Experience:
5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
9/14/2017
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Lead Incident Response and Digital Forensics Engineer
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Lead Incident Response and Digital Forensics Engineer
$120-130K +Bonus

Location: Irving, TX; Hudson, OH; Charlotte, NC; Tempe, AZ

We are seeking an experienced DFIR team lead to perform intelligence-driven network defense supporting the Security Operations Center capabilities (Threat Intelligence, Threat Hunting, and Incident Monitoring/Response/Handling, et al.) The role involves forensic analysis of online and offline (dead-box) hosts and network logs associated with information security incidents discovered by the Threat Hunting and Monitoring capabilities. The role is supported by large amounts of data from vendor SaaS tools and internal sources, including various indicator feeds, SIEM, several threat intelligence tools, case management tools, forensics hardware/software, etc. in order to assist the DFIR team in contributing a near-complete technical understanding of information security incidents. The candidate will perform the functions of a digital forensics examiner team lead and collaborate with other teams in the Security Operations Center.

Job Description

Responsibilities
Manage the collection, preservation, processing, and analysis of digital evidence in support of investigations and incident response. Responsibilities include, but are not limited to, incident scoping, workflow, execution of forensically sound collections through proposed workflows, relevant data identification, and coordination of data handoffs to investigative resources.
Generate concise, accurate, and unbiased forensic findings reports on an as-needed basis.
Work and coordinate with additional Allstate personnel to assist as-needed throughout the active investigations.
Mentor other forensic examiners in procedures, skills uplift, and approaches
Manage evidence including collection and forensic preservation, storage, and chain-of-custody.
Maintain highly detailed incident-related notes and documentation.
Candidate should be comfortable with work-related travel as well as occasionally working extended hours.

Job Qualifications

Qualifications
4-year Bachelor of Science degree in one or more of the following preferred concentrations: Computer Forensics, Computer Science, Computer Engineering, Information Technology, or Management of Information Systems.
5+ years of direct computer forensics experience.
Operational understanding of modern threats and tactics used currently.
Experience with malware investigations and techniques used to investigate these incident.
Experience with PII and PCI investigations, as well identifying the resources needed to successfully investigate them.
Experience in supporting an Enterprise or Security Operation Center (SOC) investigation.
Familiar with industry accepted Open Source Solutions to help with varied components of an investigation.
Familiar with industry standard forensic software such as XWays, EnCase, FTK, and other software's that may come to market.
Experience with identification, preservation, and analysis of electronic data pertaining to laptops, desktops, Servers, backup tapes, mobile devices, webmail providers, cloud services, and other emerging technologies.
Strong background with Microsoft Windows, Apple OS X, and Linux operating systems.
Familiar with network environments and computer and network administration protocols.
Strong hardware and software troubleshooting technical experience.
Excellent analytics skills.
Efficient multi-tasking abilities.
Excellent written and oral communication skills.
Ability to create and deliver tasked items when such are required.
Experience with Scripting and programming languages such as: C#, Go, Java, Python, Pearl, Bash Scripting, PHP, and others that would help streamline investigative techniques.

Desired Skills
Master of Science degree in one of the above concentrations.
Forensic concept/software certifications such as SCERS, CFCE, CCE, SANS, and other industry accepted skillsets.

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Anthony Honquest. This page is not endorsed by or affiliated with Request Technology - Anthony Honquest. For questions regarding company profiles, please email: care@aftercollege.com.