and respond to that threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being … proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and … dynamic malware analysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling more »
and respond to that threat. Responsibilities Manage and co-ordinate cyber security incidents for our clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being … proficiency in at least one of these areas: network security/traffic/log analysis; Linux and/or Mac/Unix operating system forensics; Linux/Unix disk forensics (ext2/3/4, HFS+, and/or APFS file systems), advanced memory forensics, static and … dynamic malware analysis/reverse engineering, advanced mobile device forensics Advanced experience in industry computer forensic tools such as X-Ways, EnCase, FTK, Internet Evidence Finder (IEF)/AXIOM, TZWorks, and/or Cellebrite Advanced experience in preservation of digital evidence (including experience preserving cloud data and handling more »
including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security … via WSA. Experience conducting investigations using EDR/XDR tools like CrowdStrike and MS Defender to investigate Windows/Linux systems. Proficiency in Memory Forensics, dump extraction, and analysis. Qualifications: Essential: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Desired: Master's degree in more »
incident response processes and methodologies. Responsibilities Manage and co-ordinate cyber security incidents for their clients, working closely with the head of cyber response. Digitalforensics of relevant incident data (disk, volatile memory, network packets, log files). Maintaining a current view of the cyber threat, and being more »