Leicester, Leicestershire, East Midlands, United Kingdom
Alexander Associates Technical Recruitment
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Alexander Associates Technical Recruitment
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Alexander Associates Technical Recruitment
Conduct forensic acquisition, analysis, and reporting on digital evidence (computers, mobile devices, etc.). Ensure chain-of-custody and evidential integrity is maintained throughout investigations. Use tools like EnCase, FTK, X-Ways, NUIX, Magnet Axiom, Cellebrite UFED, MSAB XRY. Compile comprehensive technical reports suitable for court. Provide clear and professional expert witness testimony. Collaborate with law enforcement and legal professionals. More ❯
Relativity, Reveal, Brainspace, Disco, Ringtail, CasePoint, Nuix, or comparable). Preferable to have industry recognised technical accreditations, such as RCA. Awareness of Forensic Capture Software (e.g. EnCase, Cellebrite, Oxygen, FTK) and general IT infrastructure, such as Office 365, Microsoft and Linux operating systems, email journal platforms and backup software. Benefits At Interpath, our people lie at the heart of our More ❯
Relativity, Reveal, Brainspace, Disco, Ringtail, CasePoint, Nuix, or comparable). Preferable to have industry recognised technical accreditations, such as RCA. Awareness of Forensic Capture Software (e.g. EnCase, Cellebrite, Oxygen, FTK) and general IT infrastructure, such as Office 365, Microsoft and Linux operating systems, email journal platforms and backup software. Benefits At Interpath, our people lie at the heart of our More ❯
london, south east england, united kingdom Hybrid / WFH Options
identifi Global Resources
in line with best practice methodologies (ACPO guidelines, ISO17025). Manage and mentor consultants, supporting knowledge sharing across the team. Provide technical leadership on forensic tools such as EnCase, FTK, Axiom, Cellebrite and others. Deliver clear technical explanations and expert guidance to non-technical clients and legal teams. Oversee case management from initial instruction through to reporting, ensuring deadlines and More ❯
slough, south east england, united kingdom Hybrid / WFH Options
identifi Global Resources
in line with best practice methodologies (ACPO guidelines, ISO17025). Manage and mentor consultants, supporting knowledge sharing across the team. Provide technical leadership on forensic tools such as EnCase, FTK, Axiom, Cellebrite and others. Deliver clear technical explanations and expert guidance to non-technical clients and legal teams. Oversee case management from initial instruction through to reporting, ensuring deadlines and More ❯
Strong knowledge of digital hardware , file systems , and operating system artefacts Understanding of the legal frameworks and forensic principles surrounding electronic evidence Experience using forensic tools such as EnCase, FTK, X-Ways, Cellebrite, Magnet AXIOM , etc. Strong analytical mindset, attention to detail, and the ability to explain complex technical findings clearly Excellent written and verbal communication skills Ability to work More ❯
Ideally, you will have proficiency with EDR tools such as Cortex, CrowdStrike and Defender as well as familiarity with forensic analysis tools such as X-Ways, EnCase Forensic or FTK and live response analysis. Furthermore, familiarity with Windows and Linux enterprise environments and systems such as Active Directory, Office 365, FWs, IPS/IDS, SIEMs, etc. is required. Excellent written … Skills: • Ability to forensically analyse Windows for evidence of compromise. Knowledge of Unix systems forensics will be considered an advantage. • Familiarity with industry standard forensic tools such as EnCase, FTK, X-Ways,Sleuthkit. • Experience performing log analysis locally and via SIEM/log aggregation tool. • Experience hunting threat actors in enterprise networks and cloud environments. • Experience with using Endpoint Detection More ❯