Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
6 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
6 years of experience working end-to-end incident response investigations, analysis, or containment actions.
Ability to work weekends from Friday to Monday (10 hour days).
Ability to travel up to 30% of the time.
Preferred qualifications:
Certifications in Cloud Platforms (e.g., Google Cloud Platform (GCP)).
Experience with Cloud incident response or forensics.
Experience with commercial and open source forensics suites such as X-Ways and TSK.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Excellent time and project management skills.
Excellent written and verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.