DFIR Lead
DFIR Lead - Job Description
Company Summary
Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’ Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology. Our goal is to get businesses fully operational as quickly as possible and to further prevent any downtown or impact to the business operations. CyberClan investigates and assists clients with all types of security breaches, insider threat, unauthorized access, malicious code.
Job Summary
This role serves as a critical leader within the global CERT and DFIR team, managing end-to-end incident response operations, including detection, analysis, containment, and remediation of security incidents. The position oversees the development and execution of incident response plans, leads cross-functional teams during crises, and ensures clear communication with internal and external stakeholders. The role is responsible for enhancing IR capabilities through tooling, training, process development, and KPI reporting, while also providing mentorship and technical expertise across investigations and forensic analysis. This role drives operational excellence, supports 24/7 response coverage, manages key resources, and plays a vital part in improving client outcomes and advancing organizational security maturity.
Responsibilities of Role
• Provide initial analysis and identification of IOC’s, escalation to the appropriate business units and post-incident activities.
• Oversee Incident Response Plans: Design, implement, and manage the client's incident response policies and procedures to ensure preparedness.
• Coordinate Incident Response Teams: Lead cross-functional teams during security incidents, ensuring an organised and timely response.
• Triage and Prioritise Incidents: Assess incidents for severity and potential impact, assigning appropriate resources and setting response priorities.
• Communication: Serve as technical point of contact during an incident, providing updates to internal and external stakeholders.
• Maintain and prepare departmental reports for Key Performance Indicators (KPIs) to be presented to the Global Head of DFIR and EVP Sales & Revenue as needed
• Responsible for supporting a wide number of technologies and being able to proficiently perform advanced troubleshooting on the fly (packet captures, debugs, traffic analysis)
• Work on the continued development of DFIR/CERT and Machine investigation lifecycles as part of the ongoing process to enhance IR capabilities; also provided significant contribution to the revision of Incident Response and Post Breach Remediation policies, procedures and process.
• Support in the departments DFIR tooling selection process and any proof of concept projects.
• Chain of Custody: Ensure that evidence is collected, handled, and preserved in a legally defensible manner, maintaining the chain of custody for potential litigation.
• Perform live-endpoint investigation, including the identification and gathering of key forensic artifacts, offline investigation as needed and providing remediation actions as needed.
• Implement and deploy an Incident Response focused ticketing system to improve incident tracking, remediation and metrics for incidents worked.
• Post-incident Analysis: Conduct root cause analysis after incidents to identify vulnerabilities and develop strategies to prevent recurrence.
• Recovery Support: Work closely with IT and cybersecurity teams to guide recovery efforts, including system restoration and remediation.
• Responsible for working with 3rd parties in order to assist with incident response, business email compromise, security breach, improve overall security, investigations, recommendations and remediation.
• Assists Sales and SOC in the successful conversion from incident response, PBR, RMS, eDiscovery to SOC; including process and procedure build out.
• Budget and Resource Management: Oversee the allocation of resources, including personnel, tools, and budgets, to effectively manage incident response and forensics operations.
• Oversee the allocation of resources, including personnel, tools, and budgets, to effectively manage incident response and forensics operations.
• Create and maintain and enhanced onboarding program that is concise and repeatable, effectively covering all aspects of the CERT role
• Serve as a member of a 24x7/365 service delivery team that handles incident response, post breach remediation, escalation, required to perform complex investigations and/or troubleshooting and driving root cause to resolution.
• Incident Response Training: Organise and lead training sessions and simulations (e.g., tabletop exercises) for CERT staff to improve readiness and response capabilities.
• Client Education: Raise awareness across external organisations about digital forensics, incident response protocols, and security best practices.
• Maintain and manage AWS instances to ensure timely deletion and removal of data to minimize company and customer fees/overages
• Other duties as assigned
Requirements/Must Haves
• Minimum 6 - 7 years of experience in Incident Response
• Experience in conducting Tabletop Exercises in Incident Response
• Experience in the deployment and management of EDR Technology
• Experience with Security Technologies and NIST Framework
• Developing, documenting and implementing incident response methods, process
• Perform live endpoint investigations
• Experience in forensic investigations both on-premise and cloud
• Experience in mentoring developing and delivering inhouse training
• Must be available to provide coverage to meet business requirements in 3 regions
• Strong knowledge of DFIR Tools
• Strong knowledge of Virtualization Technologies, Operating Systems, Firewalls, VPN’s, SIEM, Enterprise Gateway Technologies, Networking Devices, Security Technologies, etc.
Asset/Nice-to-Have
• Bilingual – Ability to communicate in English and French
Job Type
• Full-Time/Exempt
Location
• 100% Telecommuting
• Candidate must have legal authorization to work in the UK
• Ability to travel up to 10% of the time as necessary for complex CERT incidents and for customer sales & marketing-based events as needed (This can include international travel from time to time)
Physical Requirements
• Prolonged periods of sitting at a desk and working on a computer.
CyberClan is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status.
Benefits
UK:
- Annual Leave
- Wellness Leave
- Birthday Day
- Pension
CyberClan is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran, or disability status