/or Incident Response space. Familiarity with the EDRM and experience in supporting eDiscovery software (particularly Relativity) and related products/tools such as: 1) Forensic Capture Software (e.g. EnCase, Cellebrite, Oxygen, FTK); 2) Database/Programming: (e.g. Microsoft SQL Server, SQL, Microsoft Access, Visual Basic, Python); 3) Email Systems (e.g. Office 365, Microsoft Exchange, Lotus Notes/Domino More ❯
Processing Platforms (e.g. Relativity, Reveal, Brainspace, Disco, Ringtail, CasePoint, Nuix, or comparable). Preferable to have industry recognised technical accreditations, such as RCA. Awareness of Forensic Capture Software (e.g. EnCase, Cellebrite, Oxygen, FTK) and general IT infrastructure, such as Office 365, Microsoft and Linux operating systems, email journal platforms and backup software. Benefits Benefits At Interpath, our people lie More ❯
and tool optimisation. About You Extensive experience in digital forensics, ideally within law enforcement or consultancy. Demonstrable expert witness and cross-examination experience. Ideally skilled in tools such as EnCase, FTK, Cellebrite, Magnet AXIOM, or similar. Strong communicator, leader, and problem-solver. Digital Forensics Manager Greater London Up to More ❯
and tool optimisation. About You Extensive experience in digital forensics, ideally within law enforcement or consultancy. Demonstrable expert witness and cross-examination experience. Ideally skilled in tools such as EnCase, FTK, Cellebrite, Magnet AXIOM, or similar. Strong communicator, leader, and problem-solver. Digital Forensics Manager Greater London Up to More ❯
X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope … Experience with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the More ❯
X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope … Experience with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the More ❯