Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
5 years of experience working in incident response investigations, analysis, or containment actions.
3 years of investigative experience with network forensics, cloud forensics, or disk and memory forensics.
Experience with attacker methodologies used to hunt for adversarial activity (e.g., Pre/Post Ransomware attack, Zero-day Exploitation, Business Email Compromise, Cloud Compromise, etc.).
Preferred qualifications:
Certifications in cloud platforms.
Experience in security competitions, Capture the Flags (CTFs) or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Ability to document and explain technical details in a concise, understandable manner.
Ability to recognize and appropriately manage sensitive data.