Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
10 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
10 years of experience working end-to-end incident response investigations, analysis, or containment actions.
4 years of people management experience.
Ability to travel up to 30% of the time as required.
Preferred qualifications:
8 years of experience leading end-to-end incident response investigations, analysis, and containment actions.
Experience with cybersecurity and programming.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Ability to quickly assimilate new information with technical acumen.
Excellent communication skills, with the ability to develop documentation and explain technical details in a concise manner.
Excellent time and project management skills to balance multiple tasks and priorities.