Match score not available

Digital Forensics & Incident Response Lead

Remote: 
Full Remote
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

Minimum 4-6 years of Incident Response experience, Experience in EDR and forensic investigations, NIST Framework knowledge.

Key responsabilities:

  • Lead incident response activities and provide guidance to the team
  • Develop and document incident response methods, run books, and tools
  • Collaborate with cross-functional teams and third parties for investigations and remediation
  • Provide technical reports and KPIs to senior management
  • Support a 24/7/365 service delivery team for complex investigations and troubleshooting
CyberClan logo
CyberClan Computer Hardware & Networking SME https://cyberclan.com/
51 - 200 Employees
See more CyberClan offers

Job description

Company Summary

 

Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber attacks with proven defensive methodology. Our goal is to get businesses fully operational as quickly as possible and to further prevent any down time or impact to the business operations. CyberClan investigates and assists clients with all types of security breaches, insider threat, unauthorized access, malicious code.

 

Responsibilities of Role:

  • Responsible for being the focal incident response point for all within the organization (Incident Response/Post Breach Remediation/RMS Advisory/MSSP Advisory). This includes being able to provide initial analysis and identification of IOC’s, escalation to the appropriate business units and post-incident activities.
  • Responsible for supporting a wide number of technologies and being able to proficiently perform advanced troubleshooting on the fly (packet captures, debugs, traffic analysis)
  • Work on the continued development of CERT and Machine investigation lifecycles as part of the ongoing process to enhance IR capabilities; also provide significant contribution to the revision of Incident Response and Post Breach Remediation policies, procedures and process.
  • Responsible for developing and documenting Incident Response methods and guidelines for the organization.
  • Develop a detailed Incident Response run book of tools, techniques and forensic methods for personnel to utilize during investigations.
  • Perform live-endpoint investigation; including the identification and gathering of key forensic artifacts, offline investigation as needed and providing remediation actions as needed.
  • Implements and deploys an Incident Response focused ticketing system to improve incident tracking, remediation and metrics for incidents worked.
  • Responsible for working with 3rd parties in order to assist with incident response, business email compromise, security breach, improve overall security, investigations, recommendations and remediation.
  • Responsible for reporting of security metrics related to the Incident Response team.
  • Provides mentoring to team members of incident response techniques and methodologies.
  • Assists Sales and SOC in the successful conversion from incident response, PBR, RMS, eDiscovery to SOC; including process and procedure build out.
  • Developing and providing high-level technical reports in response to clients.
  • Developing and providing high-level business unit specific KPI’s to senior management.
  • Serve as a member of a 24x7/365 service delivery team that handles incident response, post breach remediation, escalation, required to perform complex investigations and/or troubleshooting and driving root cause to resolution.

 

Requirements/Must Haves:

  • Minimum 4-6 years of experience in Incident Response
  • Experience in conducting Table Top Exercises in Incident Response
  • Experience in the deployment and management of EDR Technology
  • Experience with Security Technologies and NIST Framework
  • Developing, documenting and implementing incident response methods, process
  • Perform live endpoint investigations
  • Experience in forensic investigations both on-premise and cloud
  • Experience in mentoring developing and delivering in-house training
  • Must be available to provide coverage to meet business requirements in 3 regions
  • Strong knowledge of DFIR Tools
  • Strong knowledge of Virtualization Technologies, Operating Systems, Firewalls, VPN’s, SIEM, Enterprise Gateway Technologies, Networking Devices, Security Technologies, etc.
  • Knowledge on how to conduct a Penetration Test
  • Availability to work PST hours 

 

Asset/Nice-to-Have:

  • Bilingual – Ability to communicate in English and French

 

Job Type

  • Full-Time/Exempt

 

Location

  • 100% Telecommuting
  • Candidate must have legal authorization to work in Canada

 

Physical Requirements

Prolonged periods of sitting at a desk and working on a computer.

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Computer Hardware & Networking
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Verbal Communication Skills
  • Teamwork
  • Mentorship

Incident Response Analyst Related jobs