Lead efforts in expanding and improving the development of processes, methodologies, and client communication methods for advanced persistent threat detection, threat intelligence, incident response, and vulnerability analysis.

More Uses of the Computer Forensics Toolkit:

  • Assure your organization designs system architecture, network infrastructure and network configuration solutions that meet the needs of your organization and develops plans to initiate improvements.
  • Manage advanced principles, methods and techniques used in designing, developing, testing and implementing business systems.
  • Steer: conduct detailed investigation and analysis of possible security incidents by utilizing current incident response procedures, cyber forensic methodologies, and reverse engineering techniques.
  • Make sure that your organization recommends countermeasures based on the identified techniques, tactics, procedures, and behavior patterns used by adversaries.
  • Determine best methods to acquire and analyze data, determining the most appropriate hardware and software tools to be used.
  • Guide: research, compare and evaluate software and hardware full life cycle, from initial search to install, configuration, process development, and delivery.
  • Control: articulate complex information on security threats and incident response to internal and external groups across varied levels of technical understanding.
  • Provide administrative support as necessary to support department needs as vendor contract management, IT project support, and budget forecasting for site IT needs.
  • Analyze computer network security settings, server, system, router, firewall, intrusion detection system (IDS) and intrusion prevention system (IPS) logs and packet capture data.
  • Coordinate: test and assess new commercial and government developed network based investigative tools for reviewing and improving ncis current collection platforms.
  • Steer: conduct cyber investigations for escalated and challenging computer security incidents using Computer Forensics, network forensics, root cause analysis and malware analysis.
  • Formulate: forensic analysts exploit captured media and/or investigator computer security incidents in order to derive useful intelligence and/or enable mitigation of network vulnerabilities.
  • Supervise: everyone is accountable for behaviors, exercising rational judgment, and giving thoughtful consideration to professional activities and decisions.
  • Configure, install, and maintain Network Intrusion Detection systems and Network Forensic Analysis Tools on locally configured networks.
  • Perform in depth digital forensic exploitation on various data and media types through the application of advanced methods, tools, and research techniques.
  • Head: conduct Computer Forensics and security vulnerability analysis using commercial off the shelf (cots) and/or customer provided tools.
  • Assure your organization receives and returns evidence items and completes proper forms according to strict transfer procedures to guarantee and maintain the integrity of accepted chain of evidence for each item.
  • Apply broad security industry, technology, business and professional knowledge to contribute to policy making and process design.
  • Participate as a member and technical lead on the Incident Response team which entails forensic evidence gathering and analysis.
  • Provide risk analysis of business applications and IT infrastructure and consult with internal parties to improve security posture.
  • Provide guidance on building and/or maturing information security programs, remediation, detecting and responding to computer security incidents, and implementation of tools and technologies used for enterprise security.
  • Be accountable for providing network and firewall support for critical security and network devices, endpoint security, and Computer Forensics.
  • Be accountable for managing high risk information security incidents by working in conjunction with response partners and other risk teams.
  • Investigate security incidents using data analytics, Computer Forensics, and automation in production and corporate environments.

 

Categories: Articles