Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
5 years of experience working with incident response investigations, analysis, and containment actions.
5 years of experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Ability to travel up to 30% of the time as required.
Preferred qualifications:
Certification in Google Cloud platforms.
Experience in security competitions, Capture the Flags (CTFs), and/or testing platforms.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.