±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 34850
New Yesterday: 1 Visitors: 180

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Security Engineer - Digital Forensic, Hertfordshire, UK

Basic listing free. Premium listing includes listing on Forensic Focus homepage and RSS newsfeed, notification sent to Forensic Focus Twitter followers, a post to the Forensic Focus Facebook page, a post to the Forensic Focus LinkedIn Group and guaranteed inclusion of a link in the Forensic Focus newsletter. Learn more.
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
 
  

Security Engineer - Digital Forensic, Hertfordshire, UK

Post Posted: Wed Jun 13, 2018 9:57 am

Summary

About the Security & Capability Team

Our team is responsible for providing and maintaining tools used by Tesco in order to monitor and secure our systems, while also helping our colleagues globally.

We maintain global hybrid instances of our chosen tools for SIEM, Application Performance Monitoring, Log Monitoring, Backlog Management, Identity Access Management, Service Desk, self-help portals for colleagues and incident communications. In addition to the challenges delivering this capability brings, we're also the team responsible for the security operations centre and our security architecture, working across Tesco globally to secure our systems and data! Our Technology Risk & Compliance team works tirelessly to further develop a risk aware culture and drive audit and regulatory improvements across the technology team in all Tesco countries.

We aim to provide colleagues with a great experience by providing world class tooling, processes and advice. We believe in solutions that are either self-service or invisible to the end user - that's not always easy to achieve, but it's what we strive for.

The Role - Security Engineer (Digital Forensics and Incident Response)

A Digital Forensics and Incident Response engineer will need to be able to cover three key areas; host forensics, memory forensics and network forensics. The ideal candidate will be the go to person for on-going forensic incident response as part of the Technology security team, where potential threats are identified you contribute to and lead response and investigation required to obtain all of the facts.

A typical day will involve close working with security teams, responding to incident tickets and alerts, aiding investigations, and continually improving our response, detect and prevention processes.


Main Responsibilities

The Role - Security Engineer (Digital Forensics and Incident Response)

A Digital Forensics and Incident Response engineer will need to be able to cover three key areas; host forensics, memory forensics and network forensics. The ideal candidate will be the go to person for on-going forensic incident response as part of the Technology security team, where potential threats are identified you contribute to and lead response and investigation required to obtain all of the facts.

A typical day will involve close working with security teams, responding to incident tickets and alerts, aiding investigations, and continually improving our response, detect and prevention processes.

Whilst specific responsibilities will be dependent upon the changing needs of the Tesco business, the following provides an overview of the role's key responsibilities and measures:

Follow our Business Code of Conduct always acting with integrity and due diligence.
Represent the Technology Security team and assist other teams to investigate security incidents.
Work closely and collaboratively with security, infrastructure and engineering teams.
Collaborate closely with colleagues within the wider global Technology organisation and the business to establish effective and productive relationships.
Involvement in and leading of security incidents which occur on Tesco systems.
Keep technical skills up to date and keep track of new technologies, understanding how they might benefit the team.
Share knowledge with the wider security community.
Champion continuous improvement within the department.

This role will best suit an individual who enjoys working as part of a team, is well organised, pragmatic and a lateral thinker with an inquisitive mind who is motivated to make change for the better and, most importantly, puts our customers first.


Ideal Candidate

Ideal Candidate - Key Skills and Experience

You will need to have demonstrated experience of Digital Forensic and Incident Response Investigations.

Experience of evidence and artefact acquisition, both via physical and remote methods.
Understanding of file system fundamentals, e.g. NFTS, FAT, ext2, ext4, ext4 etc.
Experience with forensic toolsets such as Encase, X-Ways, IEF, Autopsy, or equivalents.
Understanding of anti-forensic techniques.
Timeline analysis.
Technical understanding of memory management concepts.
Experience with memory analysis frameworks such as Volatility or Rekall.
Understanding of modern attacker tools and techniques.
Understanding of network protocols including the seven layer and TCP/IP network models.
Proficient in IDS analysis, including creation of network signatures.
Experience with conducting Static and Dynamic Analysis of malicious files.
Experience of safe handling of malicious files and operation security.
Understanding of Sandbox technologies and the limitations they face.
Knowledge of Microsoft Windows operating system internals, it would be desirable to have knowledge in Unix and Mac operating system internals also.
Proficient in creating signature detection for malicious files.
One or more of the following certifications would be advantageous (but are not essential):
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Forensic Examiner (GCFE)
CREST Registered Intrusion Analyst (CR IA)
CREST Certified Host Intrusion Analyst (CC HIA)
CCNIA Certified Network Intrusion Analyst (CC NIA)
GIAC Reverse Engineering Malware (GREM)
CREST Certified Malware Reverse Engineer (CC MRE)

To view this role in more detail and to apply please click here or follow the link below

www.cybersecurityjobsi...-response/  

seansmyth10
Senior Member
 
 

Page 1 of 1