About the job FORENSICS ANALYST
KEY RESPONSIBILITIES
- Conduct digital forensic analysis through, evidence acquisition, analysis of email forensics, registry, users, data carving, artifacts, memory, files, logs, browsers, timelines, file systems, malware, anti-forensic detection, and social media forensic among others.
- Provide clear updates to management on security incidents; Investigate, document, and report on information security issues and emerging trends.
\>Write and publish incident findings to appropriate constituencies.
- Populate and maintain an error‑free chain of custody related to each drive forensically imaged.
EXPERIENCE & QUALIFICATIONS
- Minimum 4 years experience in Information Security is required along with excellent knowledge of: Law enforcement evidence seizure process, Malware analysis or reverse engineering, Timeline Analysis, Carving, compiling and analyzing security incident related artifacts, and Network forensics.
- EnCase Certified Examiner (EnCE) preferred.
KEY COMPONENTS
- Conduct a forensic investigation to determine the root cause of the attack from available evidence at the time of engagement, including:
- Timeline of events leading to the incident.
- Entry point used by the attacker.
- Data potentially accessed, exfiltrated, or compromised.
- Identification of attacker tools, techniques, and procedures (TTPs).
- Analyze logs and system events for evidence of malicious activity.
- Collect and analyze forensic evidence for potential legal or regulatory purposes, then provide to the customer for retention.
Vertical:
Technology