Posted in

Sr Digital Forensics Incident Responder – Dfir

Sr Digital Forensics Incident Responder – Dfir

CompanyAlight
LocationPennsylvania, USA, Iowa, USA, Washington, DC, USA, Texas, USA, Florida, USA, South Carolina, USA, Chicago, IL, USA, Georgia, USA, Arizona, USA, Virginia, USA, Wisconsin, USA, North Carolina, USA, Ohio, USA, Louisiana, USA, Michigan, USA
Salary$136800 – $167400
TypeFull-Time
DegreesBachelor’s
Experience LevelSenior

Requirements

  • Bachelor’s Degree in Computer Engineering or in a STEM major (Science, Technology, Engineering, or Math) and/or a minimum of 4 years of equivalent experience.
  • Must be willing to work off-shift hours, as needed, during incidents.
  • Experienced using Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Sentinel, ARC, Lighthouse, Microsoft Defender for Cloud Apps, Data Loss Prevention, Microsoft Defender for O365.
  • Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters.
  • Candidate must be able to react quickly, decisively, and deliberately in high stress situations.
  • Excellent communication skills with the ability to manage joint response and remediation efforts and constructively influence peers and leadership.
  • Understanding ‘hands on keyboard’ experience in any of the following: Digital Forensics & Investigative Response (DFIR), threat intelligence, penetration testing, or security research.
  • Hands-on experience with popular incident response and orchestration tools.
  • Experienced in conducting malware analysis.
  • People focused, with a passion and drive to work on an experienced team and provide feedback to junior analysts.
  • Understanding of sophisticated threat actors and their TTPs, including MITRE framework.

Responsibilities

  • Detect, investigate, and respond to events from security technology such as Firewalls, IDS, IPS, SIEM, WAF, Email Security Gateway, DLP and other sources.
  • Coordinate and work closely with 24/7/365 monitoring, incident detection, and response using both internal resources and an industry leading MSSP.
  • Leverage extensive experience in threat analysis, detection, hunting, forensics, and/or incident response.
  • Integrate tools, playbooks, and SOPs into a consolidated operating model (including SIEM, SOAR, EDR, and others).
  • Provide feedback to aid in improving detection logic and policy improvements.
  • Assist in coordination and execute of tabletop exercises.
  • Provide post-incident Lessons Learned for improvement opportunities.
  • Participate in on call rotation.
  • Other duties as assigned.

Preferred Qualifications

  • GCIH, GCIA, GREM, CISSP, AWS Certifications or related SANS certifications preferred.