Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience.
2 years of investigative experience with network forensics and log analysis, malware triage analysis, disk and memory forensics in Linux, Unix, or a related operating system
2 years of experience working with incident response investigations, analysis, or containment actions.
Preferred qualifications:
Certifications in Cloud Platforms (e.g., Google Cloud Platform (GCP)).
Experience in Cloud incident response or forensics.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Excellent written/verbal communication skills, with the ability to develop documentation and explain technical details in a concise manner.
Excellent time and project management skills.
Ability to work non-standard hours including Friday to Monday.