±Forensic Focus Partners
|New Today: 3||Overall: 29026|
|New Yesterday: 15||Visitors: 74|
· Countering Anti-Forensic Efforts – Part 1
· Linux Timestamps, Oh boy!
· Standard Processes in Windows 10
· NAS Forensics Explained
· Project Spartan Forensics
· FT Cyber Security Summit Europe – London 22nd September
· The Future of Mobile Forensics
· TSFIC 2015 – Recap
· Evidence Acquisition and Analysis from Live Exchange
Incident Response Forensic Analyst - London based up to £60k
For more information please use my work account - bdonnachie @ accessdata.com[email protected]
No agencies please!
About AccessData Incident Response Services
AccessData is seeking qualified candidates to join our growing team as Incident Response Forensics Analysts. Our incident responders have backgrounds as government and Fortune 100 cyber security practitioners, and our services are regularly enlisted by some of the largest organizations in the world to deal with complex and sophisticated compromises. Because AccessData is also a leading cyber security software developer, our clients have the benefit of working with services experts who have unmatched expertise in the technology and the support of our development team behind them.
Essential Duties and Responsibilities
Conduct highly-confidential investigations for a global client list (e.g., data loss, virus outbreak, advanced persistent threats)
Conduct examination of digital media (hard drives, mobile phones, etc.)
Capture / analyse network traffic for indications of compromise
Review log-based data, both in raw form and utilising SIEM or aggregation tools
Employ best practices and forensically sound principals such as evidence handling and chain of custody
Establish timelines and patterns of activity based on multiple data sources
Identify, document and prepare reports on relevant findings
Utilize varied forensic software such as FTK, Encase, Helix, etc.
Effectively communicate with clients to establish timelines, manage expectations, and report findings
Required Knowledge, Skills and Abilities
Demonstrated computer forensic investigations experience
Expert-level knowledge of common attack vectors and penetration techniques
Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS, encryption
Demonstrated knowledge of forensic tools such as Encase, FTK, Helix, Knoppix, Slax, Sleuthkit, SIFT
Experience with malware analysis (reverse engineering)
Excellent technical writing and presentation skills
Ability to successfully interface with clients
Event analysis and correlation
Experience managing large and small scale incidents
Additional Preferred Skills
Strong understanding of networking protocols such as TCP/IP, IPSEC, RIP, EIGRP, OSPF
Experience in a fast-paced consulting organisation
Experience with programming or scripting languages
Familiar with SIEM tools such as ArcSight, NitroSecurity, enVision, etc.
Demonstrated system administration skills
Education / Experience
Bachelor’s degree in computer science, digital forensics or related technical discipline or demonstrated equivalent work experience.
Minimum 5 years required in digital forensics and/or security, with 2 years desired in incident response
Preference given to candidates with current relevant industry certifications (ACE, EnCE, CFCE, CCE, DFCP, GCIA, GCIH, GREM, CSIH, etc.)
**Note: Successful candidate will be required to obtain AccessData ACE certification within 1 year