Listing Description
- Minimum 4 years of comparable experience /expert knowledge of forensic file system and memory techniques and use of the most commonly used toolsets, such as EnCase and FTK Suite
- Minimum 4 years of comparable experience/ deep technical knowledge of methods utilized for evidence collection, maintenance of chain of custody and associated documentation, evidence storage and analysis, and evidentiary reporting
- Minimum 4 years of comparable experience with IDA Pro, OllyDbg, other disassemblers/debuggers
- Minimum 3 years of comparable experience/thorough understanding of cyber security operations, security monitoring, EDR and SIEM tools, to include Endgame, Falcon, and Splunk
- Minimum 4 years of comparable experience/detailed knowledge of Windows & Unix based operating systems and administrative tools, windows disk and memory forensic,Unix or Linux disk and memory forensics and Static and dynamic malware analysis
- Bachelor's Degree in Computer Engineering, Computer Science, Cyber Security, Information Security or related disciplines
- Security certifications: CISSP, SANS GIAC (GREM, GCFA, GCIH), OSCP
- Network traffic and protocol analysis utilizing tools such as Wireshark
- Applied knowledge of security controls such as authentication and identity management, security enhanced network architectures and application based controls (including Windows, Unix, and network equipment)
- Excellent time management, writing and communication skills
- Strong analytic, qualitative, and quantitative reasoning skillsLead end-to-end incident response investigations with Accenture’s customers
Identify and investigate intrusions to determine the cause and extent of the breach, by leveraging EDR solutions and threat intelligence sources
Conduct host forensics, network forensics, log analysis, and malware analysis in support of incident response investigations
Conduct threat hunting across customer’s networks with indicators of compromise, hunting for evidence of a compromise
Conduct incident response within various Cloud platforms
Identify attacker tools, tactics, and procedures to develop indicators of compromise
Develop and implement remediation plans in conjunction with incident response
Form and articulate expert opinions based on findings and analysis
Produce comprehensive and accurate oral and written reports and presentations for both technical and executive audiences
Effectively communicate and interface with customers, both technically and strategically from the executive level, to customers stakeholders and legal counsel
Support leadership in properly scoping engagements with innovative methodical approaches, based on customer requirements
Lead engagement delivery from kickoff through remediation, either on premises or remote, depending on customer requirements
Listing Details
- Salary: $150000 - $170000
- Citizenship: No Requirements
- Incentives: Bonus
- Education: Bachelors Degree
- Travel: Travel 25
- Telework: Full Telecommute