Upvote
Downvote
Host - Based Cyber Forensics Analyst
Share Job
- Suggest Revision
- Some remote work is allowed for this role, but you must also be able to work onsite.
- Experience with MITRE ATT&CK; Windows Event IDs; familiarity with Linux & Windows artifacts & interpretation; network topologies/architecture; basic malware analysis; incident response & threat hunting (at scale); Advanced Persistent Threats (APTs) tactics, techniques, and protocols (TTPs); computer forensics, digital forensics, memory forensics, Red/Blue/Purple Teams
- Demonstrated use with FTK, Encase, Axiom, Xways, Autopsy, SIFT, Mandiant HX, FireEye, SOFL-ELK, Moloch, Wireshark, Network Miner, NetWitness, CyberChef, Corelight, Zeek, Bro IDS, Security Onion, ArcSight, (Bonus: Powershall, Python, etc.
- Desired certifications: CEH | Security+ | CHFI
- Desired certifications: CEH | Security+ | CHFI | GCIH | GCFE
Active Job
Updated 7 days agoSimilar Job
Relevance
Active