×
Register Here to Apply for Jobs or Post Jobs. X

Host Cyber Systems Analyst III

Job in Arlington, Arlington County, Virginia, 22201, USA
Listing for: ARGO Cyber Systems
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 120000 - 140000 USD Yearly USD 120000.00 140000.00 YEAR
Job Description & How to Apply Below
Position: Host Based Cyber Systems Analyst III

Host-Based Systems Analyst III (HBA
03) — Full Performance

Location: Onsite / Remote (as required for mission)

Clearance: Active TS/SCI with DHS EOD eligibility

Company: Argo Cyber Systems, LLC - Service-Disabled Veteran-Owned Small Business (SDVOSB)

About Argo Cyber Systems

Argo Cyber Systems supports the Department of Homeland Security (DHS)
Hunt and Incident Response Team (HIRT) in protecting the Nation's cyber and communications infrastructure. Our mission-driven analysts provide rapid onsite and remote response, advanced forensics, and proactive threat-hunting capabilities across federal civilian networks and high-value assets.

As part of the HIRT mission, Argo personnel deliver advanced technical assistance, incident containment, and forensic expertise to mitigate intrusions, restore operations, and strengthen national cyber resilience.

Position Overview

Argo Cyber Systems is seeking an experienced Host-Based Systems Analyst III (HBA
03)
to support DHS HIRT's national incident response and digital forensics operations. The successful candidate will lead and execute host-level forensic analysis, malware triage, and investigative reporting in response to advanced cyber threats targeting critical government systems.

This role combines hands‑on technical expertise with mission‑critical communication and coordination responsibilities — directly supporting DHS leadership and federal stakeholders during high‑impact incidents.

Key Responsibilities
  • Lead and coordinate forensic investigations in support of incident response engagements and post-compromise assessments.
  • Plan, direct, and execute the collection, examination, and analysis of host-based evidence across multiple operating systems and environments.
  • Acquire, preserve, and analyze digital artifacts (malware, volatile memory, registry data, user activity, logs, and executables) to support attribution and root‑cause analysis.
  • Perform forensic triage to determine incident scope, urgency, and potential impact on enterprise operations.
  • Correlate host-level findings with network telemetry to reconstruct intrusion narratives and identify persistence or lateral movement.
  • Evaluate and dissect malicious code and executable behavior to identify tactics, techniques, and procedures (TTPs).
  • Maintain strict chain of custody and documentation standards to ensure evidence integrity.
  • Distill technical analysis into clear, actionable reports and executive summaries suitable for senior leadership and interagency partners.
  • Serve as a technical liaison to government stakeholders, explaining forensic methodologies, tools, and findings in both technical and operational terms.
  • Support the development of Computer Network Defense (CND) guidance, playbooks, and after‑action reports based on investigative outcomes.
Required Qualifications
  • U.S. Citizenship (required)
  • Active TS/SCI clearance (required)
  • Ability to obtain DHS Entry on Duty (EOD) Suitability
  • 5+ years of hands‑on experience conducting host-based or digital forensic investigations
  • Expertise in forensically sound data acquisition, duplication, and preservation
  • Proficiency in analyzing, categorizing, and reporting cyber attacks and system compromises
  • Strong knowledge of evidence handling procedures, documentation, and chain‑of‑custody standards
  • Familiarity with attack lifecycle phases and common adversary techniques
  • Comprehensive understanding of system and application security threats, vulnerabilities, and mitigation strategies
  • Experience performing host triage, live response, and volatile memory analysis
  • Proficiency with Windows, Linux/Unix, and related file systems
  • Demonstrated ability to collaborate across distributed teams in time‑sensitive operational environments
Desired Qualifications
  • Proficiency with two or more of the following forensic and analysis tools:
    • EnCase, FTK, X-Ways, SIFT, Volatility, Sleuth Kit/Autopsy
    • Wireshark, Splunk, Snort, or EDR tools (Crowd Strike, Carbon Black, Sentinel One)
  • Experience conducting malware reverse‑engineering and all‑source research
  • Understanding of threat actor TTPs and advanced intrusion methodologies
  • Strong communication skills for technical briefings and interagency coordination
Education
  • Bachelor's Degree in Computer Science, Cybersecurity, Computer Engineering, or a related field
  • High School Diploma with 7‑9 years of host or digital forensics experience
Preferred Certifications
  • GCFA, GCFE, GCIH, EnCE, CCE, CFCE, CISSP, or equivalent
Why Join Argo Cyber Systems

Argo Cyber Systems empowers federal partners to outpace and outmaneuver adversaries through precision forensics, agile response, and mission‑first cybersecurity operations. As part of the DHS HIRT mission, you will be on the front lines of national cyber defense—supporting the investigation, containment, and recovery of the nation's most critical systems.

Salary: $120,000 – $140,000 per year

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary
 
Learn4Good is currently undergoing necessary server maintenance.
We hope to have the Login & Registration options back in 5 minutes, and apologize for any inconvenience.