Senior Digital Forensics and Incident Response (DFIR) Consultant
at Cypfer
Toronto, ON, Canada -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 02 Dec, 2024 | Not Specified | 05 Sep, 2024 | 5 year(s) or above | Perspectives,Digital Forensics,Ace,Soar,Operating Systems,Ence,Iscsi,Network Forensics,Technical Requirements,Incident Response,Raid,Siem,Overtime,Windows,Nfs | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
CYPFER is a leading first-responder cybersecurity organization enabling clients to swiftly and effectively return to business following a cyber-attack. As a global market leader in ransomware post-breach remediation and cyber-attack first response, we consistently deliver results that exceed market standards for handling cyber-extortion and ransomware events. Our team collaborates with prominent global insurance carriers, leading law firms, and Fortune 1000 businesses.
TECHNICAL REQUIREMENTS:
- 5+ years of experience in digital forensics, incident response, or a similar role.
- Strong knowledge of Windows and Unix/Linux operating systems.
- Expertise in threat hunting, network forensics, and EDR / EPP technologies.
- Skilled in forensic acquisition and analysis of physical and virtual systems.
- Advanced understanding of networking, routing, and firewall operations.
- Working knowledge of storage technologies such as RAID, NAS, SAN, Fiber Channel, iSCSI, and NFS.
- Ability to analyze and interpret logs from various sources.
- Familiarity with SIEM and SOAR solutions.
- Ability to perform threat research and analyze current threats.
- Understanding of business email compromise (BEC) cases and investigation techniques.
PREFERRED SKILLS:
- Experience with e-discovery tools and methodologies.
- Proficiency in collecting and analyzing data from mobile devices/cell phones.
- Industry certifications such as MCFE, ENCE, ACE, GCFA, GCIH, GNFA, GCFE or similar are a plus.
Compensation: Compensation package includes base salary, paid overtime, and multiple bonus opportunities.
Cypfer is an equal opportunity employer. If you need accommodation during the interview process or beyond, please let us know. We celebrate our inclusive work environment and welcome applicants from all backgrounds and perspectives.
We thank you for your interest in joining the Cypfer team! While we welcome all applicants, only those selected for an interview will be contacted
Responsibilities:
CORE RESPONSIBILITIES:
- Engage on behalf of CYPFER in incident response tasks, interacting with various insurance partners, legal counsel, incident response units, client executives, and technical teams.
- Utilize standard tools and methodologies to collect forensic artifacts and images from affected systems.
- Perform Windows/Unix/Linux forensics and triage, and network forensics to assess compromise and investigations.
- Skilled in malware analysis tools and methodologies.
- Apply mitigation strategies and concepts to remediate identified threats.
- Analyze triage collections/artifacts for indicators of compromise (IoCs) and potentially malicious activity.
- Review logs from host systems and appliances to identify suspicious activities.
- Collect forensic disk and memory images from physical and virtual endpoints and servers.
- Perform forensic analysis of physical systems, virtual machines, and network data.
- Understanding of an incident lifecycle and cyber-kill-chain.
- Familiarity with exfiltration techniques used by threat actors.
- Correlate events and build timelines of events.
- Maintain current knowledge on emerging threats and vulnerabilities.
- Analyze files for IOCs using various techniques.
- Conduct limited threat research based on IOCs collected during investigations.
- Understand obfuscation techniques used to conceal malicious commands and traffic, and lateral movement strategies employed by threat actors.
- Collaborate and share information within and across teams and communicate effectively with client managers and executives.
- Write detailed reports and summarize findings clearly and concisely.
- Participate in a rotating on-call schedule; ability to work on weekends and outside normal business hours as needed.
- This role is remote but requires the ability to travel on short notice to a client site up to 50%. Must maintain flexibility to travel frequently within 24-48 hours’ notice for deployments typically 1-2 weeks in duration.
BUSINESS RESPONSIBILITIES:
- Maintain current knowledge of information security, incident response techniques, emerging threats, and tools.
- Work independently and produce high-quality deliverables with minimal supervision.
- Exhibit strong customer service and consulting skills.
- Adhere to client and internal policies, procedures, and security practices.
- Maintain detailed notes and draft updates and reports as required.
- Remain calm, composed, and articulate in tough customer situations.
- Exhibit excellent relationship management and communication skills.
REQUIREMENT SUMMARY
Min:5.0Max:10.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Information Technology
Graduate
Proficient
1
Toronto, ON, Canada