Job Details

CONTRACT Incident Response and Forensic Consultant (VENDOR)

ANYWHERE, United States
  • Employment Type: Contract

Our client, a global leader in endpoint security, detection, and response, has an immediate need for talent augmentation of sophisticated and intermediate-level incident response and forensic consultants. The right candidate will have extensive hard disk forensics, incident response, and some proactive security experience. This individual must be able to perform host and/or network-based forensics across Windows, Mac, and Linux platforms along with the ability to complete basic malware analysis. Conducting and managing incident response investigations, analyzing and responding to targeted threats and strategic remediation plans for compromised organizations. Ability to produce high quality written reports and findings is necessary. No travel, all remote! Assignments could last several months or indefinitely based on level of performance and continued client growth. Please send resumes to [email protected].

Responsibilities

  • Performs host and/or network-based forensics across Windows, Mac, and Linux platforms
  • Performs basic malware analysis
  • Assesses and develops information security and incident response programs in a proactive fashion to help mature the security posture of organizations prior to an incident
  • Produces high quality written and verbal reports, presentations, recommendations, and findings to customer management

Experience and Qualifications 

  • Experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists
  • Experience using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise
  • Possess a strong knowledge of network protocols, network analysis tools, and ability to perform analysis of associated network logs
  • Possess a strong understanding of targeted attacks and ability to create customized tactical and strategic remediation plans for compromised organizations

Interested in this job? Get in touch.

(Accepted file formats are PDF, DOC, DOCX, TXT, RTF and ZIP. File size maximum is 2 MB.)