Search by job, company or skills

Areteir

Forensic Analyst I

Early Applicant
  • 5 months ago
  • Be among the first 50 applicants

Job Description

  • Performs digital forensic analysis on Windows, Apple Mac, and Linux based operating systems, in addition to the analysis of networking appliances including but not to, VPN and firewall appliances
  • Documents forensic findings in accordance with the standards set forth within the Arete Forensic Tracker and develop a master timeline and visual attack map of the events
  • Identifies additional sources (systems, logs, etc.) to collect based on the analysis and identifies gaps based on the lifecycle of attack
  • Works with the Security Operations Center (SOC) to leverage data from monitoring and alerts provided by installed applications and deployed EDR solutions to identify Indicators of Compromise (IOCs), Tactics, Techniques and Procedures (TTPs) for variants related to case
  • Delivers Forensics findings and updates to the team in a clear, concise manner through a narrative story outlining the timeline of events. Modifies delivery in-line with the call s audience and technical capabilities
  • Tracks findings and capture data points related to investigations to enhance and inform our threat intelligence
  • Raises technical constraints and issues within the Forensics team to identify detail of the incident and escalate to Forensic leadership
  • Maintains updated case analyst notes, the Forensic tracker, timeline and attack map for collaboration within the team in our centralized case location
  • Drafts detailed updates regarding investigative findings and conclusions drawn from analysis regarding the timing and mechanism of the initial intrusion, adversary actions, timeline of activity/lateral movement, and indicators of data access and/or exfiltration
  • Identifies, documents, and shares information such as critical IOCs or adversary TTP s as they uncovered with the Incident Response, Threat Intel, and Security Operations teams
  • Communicates identified IOCs to the Tiger Team in furtherance of the investigation, path to restoration/response, and for bolstering of Client s security posture
  • Employs the usage of incident-mapping frameworks such as MITRE s ATT&CK and Lockheed Martin s Cyber Kill Chain to help contextualize identified adversary actions/IOCs
  • Produces written incident, investigative updates and reports at the explicit direction of counsel partners
  • Communicates within the DFIR team and provide routine status updates within our case management platform
  • Works with cross-functional teams and collaborate to leverage threat intel TTPS/IOCs, information from our SOC/Threat Hunting team, and updates from our Negotiations teams to leverage the intelligence as part of the incident
  • Drafts reports and appendices based on the findings using the standard report templates
  • Accurately track and record time for forensic analysis
  • May perform other duties as assigned by management
SKILLS AND KNOWLEDGE
  • Deep understanding of Forensic artifacts, including (but not limited to) the analysis of operating system artifacts and the recovery of deleted items from multiple operating systems including Windows, Linux, Mac and RAM/memory forensics
  • Experience analyzing network and operating system log files including Windows Event logs, Unified Audit Logs, Firewall logs, VPN logs, etc.
  • Working knowledge of:
  • Windows disk and memory forensics
  • Network Security Monitoring (NSM), network traffic analysis, and log analysis
  • Unix or Linux disk and memory forensic
  • Experience and understanding of enterprise security controls
  • Experienced with EnCase, Axiom, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCP Dump, and other open-source forensic tools
  • Experience delivering technical findings to a non-technical audience, preferred
  • Provide findings in a confident, factual manner, preferred
  • Knowledge and experience in handling PII, PHI, sensitive, confidential and proprietary datasets, preferred
  • Experience with Cyber insurance investigations, preferred
JOB REQUIREMENTS

More Info

Industry:Other

Function:technology

Job Type:Permanent Job

Skills Required

Login to check your skill match score

Login

Date Posted: 14/06/2024

Job ID: 81661615

Report Job

About Company

Hi , want to stand out? Get your resume crafted by experts.

Similar Jobs

Operations Analyst I

Epiq Systems Inc Company Name Confidential

Analyst I

SeagateCompany Name Confidential
Last Updated: 14-06-2024 09:27:43 AM