Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
6 years of experience working with incident response investigations, analysis, and containment actions.
6 years of experience with network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Ability to work non-standard hours and differing rotations/shifts.
Preferred qualifications:
Certification in Google Cloud Platforms (GCP).
Experience with Windows, MacOS, Linux operating system and memory forensics.
Experience working in fast-moving and changing environments, with the ability to present written or verbal information to technical and non-technical audiences.
Knowledge of tools used in pen testing, security event analysis, incident response, computer forensics, network and endpoint architecture, or other security operational areas.
Ability to set and manage expectations with executive stakeholders and team members and prioritize, execute and pivot to other tasks with little warning.
Excellent problem-solving, troubleshooting, and analysis skills.