This job has expired

Manager, Digital Forensics and Incident Response

Employer
Aon
Location
UK
Salary
Competitive
Closing date
26 Jun 2022

View more

Sector
Technology & New Media
Contract Type
Permanent
Hours
Full Time
You need to sign in or create an account to save a job.
Your impact as a Manager, Digital Forensics & Incident Response (DFIR)

As Manager, you are expected to bring several years' experience in the cybersecurity industry to bear on your casework. You will work at the direction of a Director or Managing Director in the unit to scope, coordinate, and provide peerless service on client cases-- which might require analysis of any technology used today: mobile devices, laptops and workstations, servers, networking switches, IoT devices, or cloud-based accounts and infrastructure. You will be expected to perform daily tasks associated with cyber breach response and investigations. As Manager, you are responsible for augmenting and strengthening your personal DFIR skill set, as well as helping develop the skills of the entire DFIR team.

Job Responsibilities
  • Support the most complex forensic analyses handled by the firm.
  • Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host-based and network-based analysis across all major operating systems and network device platforms.
  • Preserve, harvest and analyse data from electronic data sources, including laptop and desktop computers, servers, and mobile devices.
  • Produce high-quality oral and written work product, presenting complex technical matters clearly and concisely.
  • Form and articulate expert opinions based on analysis.
  • Possess the experience, credibility, and integrity to perform as an expert witness.
  • Consult with and take direction from supervisors, engagement managers, and clients regarding case investigation and status.
  • Support the mentorship and technical development of junior Digital Forensics staff.
  • Investigate instances of malicious code and documents to determine attack vectors and payloads.
  • Develop and refine policies and procedures for forensic and malware analyses.
  • Research, develop, and recommend hardware and software needed for incident response and help develop and maintain policies and procedures to analyse digital evidence.
  • Participate in technical meetings and working groups to address issues related to cybersecurity and incident preparedness and ability to create targeted remediation plans for clients who have been compromised.

You Bring Knowledge and Expertise

Required Experience
  • Digital forensics / incident response certification(s) such as SANS certifications (GCFA, GCIH etc), CREST certifications (CPIA, CRIA etc.), or equivalent.
  • Deep experience with most common operating systems (Windows, macOS, Linux, iOS, Android) and their file systems (ext3/4, HFS+, APFS, NTFS, exFAT, etc.).
  • Proficiency with industry-standard DFIR toolsets, including X-Ways, EnCase, Axiom/IEF, Cellebrite, FTK and Volatility.
  • Proficiency with database querying and analysis.
  • Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.
  • Experience with conducting log analysis of Windows Event Logs, Apache, IIS, and firewall logs.
  • Experience with command line tools (grep, sed, awk, powershell), python, and other programming languages.
  • Familiarity with computer system hardware and software installation and troubleshooting.
  • Well-developed analytic, qualitative, and quantitative reasoning skills and demonstrated creative problem-solving abilities.
  • Proficiency with MS Office Applications, and familiarity with Windows, Macintosh and Linux operating systems.

Preferred Experience
  • Strong work ethic and motivation, with a demonstrated history of ability to lead a team and develop talent. Even stronger analytic, quantitative, and creative problem-solving abilities.
  • Interest in building intellectual capital for the firm by writing blogs and creating internal tools for analysis.
  • Ability to anticipate and respond to changing priorities and operate effectively in a dynamic, demand-based environment, requiring flexibility and responsiveness to client matters and needs.
  • Strong verbal and written communication skills.
  • Must be able to work collaboratively across departments and physical locations.
  • Participation in technical meetings and working groups to address issues related to malware security, vulnerabilities, and issues of cybersecurity and preparedness.
  • A high level of professionalism in all areas of performance.
  • A constantly developed DFIR skill set, and proficiency with industry standard tools and practices, through outside training and research.
  • Comfort with intermittent periods of significant travel, evening and weekend hours.

#LI-AT1

#LI-HYBRID
2504945
You need to sign in or create an account to save a job.

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert