devices (Desktop, laptop, phones) but also from the cloud and more commercial enterprise wide systems e.g. global email etc. You will have experience with leading Digital Forensic tools e.g. EnCase, FTK, Cellebrite etc. You will have a strong academic background and likely a degree in a related subject. You will be able to attend the office and when required More ❯
/or Incident Response space. Familiarity with the EDRM and experience in supporting eDiscovery software (particularly Relativity) and related products/tools such as: 1) Forensic Capture Software (e.g. EnCase, Cellebrite, Oxygen, FTK); 2) Database/Programming: (e.g. Microsoft SQL Server, SQL, Microsoft Access, Visual Basic, Python); 3) Email Systems (e.g. Office 365, Microsoft Exchange, Lotus Notes/Domino More ❯
Digital Forensics, Cybersecurity, Computer Science, Information Technology, or a related field. (desirable) Proven experience in digital forensics, information security, or a related role. Familiarity with forensic tools such as EnCase, FTK, or similar software. Strong analytical and problem-solving skills with a keen attention to detail. Ability to communicate complex technical concepts to non-technical stakeholders. Certifications such as More ❯
Greater London, England, United Kingdom Hybrid/Remote Options
identifi Global Resources
collections in line with best practice methodologies (ACPO guidelines, ISO17025). Manage and mentor consultants, supporting knowledge sharing across the team. Provide technical leadership on forensic tools such as EnCase, FTK, Axiom, Cellebrite and others. Deliver clear technical explanations and expert guidance to non-technical clients and legal teams. Oversee case management from initial instruction through to reporting, ensuring More ❯
for court or arbitration proceedings. Essential Skills & Experience Proven experience conducting digital forensic investigations within corporate, legal, or law enforcement settings. Strong technical proficiency with forensic tools such as EnCase, FTK, Cellebrite, Magnet AXIOM, Oxygen Forensic Detective, or X-Ways. Deep understanding of file systems, operating systems (Windows, macOS, Linux), mobile OS (iOS, Android), and cloud platforms. Experience producing More ❯
Portsmouth, England, United Kingdom Hybrid/Remote Options
ProCheckUp (PCU)
CCT-INF or CREST CCT-APP certifications • Current Check Team Leader (CTL) at NCSC • Current SC clearance Some of the following certifications are beneficial:- • Advanced Certified Ethical Hacker • EnCE - EnCase Certified Examiner http://www.encase.com • CWSP - Certified Wireless Security Professional • PWB - Offensive Security : Penetration Testing with Back|Track • SANS GCIH - GIAC Certified Incident Handler • Major involvement in Network More ❯
Solid knowledge of operating systems, file systems, memory structures, and log analysis. Proficiency in scripting and automation (e.g., Python, PowerShell, Bash) to streamline investigations. Proficiency in forensic tools (e.g., EnCase, FTK) and evidence handling. Serve as a primary client-facing security expert, building strong relationships and effectively communicating complex technical concepts to both technical and non-technical stakeholders. Architect More ❯
and tool optimisation. About You Extensive experience in digital forensics, ideally within law enforcement or consultancy. Demonstrable expert witness and cross-examination experience. Ideally skilled in tools such as EnCase, FTK, Cellebrite, Magnet AXIOM, or similar. Strong communicator, leader, and problem-solver. Digital Forensics Manager Greater London Up to More ❯
in engaging directly with clients; to translate complex technical issues into clear guidance during incidents. proactive, adaptable and thrives in fast-paced environments. Skilled in utilising tools such as EnCase, Velociraptor, KAPE, EDR, X-Ways etc.. In-depth understanding of threat actors, TTP's and common attack vectors across varied platforms. More ❯
Workspace, AWS etc. Expertise in PowerShell scripting, Bash scripts, Python, SQL and data wrangling for log analysis Expertise with the industry standard forensic software tools such as X-Ways, EnCase, Nuix, Axiom, Cellebrite and forensic hardware tools. Expertise with open-source tools (such as Velociraptor) and leveraging commercial tools (such as X-Ways, EnCase and Nuix) for forensic More ❯
deliver accurate and defensible findings. Key Responsibilities Perform forensic acquisition, preservation, and analysis of digital devices, including computers, mobile devices, cloud platforms, and networks. Use industry-standard tools (e.g., EnCase, FTK, X-Ways, Cellebrite, Magnet AXIOM) to identify, recover, and analyze digital evidence. Prepare detailed forensic reports and provide expert testimony, if required, in legal or regulatory proceedings. Support … and evidentiary standards. What We’re Looking For Proven experience in digital forensics, ideally within law enforcement, consultancy, or corporate environments. Strong working knowledge of forensic tools such as EnCase, FTK, Cellebrite, Magnet AXIOM, or X-Ways. Understanding of operating systems (Windows, macOS, Linux, iOS, Android) and file systems. Excellent written and verbal communication skills, with the ability to More ❯
X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope … Experience with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the More ❯
X systems to identify Indicators of Compromise (IOCs) Examine firewall, web, database, and other log sources to identify evidence of malicious activity Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, and custom Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope … Experience with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data breach response Experienced with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools Incident response consulting experience required Identified ability to grow into a valuable contributor to the More ❯