Our Client is a US-based cybersecurity company headquartered in New York City whose mission is to support its clients in mitigating cyber threats. They are focused on three main areas: Cyber Breach Response, Cloud Security Services, and Proactive Cyber Services. Their military-grade professionals have decades of experience in cyber operations and apply their knowledge of the attacker perspective to facilitate efficient, effective, and scalable responses to cyber breaches. Their growing team combines operational and technological disciplines with instinctual methods to keep their client’s information safe.
Our client: US-based cybersecurity company headquartered in New York City
Location: Remotely from Poland
Salary: up to 60 USD/h + VAT on B2B
Working time: 15:00- 23:00 (Polish time)
Cooperation model: B2B
Start date: ASAP
Recruitment process: 2-3 interviews (screening and two technical interviews about 30 min)
responsibilities :
Executing security and privacy investigations for clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis;
Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud;-> Assisting in the drafting of
forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;
Engaging in problem-solving and forensic analysis of digital information using standard evidence-handling techniques and computer forensics tools;
Identify, research, and organize information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis;
Developing familiarity with data that serves as input to this analysis, including threat intelligence, logging data, as well as contextual clues;
Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others);
Forensically acquire data and images from identified hosts, and then locate evidence of compromise determine its impact from disk, file, memory, and log analysis;
Identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary;
Detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment;
Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts;
Identify lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection;
Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation;
Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections;
Providing technical assessment/audit and guidance to clients on the adequacy of cyber security controls in accordance with cybersecurity frameworks that are included in one or more of the following - NIST CSF 2.0, HIPAA, ISO 27001 and 27002, SOC2, NERC-CIP.
requirements-expected :
Strong understanding of computer operating systems, software and hardware;
Ability to conduct detailed forensic investigations and analysis of computers, networks, mobile devices and removable media;
Experience with conducting digital forensic analysis using commercial (e.g., Magnet Axiom, FTK) and open-source forensic tools. Including file system forensics, memory analysis and network analysis;
Experience with conducting static/dynamic malware analysis in a lab environment and threat hunting in a live environment;
Experience with drafting technical and investigative reports and communicating technical findings;
Experience with utilizing automation tools and scripts to expedite analysis;
Understanding of common attack techniques used by an adversary on a victim network and leveraging those techniques to stop further adversary activity;
Digital forensics/incident response training and certifications, including SANS GIAC (GCFA, GCFE, GNFA, GIME), IACIS (CFCE or CIFR), Magnet MCFE, FTK, or similar.
offered :
A possibility to join a team of security consultants investigating computer crimes and breaches that make the headlines – and many more that don’t;
Great opportunity for personal development in a stable and friendly multinational company;
Competitive salary;
Remote work together with participation in global projects;
A possibility of growing your craft alongside like-minded professionals.