Conduct forensic host, network, and application technical investigations
Triage active high-stakes security events, including reviewing and applying security controls to detect, respond, prevent and remediate threats
Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
Develop custom scripts, tools, or methodologies to enhance our IR processes
Develop comprehensive and accurate reports of forensic findings and IR activities for both technical and executive audiences
Effectively communicate investigative findings and strategy to various client stakeholders
Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks
Assist with the scoping of new engagements using a whole lifecycle approach, guiding the client from initial discovery through mitigation and remediation
Requirements
Significant experience in a forensic and incident response role
One or more of the following technical certifications preferred: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), MCFE, EnCE or equivalent certifications
Demonstrated experience using analytical skills in a cybersecurity environment to triage and detect events transpired and deal with Ransomware forensic investigations
Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats
Experience in a technical role for a consulting company
Benefits
Medical, dental, vision, disability, FSA, HSA, life and AD&D insurance
401(k) Plan
PTO, sick, holiday, & parental leave details are available
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
forensic investigationsincident responsesecurity controlsindicators of compromisecustom scriptsanalytical skillsRansomware investigationsremediationcountermeasures