Note: By applying to this position you will have an opportunity to share your preferred working location from the following:.
Minimum qualifications:
Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience.
4 years of Investigative experience with network forensics and log analysis, malware triage analysis, disk and memory forensics in one or more of the following: macOS, Linux, or Unix.
2 years of experience working on incident response investigations, analysis, or containment actions.
Ability to travel up to 20% of the time as required.
Preferred qualifications:
Certifications in Cloud Platforms (e.g., Google Cloud Platform (GCP)).
Experience in cloud incident response or forensics.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.