Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent practical experience.
4 years of experience working end to end incident response investigations, analysis, or containment actions.
4 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
Ability to travel up to 30% as needed.
Preferred qualifications:
Certifications in cloud platforms.
Experience in security competitions, Capture the Flags (CTFs) and/or testing platforms such as Hack the Box, TryHackMe, Overthewire, etc.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.