Enable job alerts via email!

Digital Forensics and Incident Response (DFIR) Consultant

Ransomware Recovery

City Of London

Remote

GBP 100,000 - 125,000

Full time

Today
Be an early applicant

Job summary

A cybersecurity organization is seeking an experienced professional for incident response tasks. This remote position involves engaging with clients and conducting forensic analyses. Candidates should have at least 2 years of experience in digital forensics and knowledge of both Windows and Unix/Linux systems. The role includes travel up to 50% on short notice.

Benefits

Medical benefits
Bonus opportunities

Qualifications

  • 2+ years of experience in digital forensics, incident response, or similar.
  • Knowledge of Windows and Unix/Linux operating systems.
  • Understanding of business email compromise (BEC) cases.

Responsibilities

  • Engage in incident response tasks, interacting with clients and partners.
  • Utilize tools for forensic artifact collection from affected systems.
  • Analyze logs for indicators of compromise.

Skills

Digital forensics
Incident response
Threat analysis
Customer service

Tools

EDR / EPP technologies
SIEM
e-discovery tools
Job description

CYPFER is a leading first-responder cybersecurity organization enabling clients to swiftly and effectively return to business following a cyber-attack. As a global market leader in ransomware post-breach remediation and cyber-attack first response, we consistently deliver results that exceed market standards for handling cyber-extortion and ransomware events. Our team collaborates with prominent global insurance carriers, leading law firms, and Fortune 1000 businesses.

Responsibilities
  • Engage on behalf of CYPFER in incident response tasks, interacting with various insurance partners, legal counsel, incident response units, client executives, and technical teams.
  • Utilize standard tools and methodologies to collect forensic artifacts and images from affected systems.
  • Assist with Windows forensics and triage to assess compromise and investigations.
  • Familiarity with malware analysis tools and methodologies.
  • Apply mitigation strategies and concepts to remediate identified threats.
  • Analyze triage collections/artifacts for indicators of compromise (IOCs) and potentially malicious activity.
  • Review logs from host systems and appliances to identify suspicious activities.
  • Collect forensic disk and memory images from physical and virtual endpoints and servers.
  • Understanding of an incident lifecycle and cyber-kill-chain.
  • Correlate events and build timelines of events.
  • Maintain current knowledge on emerging threats and vulnerabilities.
  • Analyze files for IOCs using various techniques.
Technical Requirements
  • 2+ years of experience in digital forensics, incident response, or a similar role.
  • Knowledge of Windows and Unix/Linux operating systems.
  • Understanding of the functionality of EDR / EPP technologies.
  • Familiarity with forensic acquisition and analysis of physical and virtual systems.
  • Working knowledge of storage technologies such as RAID, NAS, SAN, Fiber Channel, iSCSI, and NFS.
  • Ability to analyze and interpret logs from various sources.
  • Ability to perform threat research and analyze current threats.
  • Understanding of business email compromise (BEC) cases and investigation techniques.
  • Participate in a rotating on-call schedule; ability to work on weekends and outside normal business hours as needed.
  • This role is remote but requires the ability to travel on short notice to a client site up to 50%. Must maintain flexibility to travel frequently within 24-48 hours' notice for deployments typically 1-2 weeks in duration.
Business Responsibilities
  • Maintain current knowledge of information security, incident response techniques, emerging threats, and tools.
  • Work independently and produce high-quality deliverables with minimal supervision.
  • Exhibit strong customer service and consulting skills.
  • Adhere to client and internal policies, procedures, and security practices.
  • Maintain detailed notes and draft updates and reports as required.
  • Remain calm, composed, and articulate in tough customer situations.
  • Exhibit excellent relationship management and communication skills.
Preferred Skills
  • Understand obfuscation techniques used to conceal malicious commands and traffic, and lateral movement strategies employed by threat actors.
  • Familiarity with exfiltration techniques used by threat actors.
  • Knowledge of SIEM and SOAR solutions.
  • Experience with e-discovery tools and methodologies.
  • Proficiency in collecting and analyzing data from mobile devices/cell phones.
  • Industry certifications such as MCFE, ENCE, ACE, GCFA, GCIH, GNFA, GCFE or similar are a plus.

Compensation package includes a base salary, medical benefits and multiple bonus opportunities.

CYPFER is an equal opportunity employer. If you need accommodation during the interview process or beyond, we welcome applicants from all backgrounds and perspectives.

We thank you for your interest in joining the CYPFER team; while we welcome all applicants, only those selected for an interview will be contacted.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.