Consolidate and conduct a comprehensive analysis of threat intelligence data obtained from classified, proprietary, and open source resources to provide indications and warnings of impending attacks against unclassified and classified networks.

More Uses of the Digital Forensics Toolkit:

  • Consult with and/or take direction from executive management teams, service leaders, clients, and stakeholders regarding case investigation and status.
  • Manage work with senior team members on various projects relating to the protection of devices, customers, assets, data, information technology, and networks.
  • Perform and/or lead Digital Forensics and incident response engagements for customers of all sizes across numerous industries.
  • Develop internal relationships with the cyber engineering team and other business stakeholders to drive security controls gap closures.
  • Steer: conduct extensive you partner organization engagement and document developments and findings via operational lead reports and technical reports.
  • Provide professionally written technical reports of vulnerabilities, findings and mitigation solutions to clients.
  • Make certain that your organization supports innovation, strategic planning, technical proof of concepts, testing, lab work, and various other technical program management related tasks associated with the cybersecurity programs.
  • Establish: ability and willingness to learn other security skills as pen testing, ethical hacking, Digital Forensics, or vulnerability management.
  • Ensure you recommend changes in investigative process to improve efficiency/effectiveness while maintaining the highest quality standards.
  • Oversee: acquisition, performing memory and network analysis, and performing host analysis and/or Digital Forensics on windows and linux operating systems.
  • Ensure you demonstrated skills, knowledge and abilities in project management, task management, budgeting, scheduling, team coordination, quality and productivity measurement, client satisfaction, and technical and management analytics.
  • Maintain and demonstrate a positive approach that provides for innovation, personal growth and professional development.
  • Formulate: work closely with engineering and product management to escalate issues and proactively identify possible defects.
  • Lead: python and/or perl and automate tasks and be able to discern malware based covert channel and command and control protocol analysis.
  • Support cyber incident response efforts by collecting and analyzing evidence and providing reports of identified threats.
  • Represent your organization and organization in appropriate professional and community organizations and related activities.
  • Follow industry standard forensic best practices while imaging, preserving, transporting and handling electronic data and associated physical devices.
  • Perform deep analysis of active attacks through using Digital Forensics and malware reverse engineering techniques.
  • Collaborate with your Risk Management team to identify and consider privacy, compliance, regulatory, and legal issues in incident response cases.
  • Manage work with members of the Professional Services team to learn and further develop your technical and investigative skills.
  • Be accountable for protecting the enterprise systems and information by promptly responding to security threats and incidents, acting individually and as part of a team to resolve issues.
  • Ensure you lead and conduct Digital Forensics on endpoints (workstations, servers, and mobile devices) to support internal investigations and Legal matters.
  • Organize: ability and willingness to learn other security skills as ethical hacking, Digital Forensics, or vulnerability management.

 

Categories: Articles