The Lead Forensic Analyst is responsible for responding to security incidents which may present an imminent threat of compromise or loss of data. This position is also responsible for review and appropriate disposition of security investigations and working with various senior management groups, such as Executive Leadership, Legal, Risk, etc. to provide accurate and detailed information regarding forensic investigations. The incumbent will research security events to determine severity and perform incident triage as necessary, while engaging appropriate CSIRT members to resolve the security incident.
Leads efforts for performing post-mortem analysis of the magnetic media, optical media, and volatile data (memory images) collected from compromised systems. Provides documentation related to forensic/malware examinations. Reverse engineer’s malware, using Dynamic and Static analysis. Support development of tool custom signature and correlation rules creation to enhance enterprise protections based on indicators discovered during the forensics analysis process. Identifies trends in incidents and malware and recommends enterprise protection measures based on incident trends. Researches new attacks and exploits. Writes and publishes cyber incident forensic/malware reports detailing findings and mitigation/remediation recommendations. Develops and documents malware and forensic analysis guidance, processes, and procedures. Contributes to the completion of milestones associated with specific projects. Provides solutions to a variety of complex technical problems. Plans and conducts assignments, generally involving the larger and more important projects or more than one project.
Perform all phases of the forensic examination of digital media, including on-site and off-site evidence acquisition/seizures, forensic analysis, and reporting, ensuring chain of custody is maintained and that applicable rules of evidence are adhered to.
Perform E-discovery related requests from Human Resources and/or in support of legal investigations.
PRINCIPLE ACCOUNTABILITIES: Under the direction of the Manager, CyberSecurity Monitoring and Response, the incumbent is responsible for, but is not limited to, the following:
Duties and Responsibilities
•Maintain the knowledge and ability to professionally perform internet or computer related investigations as well as the capability to collect and manage digital evidence onsite consistent with both state and federal court requirements.
•The ability to collaborate with key stake holders to include Legal, HR, Internal Audit, Compliance and various Businesses.
•Develop procedures and processes to analyze and categorize digital evidence/media.
•General knowledge of network security controls and DLP solutions.
•Follow industry standard forensic best practices while imaging, preserving, handling and transporting digital data.
•Conduct investigative interviews and obtain statements in relation to computer evidence. Thoroughly document findings.
•Perform tasks related to securing and keeping the products, tools, and processes that you are responsible for securing.
•Participates in the analysis of log files to identify and collect artifacts related to security incidents; analyzes malicious activity to determine weaknesses, methods of exploitation and effects on systems and information.
•Identifies collects and analyzes threat and intrusion data.
•Develops process enhancements and efficiencies via custom scripts and API integrations.
•Create briefings to educate leadership about current technical and intelligence threats, ongoing investigations and industry impacts.
•Research vulnerabilities in applications and systems. Provide recommendations for resolution and track remediation activities.
•Utilizes and adheres to defined workflow and processes driving the Incident Response and mitigation efforts. Collects supporting information and/or relevant artifacts in support of Incident Response activities.
•Detect and respond to security events by taking the necessary course of actions such as identifying, containing, eradicating, remediating, extracting indicators, disseminating IOCs to supporting teams.
•Perform incident handling and threat hunting duties while coordinating with business and application owners to identify and remediate issues.
•Use tools, such as SIEM, IDS/IPS, packet capture, endpoint detection and response (EDR), and cyber threat intelligence platforms, in order to support security across the enterprise.
•Perform incident response and forensic investigations in Cloud environments.
Years of experience: 3 years of demonstrated work experience. (Additional experience may be substituted for educational requirements.)
Specialized training (preferred, but not required): Malware analysis tools. Linux or Unix administration. Forensic analysis and Penetration Testing.
Other requirements (preferred, but not required): Forensic Analysis Certification
Required Education and Experience:
Degree or equivalent experience: BA/BS or higher in CyberSecurity, Information Technology, Networking, Computer Science, MIS or related field. (Enrollment in a higher education will be taken into consideration.)
Required Skills and Abilities:
Must be able to effectively work in a fast-paced environment with frequently changing priorities, deadlines, and workloads that can be variable for long periods of time. Must be able to effectively communicate with both technical and non-technical individuals. Incumbent must have a firm understanding of Information and/or Cyber Security principles. The incumbent must also be able to achieve certification across multiple domains such as networking, security, development languages, etc.
•Provide forensic analysis on multiple computer and network platforms to include Windows and Linux Operating Systems, mobile devices and virtual machines.
•In-depth experience with file system forensics
•In-depth experience with registry analysis
•In-depth experience with Internet history analysis
•In-depth experience with timeline analysis
•In-depth experience with email analysis
•In-depth experience with signature and hash analysis
•In-depth experience with network forensic analysis
•Experience with forensic media imaging
•Demonstrated experience with forensics tools such as EnCase, Forensic Toolkit, and Xways.
•Demonstrated experience with E-discovery platforms (EnCase, Nuix, Clearwell, O365 Security and Compliance Center)
•Demonstrated experience with endpoint detection and response platforms.
•Demonstrated experience with SIEM technology (QRadar, Splunk, ELK)
•Demonstrated experience with network packet capture and detection tools.
•Strong documentation and written communication skills with technical report writing experience
•Industry standard certification(s) such as: CFCE, EnCE, ACE, GIAC, DoD
•Forensic tool and script development
•SOAR (Security Orchestration Automation and Response) platform experience
•Strong attention to detail and the ability to prepare documents for review
•Mobile forensic experience
•Cloud forensic experience
Apply now to have the opportunity to be considered for similar jobs at leading companies in the Seen network for FREE.
Zero stress and one profile that can connect you directly to 1000s of companies.
We’ll take it from there. After you tell us what you’re looking for, we’ll show you off to matches.
Boost your interview skills, map your tech career and seal the deal with 1:1 career coaching.
Join now and be seen.