Job Description
- Have several years of experience in digital forensics and/or incident response. - Is happy to work independently, and get engaged in online chats with a globally distributed team. - Have experience with investigating compromises involving large enterprise environments, web applications and credit card processing environments. - Experience with forensic tools, you will have access to Encase, W-ways, Axiom, Carbon Black and Cyber Reason along with whatever open source tools you prefer and other commercial tools you can convince us to buy.
Job Requirement
- Must be fluent in English, both written and spoken. - Be a fast and lifelong learner - Be comfortable chasing malware through systems and familiar with persistence mechanisms, injection methods and detection/evasion techniques. - Ability to foster and develop strong client relationships. - Be able to decode base64 in their head and write a python script before breakfast. - Knowledge of key forensic artifacts in both Windows and *Nix systems. Be able to articulate their significance to an investigation. - Experience in payment card forensics (under the PCI PFI program) desirable. - Experience with scripting in Perl/Python/Ruby very desirable. - Experience with both desktop-based and server-based forensics. - Comfortable working in a *nix environment. - Contributions to the DFIR community, Blog, twitter, git repos. - Penetration testing experience. - Knowledge of and demonstrable experience with a wide range of different attack tools. - Application testing skills. - Demonstrated leadership experience - Strong report writing skills (yes this is the third time we have mentioned it) - Strong communications skills - We prefer college-educated applicants, but if you have a, high school diploma or equivalent and can prove you have what it takes let us know. - Real world experience is preferred over certifications, but if you have them you may as well tell us about them.
INTERESTING JOBS THAT YOU MIGHT ALSO LIKE