Job description
Key Role:
The incident response analyst is an intermediate role directly contributing to efforts in digital forensic and incident response engagements. Commonly operating in an environment in which there is an actual or suspected compromise, candidate is required to have strong knowledge of a variety of sources of digital evidence to determine lateral movement, root cause, data staging, access and exfiltration stemming from threat actor activity across a variety of operating systems. Display professional and expert knowledge of incident response processes, tools, and techniques and be able to rapidly apply such knowledge to determine the extent and timeline of compromise associated with malicious activity. Handle a high volume of digital forensic investigations with little oversight during the investigation and make significant contributions to any forensic analysis efforts involving the larger team.
Basic Qualifications:
Experience responding to a variety of incident types, notably ransomware investigations
Experience using a variety of scripted forensic toolsets including PowerShell and Python
Experience in log analysis of multiple types to include firewall, IIS, and event logs
Knowledge of incident management and response activities across the incident life cycle
Knowledge of security tools and techniques used by Cybersecurity teams
Knowledge of Windows, Linux and Mac operating systems
Ability to work outside of the course of normal business hours, including contribution to a rotational weekend on-call schedule
Ability to adapt communications' style and messaging for professionals at all levels
Ability to travel up to 20% of the time to support client needs
Bachelor's degree and 2+ years of experience in cyber security, Digital Forensics, or Incident response or 4+ years of experience in cyber security, Digital Forensics, or Incident response in lieu of a degree
Additional Qualifications:
Experience with performing host and network forensics analysis, including using timestamps across different log types to develop authoritative timelines of activity to find evidence of malicious activity
Experience with performing anomaly or malware hunts using a common framework and standard methodology, including the MITRE ATT&CK framework
Experience with conducting digital memory acquisition using Volatility, Rekall, or similar tools and extracting malicious binaries for analysis
Experience with common scripting languages, including Perl or Python in the context of incident response and security operations
Knowledge of Elasticsearch and data visualization tools and methodologies
Knowledge of conducting investigations in AWS, Azure, and Google Cloud
Knowledge of security-related technologies, including IDS/IPS, SIEM, firewalls, Log Management, HIDS/NIDS, proxies, Endpoint Detection and Response, and other enterprise level appliances
Ability to be self-driven, work independently, and handle multiple tasks concurrently
Possession of excellent verbal and written communication skills
GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified-Network Intrusion Analyst Certification
EEO Commitment
We’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.