Accountable to ensure excellence in every engagement, to include scoping, forensic analysis, reporting, hunting, remediation consulting, and client communication.
Contribute as a lead investigator for engagements.
Manage all aspects of a breach response and containment investigation.
Technical investigative skills must include host-based forensic analysis, EDR-driven incident response, malware analysis, memory analytics, and network log investigations.
Provide detailed and impactful formal investigative reports, to include technical findings and security improvement recommendations.
Work closely with the threat intelligence team to pursue attribution, identify attack trends, innovative malicious TTPs, and contribute to community-facing publications and blogs.
Requirements
4+ years of hands-on consulting experience in threat hunting, digital forensics, and incident response.
Expert level experience with forensic investigative software (X-Ways or Axiom Cyber preferred).
Experience with EDR/XDR platforms (SentinelOne preferred).
Experienced conducting dynamic malware analysis and understanding of the reverse engineering process (preferred).
Experience with memory analytics (Volatility Preferred).
Experience or knowledge of conducting endpoint based threat hunting (compromise assessments).
Experience working with cyber threat intelligence platforms and the threat intelligence process from raw attack data to finished intel and publications.
Benefits
Medical, Vision, Dental, 401(k), Commuter, Health and Dependent FSA
Unlimited PTO
Industry leading gender-neutral parental leave
Paid Company Holidays
Paid Sick Time
Employee stock purchase program
Disability and life insurance
Employee assistance program
Gym membership reimbursement
Cell phone reimbursement
Numerous company-sponsored events including regular happy hours and team building events