Desktop, laptop, phones) but also from the cloud and more commercial enterprise wide systems e.g. global email etc. You will have experience with leading Digital Forensic tools e.g. EnCase, FTK, Cellebrite etc. You will have a strong academic background and likely a degree in a related subject. You will be able to attend the office and when required visit client More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
in line with best practice methodologies (ACPO guidelines, ISO17025). Manage and mentor consultants, supporting knowledge sharing across the team. Provide technical leadership on forensic tools such as EnCase, FTK, Axiom, Cellebrite and others. Deliver clear technical explanations and expert guidance to non-technical clients and legal teams. Oversee case management from initial instruction through to reporting, ensuring deadlines and More ❯
systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope work, guide … with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the practice and More ❯
systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope work, guide … with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the practice and More ❯