Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
6 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
6 years of experience working in end-to-end incident response investigations, analysis, or containment actions.
Ability to communicate in English and Spanish fluently to work with internal partners and customer teams.
Ability to travel up to 30% of time as required.
Preferred qualifications:
Certifications in Cloud Platforms.
Experience in security competitions, Capture the Flags (CTFs) and testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.