Leads the Forensics analysis to support the Forensic lead, on engagements for Ransomware/compromise investigations.
Works with the tiger team analysts to perform Forensic analysis of artifacts, including (but not limited to) the analysis of operating system artifacts and the recovery of deleted items from multiple operating systems including Windows, Linux, Mac, and RAM/memory forensics
Analyzes network and operating system log files including Windows Event logs, Unified Audit Logs, Firewall logs, VPN logs, etc.
Works with the Security Operations Center (SOC) to leverage data from alerts provided by existing and deployed Endpoint Detection and Response (EDR) solutions to identify Indicators of Compromise (IOCs) or Tactics, Techniques, and Procedures (TTPs) for variants related to case
Internally prepares Forensics findings and updates in a clear, concise manner through a narrative story outlining the timeline of events - modifies delivery in-line with the call s audience and technical capabilities.
Employs the usage of incident-mapping frameworks while developing the attack map such as MITRE s ATT&CK and Lockheed Martin s Cyber Kill Chain to help contextualize IOCs
Reviews and drafts written incident, investigative updates, reports, and appendices as the explicit direction of counsel and partners based on the findings using the standard report templates. Performs Peer reviews of reports written by team members.
Delivers on the Forensic Investigations plan & works with the lead to manage the timeline, delivery, and execution of the forensic analysis across projects.
May perform other duties as assigned by management.
SKILLS AND KNOWLEDGE
Thorough knowledge of:
Windows disk, Unix or Linux disk, and memory forensics.
Network Security Monitoring (NSM), network traffic analysis, and log analysis.
Experience and understanding of enterprise security controls.
Experienced with EnCase, Axiom, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open-source forensic tools
Experience delivering technical findings to a non-technical audience, preferred
Experience leading teams of analysts, preferred
Provide findings in a confident, factual manner, preferred
Knowledge and experience in handling PII, PHI, sensitive, confidential, and proprietary datasets, preferred
Experience with Cyber insurance investigations, preferred
Ability to establish priorities, work independently and proceed with objectives with minimal supervision
Strong problem-solving and critical-thinking skills to identify and resolve compliance-related issues effectively
Excellent verbal and written communication skills to prepare clear and concise reports and collaborate effectively with cross-functional teams
Proficient in Microsoft Suite products
JOB REQUIREMENTS
Bachelor s degree in Information Security, Computer Science, Digital Forensics, Cyber Security or related field and 4+ years of incident response or digital forensics experience or Masters or Advanced Degree and 3+ years related experience
Possess two or more of the following Certifications: