciouscode malwareandpacking 9.Usingbinaryanalysistools 10.Basicconceptsandpracticesofprocessingdigital 10.Identifyingabnormalorirregularcodeand forensicdata determiningwhetheritisathreat 11.Encryptionalgorithms 11.Identifyingobscurethreatsandtechniques 12.Incidentresponseandhandlingmethodologies 12.Interpretingresultsofdebuggertoascertaintactics, 13.Desktop,server,mainframeoperatingsystems techniquesandprocedures including Windows,Unix,Linuxand Mac OS 13.Developing,testingandimplementingnetwork 14.Server

FEMA RTLT Standard

Digital Forensics Specialist

ID: 13-509-1253

Do you serve in this role?

Grey Sky documents and verifies your service against the FEMA standard. Start your record today.

Tell Your Story