About this Role:
Execute documented processes within all activities of the CIRT playbook and security incident response lifecycle.
Collect, preserve and process volatile information and evidences needed to conduct highly-confidential forensic investigations.
Key Responsibilities: Investigation of digital evidences may include: Storage media (i.e. hard drives, optical and flash media)Electronic data (i.e. electronic files, pictures, web data, technology device logs)Mobile devices (i.e. mobile phones, tablets)Volatile media (i.e. workstation memory)
Preserve the admissibility of collected evidences and Chain of Custody, in accordance with team and industry best practices. Ensure forensic evidences, and corresponding documentation, are identified, recorded, secured and accurately tracked.
Investigate low to medium complexity incidents cases assigned such as, but not limited to:
Acceptable Use Policy / Code of Business Ethics ViolationMalwareFraud, Intellectual Property Theft, Industrial EspionageCyber Attack / Hacking / APT / Security Breaches Investigation of digital evidences may include: Storage media (i.e. hard drives, optical and flash media)Electronic data (i.e. electronic files, pictures, web data, technology device logs)Follow forensic investigation and incident response procedures, processes, policies, guidelines.
Qualifications
Must Have: Bachelor's degree in Computer Forensic or Digital Forensic or Cyber SecurityIndustry certification in multiple operating systems and/or network2-3 years relevant experience if graduate of other Computer related courseFresh graduates can be considered as long as they're a graduate of Computer Forensic or Digital • • • • • Forensic or Cyber SecurityStrong hardware/ software/ OS experienceThinks out of the box and goes beyond the guidelines/playbook in order to resolve an issue/escalation Good to Have: One or more computer forensics and information security certifications is a plus :Guidance Software Encase Certified Examiner (EnCE)EC Council Computer Hacking Forensic Investigator (CHFI)EC Council Certified Ethical Hacker (CEH)SANS GIAC Certified Incident Handler (GCIH)SANS GIAC Certified Forensic Examiner (GCFA)ISC2 Certified Information Systems Security Professional (CISSP)ISACA Certified Information Systems Auditor (CISA)ISACA Certified Information Systems Manager (CISM)Comptia Security +Reverse malware, advanced security operations, advanced tech supportDigital forensic investigator3 years vulnerability assessment and penetration testing