Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
8 years of experience working end-to-end incident response investigations, analysis, or containment actions.
8 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
Ability to travel up to 30%.
Preferred qualifications:
Certifications in cloud platforms.
Experience leading IR investigations, analysis, and containment actions.
Experience in security competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Experience in implementation and design for enterprise security architecture, security controls, and best practices.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.