6 years of experience in investigative roles, including network forensics, malware triage analysis, cloud forensics, and disk and memory forensics.
Experience with network forensics, malware triage analysis, and disk and memory forensics in Windows, macOS, or Linux.
Experience with enterprise security architecture, and implementing practical control and methodology within investigation processes.
Experience with public speaking and leading client communication.
Preferred qualifications:
Experience in a scripting or development language (e.g. Python).
Strong understanding of attacker methodology and methodologies used to hunt for adversarial activity.
Strong understanding of communication protocols (e.g., HTTP, DNS, TCP/UDP) as well as the various techniques utilized by malware within an operating system for persistence and data collection.
Ability to deliver technical training, advisory, and mentorship on complex topics in a classroom or operational environment.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.