Experience:
5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
9/14/2017
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Lead Incident Response and Forensics Engineer
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Prestigious Fortune 500 Company is currently seeking a Lead Incident Response and Forensics Engineer. Candidate will be a lead enginneer supporting the Security Operations Center capabilities and will be performing forensic analysis of hosts and network logs associated with information security incidents.

Responsibilities:

Manage the collection, preservation, processing, and analysis of digital evidence in support of investigations and incident response. Responsibilities include incident scoping, workflow, execution of forensically sound collections through proposed workflows, relevant data identification, and coordination of data handoffs to investigative resources.
Generate concise, accurate, and unbiased forensic findings reports on an as-needed basis.
Assist as-needed throughout the active investigations.
Mentor other forensic examiners in procedures, skills uplift, and approaches
Manage evidence including collection and forensic preservation, storage, and chain-of-custody.
Maintain highly detailed incident-related notes and documentation.

Qualifications:

4-year Bachelor of Science degree in one or more of the following preferred concentrations: Computer Forensics, Computer Science, Computer Engineering, Information Technology, or Management of Information Systems.
5+ years of direct computer forensics experience.
Operational understanding of modern threats and tactics used currently.
Experience with malware investigations and techniques used to investigate these incident.
Experience with PII and PCI investigations, as well identifying the resources needed to successfully investigate them.
Experience in supporting an Enterprise or Security Operation Center (SOC) investigation.
Familiar with industry accepted Open Source Solutions to help with varied components of an investigation.
Familiar with industry standard forensic software such as XWays, EnCase, FTK, and other software's that may come to market.
Experience with identification, preservation, and analysis of electronic data pertaining to laptops, desktops, Servers, backup tapes, mobile devices, webmail providers, cloud services, and other emerging technologies.
Strong background with Microsoft Windows, Apple OS X, and Linux operating systems.
Familiar with network environments and computer and network administration protocols.
Strong hardware and software troubleshooting technical experience.
Excellent analytics skills.
Efficient multi-tasking abilities.
Excellent written and oral communication skills.
Ability to create and deliver tasked items when such are required.
Experience with Scripting and programming languages such as: C#, Go, Java, Python, Pearl, Bash Scripting, PHP, and others that would help streamline investigative techniques.

Qualifications

Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Craig Johnson. This page is not endorsed by or affiliated with Request Technology - Craig Johnson. For questions regarding company profiles, please email: care@aftercollege.com.