Share this job
Incident Response Lead - 1372561
JPN
Apply for this job

Responsibilities

  • Lead the most sophisticated forensic analyses handled by the firm.
  • Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.
  • Provide expert testimony in trials, depositions, and other proceedings.
  • Supervise other Digital Forensics and Incident Response staff, including coordinating teams of professionals, assuring stellar work product, and assisting with performance reviews and mentorship of cybersecurity professionals.
  • Ensure that client matters are staffed adequately and efficiently and that deadlines are met.
  • Form and articulate expert opinions based on analysis.
  • Draft and conduct peer review of expert reports, affidavits, and other experienced testimony.


Essential Requirements

  • 8+ years or more of sustained hands-on excellence in the Incident Response industry along with some digital forensic experience. 2+ years Incident Response lead experience.
  • Ability to anticipate and respond to changing priorities and operate effectively in a dynamic, demand-based environment, requiring flexibility and responsiveness to client matters and needs.
  • Deep experience with most common operating systems (Windows, macOS, Linux, iOS, Android) and their file systems (ext3/4, HFS+, APFS, NTFS, exFAT, etc.).
  • Proficiency with industry-standard forensic toolsets (i.e. X-Ways, EnCase, Axiom/IEF, Cellebrite/UFED, and FTK).
  • Ability to conduct malware analysis in support of incident response engagements.
  • Proficiency with database querying and analysis.
  • Knowledge of scripting/programming languages to assist in automating some IR processes.
  • Knowledge of memory analysis techniques including the use of volatility (Python), rekall (Python) , or other tools.
  • Experience with conducting log analysis of various types of logs, including Windows Event Logs, Apache, IIS, and firewall logs.
  • Experience with command line tools (grep, sed, awk, powershell), python, and other programming languages.
  • Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure (Microsoft)
  • Confidence, humility, and a commitment to learning and teaching others in a collaborative environment of forward-thinking cybersecurity leaders.
  • Must be able to work collaboratively across departments and physical locations.
  • Comfort with intermittent periods of travel, evening and weekend hours.
  • Exceptional work ethic; high level of professionalism and adherence to ethical standards.
  • Strong written and oral communication skills, plus attention to detail.
  • Fluency in spoken and written English and Japanese essential.
  • A high level of professionalism in all areas of performance.
  • One or more relevant industry certifications relating to Incident Response SANS GCFA or GCIH, CREST CPIA or CRIA, or equivalent


Preferred Requirements

  • Bachelor’s Degree in Computer Science, Information Security, Engineering, Digital Forensics or other relevant subjects.
  • Interest in building intellectual capital for the firm by writing blogs, submitting to CFPs, and crafting internal tools for analysis.
  • Familiarity with mobile device operating systems including iOS and Android.
  • Knowledge of computer networking technologies.
  • Proficiency with C++, C#, Python, or SQL— Assembler languages are a plus.
  • Prior experience/knowledge of penetration testing/hacking techniques such as SQLi(most common), XSS, RFI/LFI, Directory traversal (http), and tools such as Nessus(Free open source) , Nmap (These 2 are common ones) , Kali Linux, Burp Suite, SQLMap, etc(penetration software)
  • Participation in technical meetings and working groups to address issues related to malware security, vulnerabilities, and issues of cybersecurity and preparedness.
  • A constantly developed DFIR skill set, and proficiency with industry standard tools and practices, through outside training and research.


Apply for this job
Powered by