Candidates will typically have 5 years of experience leading Incident Response investigations, analysis, or containment actions.
Experience with network and log forensic analysis, malware triage analysis, and disk and memory forensics.
Experience with enterprise security architecture and security controls.
Preferred qualifications:
Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience.
Candidates will typically have 3 years of experience investigating with network forensics and log analysis, malware triage analysis, disk and memory forensics in one or more of the following: Windows, macOS, Linux, or Unix.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.