Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience.
2 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
2 years of experience working end to end Incident Response investigations, analysis, or containment actions.
Preferred qualifications:
Certifications in cloud platforms.
Experience in security competitions, Capture the Flags (CTFs) and/or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.