6 years of investigative experience with network forensics, malware triage analysis, cloud forensics, or disk and memory forensics.
6 years of experience working end-to-end incident response investigations, analysis, or containment actions.
Ability to communicate in English fluently to work with internal partners and customer teams.
Preferred qualifications:
Experience working in fast-paced and continuously changing environments.
Knowledge of tools used in pen testing, security event analysis, incident response, computer forensics, network and endpoint architecture, or other security operational areas.
Ability to communicate investigative findings and strategies to technical staff, executive leadership, legal counsel, and internal and external clients.
Driven, proactive, hardworking, creative, team-player with the ability to present written or verbal information to technical and non-technical audiences.
Excellent time and project management skills.
Excellent problem-solving, troubleshooting, and analysis skills related to Incident Response, Enterprise security controls, and Intrusion Operations.