Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
4 years of experience with Digital Forensics, Incident Response or Incident Management.
1 year of experience leading Incident Response investigations, analysis, or containment actions and any three of the following: network or log forensic analysis, malware triage analysis, disk, or memory forensics, with experience in information security domain.
Ability to communicate in English and Japanese fluently, as this is a client-facing role that requires interactions in English and Japanese with local stakeholders.
Preferred qualifications:
Experience with enterprise security architecture and security controls.
Experience with cloud incidents or forensic responses.
Experience with malware triage analysis and disk or memory forensics in one or more of the following: Windows, macOS, or Linux.
Experience in cybersecurity in one of the following areas: network security, wireless security, web application assessments, social engineering, scripting, cloud security, reverse engineering, or incident response.