[linuxjobs] Incident Response Vacancy
Peter Cannon
peter at cannon-linux.co.uk
Fri Nov 22 07:37:38 UTC 2013
On 21/11/2013 21:25, Benjamin Donnachie wrote:
>
> Not strictly a Linux vacancy but I'm looking for incident response
> professional with Linux experience. Job description below, salary up to
> £60k. Based out of our London office with travel required globally.
> Please apply online using the link available from
> http://www.accessdata.com/about/career-opportunities
>
> For more information please use my work account -
> bdonnachie at accessdata.com <mailto:bdonnachie at accessdata.com>
>
> No agencies please!
>
> Benjamin Donnachie
>
>
> *About AccessData Incident Response Services*
>
> AccessData is seeking qualified candidates to join our growing team as
> Incident Response Forensics Analysts. Our incident responders have
> backgrounds as government and Fortune 100 cyber security practitioners,
> and our services are regularly enlisted by some of the largest
> organizations in the world to deal with complex and sophisticated
> compromises. Because AccessData is also a leading cyber security
> software developer, our clients have the benefit of working with
> services experts who have unmatched expertise in the technology and the
> support of our development team behind them.
>
> *Essential Duties and Responsibilities*
>
> Conduct highly-confidential investigations for a global client list
> (e.g., data loss, virus outbreak, advanced persistent threats)
> Conduct examination of digital media (hard drives, mobile phones, etc.)
> Capture / analyse network traffic for indications of compromise
> Review log-based data, both in raw form and utilising SIEM or
> aggregation tools
> Employ best practices and forensically sound principals such as evidence
> handling and chain of custody
> Establish timelines and patterns of activity based on multiple data sources
> Identify, document and prepare reports on relevant findings
> Utilize varied forensic software such as FTK, Encase, Helix, etc.
> Effectively communicate with clients to establish timelines, manage
> expectations, and report findings
>
> *Required Knowledge, Skills and Abilities*
>
> Demonstrated computer forensic investigations experience
> Expert-level knowledge of common attack vectors and penetration techniques
> Solid working knowledge of networking technology and tools, firewalls,
> proxies, IDS/IPS, encryption
> Demonstrated knowledge of forensic tools such as Encase, FTK, Helix,
> Knoppix, Slax, Sleuthkit, SIFT
> Experience with malware analysis (reverse engineering)
> Excellent technical writing and presentation skills
> Ability to successfully interface with clients
> Event analysis and correlation
> Experience managing large and small scale incidents
>
> *Additional Preferred Skills*
>
> Strong understanding of networking protocols such as TCP/IP, IPSEC, RIP,
> EIGRP, OSPF
> Experience in a fast-paced consulting organisation
> Experience with programming or scripting languages
> Familiar with SIEM tools such as ArcSight, NitroSecurity, enVision, etc.
> Demonstrated system administration skills
>
> *Education / Experience*
>
> Bachelor’s degree in computer science, digital forensics or related
> technical discipline or demonstrated equivalent work experience.
> Minimum 5 years required in digital forensics and/or security, with 2
> years desired in incident response
> Preference given to candidates with current relevant industry
> certifications (ACE, EnCE, CFCE, CCE, DFCP, GCIA, GCIH, GREM, CSIH, etc.)
> **Note: Successful candidate will be required to obtain AccessData ACE
> certification within 1 year
I think you forgot to add "20 years Police or security service history, 10 years Diplomatic or Governorship of a colony. Ideally a professor or former University Don with ties to GCHQ, MI5, MI6" Sheesh.
--
Regards
Peter Cannon
IRC: dick_turpin @ freenode.net
https://twitter.com/dick_turpin
http://www.cannon-linux.co.uk
https://plus.google.com/100694334141523232451/posts
Podcast: http://tdtrs.co.uk
"There is every excuse for not knowing
There is no excuse for not asking"
More information about the linuxjobs
mailing list