Vacancy expired!
- Minimum 5 years of experience in digital forensics to include incident response
- Expertise in filesystem analysis in one or more operating system such as MacOS, Windows, and Linux/Unix
- Experience with industry standard tooling for disk based forensic analysis
- Experience with collection and analyzing volatile data sets
- Experience with network protocols and reviewing large data sets to come to a conclusion
- Experience with performing behavioral analysis on malicious files for Windows and MacOS
- An investigative and curious mindset to be able to learn and discover how unfamiliar technology works
- Dependable collaborator who works with peers in a team-oriented environment
- Past history of preparing and presenting final written expert reports to leadership or peers
- Ability to multi task on cases and task without impacting performance
- Experience with coding languages such as Python, Objective C, Swift, C, Bash, Java, etc.
- Experience with decompiler tools to perform static analysis on various binaries
- Experience with open source based tools for responding to IR related investigations
- Experience with responding with live response tooling and log aggregation solutions
Vacancy expired!