Junior Forensic

Mission

We are looking for a Junior Forensic Investigator for their Cybersecurity team.

Functions

  • Engage in support of the incident response team in order to perform an accurate and prompt assessment of how the containment phase should be carried out in terms of investigative actions. This includes identifying and acquiring relevant digital evidence before eradication actions can be carried out.
  • Performing early triage and diligently recommending changes in criticality and scope based on findings.
  • Perform full forensic investigation in keeping with industry standards in evidence preservation and generating an audit trail that would enable peers and law enforcement entities to reconstruct the investigation and only find proportional/relevant actions.
  • Carry out commodity forensic investigations Assist in higher profile investigations with the supervision of a senior analyst.
  • Flexibly suplement team workstreams, ideally by own initiative.
  • eDiscovery, evidence gathering based on established procedures, ad-hoc research

Requirements

Education
Technical degree. At least one of the following certifications (GICH, GCIA, GCFA, CISSP, CISM, etc.)

Competencies

  • Experience with anomaly detection, network forensics and monitoring/system audit policy creation.
  • Working knowledge of elementary forensic principles and tools. Memory analysis, filesystem analysis, behavior signature creation and sharing.
  • Working knowledge of base threat principles. Taxonomies, sharing protocols, IOC flavors.
  • Very competent at scripting (PS, Bash, Python) with a strong inclination towards automation and tool creation.
  • Comfortable and familiar with a SOC environment, with good incident management process knowledge (ability to recognize when it is appropriate/necessary to engage with IM and on-site IR teams)
  • Moderate to high people orientation, conscious of the need to remain mission oriented and in service of a larger operation.
  • Highly driven individual with verifiable knowledge in information security and familiarity with the workings of a SOC seeking to specialize in digital.
  • Excellent inter-personal skill.
  • Strong communication skills, both written and verbal.

Languages
English Advance

Experience

3 years overall SOC experience, ideally in more than one the following areas: Incident response, security monitoring operations, digital forensics, malware analysis, threat hunting, red team.