drjobs Forensics Analyst

Forensics Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Tokyo - Japan

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

At Arctic Wolf were not just navigating the cybersecurity landscape - were redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: weve earned recognition on theForbes Cloud 100 CNBC Disruptor 50 Fortune Future 50 and Fortune Cyber 60lists and we recently took home the2024 CRN Products of the Yearaward. Were proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers Choice distinction from Gartner Peer Insights. Our Aurora Platform also received CRNs Products of the Year award in the inaugural Security Operations Platform category. Join a company thats not only leading but also shaping the future of security operations.

Our mission is simple: End Cyber Risk. Were looking for an Incident Response Forensics Analyst to be part of making that happen.

About the Role:

The Incident Response Forensic Analyst is a highly technical member of Digital Forensics and Incident Response (DFIR) team. The Forensic Analyst is responsible for conducting forensic investigations of traditional network intrusions in Active Directory environments along with Business Email Compromises (BEC). The Analyst assists with technical initiatives that further the business while taking opportunities to mentor junior analysts.

Responsibilities:

Technical Competencies

  • Conduct forensic investigations for organizations that have suffered an attack from targeted threats such as Advanced Persistent Threats Organized Crime and politically motivated groups or from commodity threats such as ransomware groups.
  • Perform host forensic analysis on Windows Linux and Mac OS based systems.
  • Perform network analysis using a variety of tools and log sources to include firewall logs NetFlow and logs generated from a variety of network intrusions detection/prevention tools.
  • Assist with/conduct the forensic acquisition and analysis from Azure Amazon Web Services (AWS) and Google Cloud Platform (GCP) environments.
  • Leverage applicable tooling to contain and eradicate a threat actors presence from a clients network when responding to live intrusion events.
  • Understand the capabilities of malicious binaries and scripts through basic static and dynamic analysis efforts.
  • Make tactical recommendations for compromised client organizations.

Communication and Client Management

  • Communicate both executive and detailed level findings in verbal and written form; Present technical findings in a manner that assists external legal counsel in understanding potential regulatory implications.
  • Communicate all items relevant to the forensic investigation in a manner that deescalates situations and presents a coherent strategy moving forward.
  • Scope new cases and lead update calls when needed.

Leadership and Initiatives

  • Stays current with developments within the DFIR field; Integrates new developments into current processes and procedures where necessary
  • Partner with internal teams to publish blogs regarding threat actor tactics techniques and procedures (TTP) vulnerabilities
  • Mentor junior analysts on technical and soft skills

General

  • Participate in weekday escalation and weekend/holiday on call schedules.
  • Conduct audits and peer review of incident reports.
  • Fosters information sharing and collaboration.

Required Skills and Experience:

  • Two or more years professional experience with digital forensics and incident response or other similar cybersecurity roles
  • Ability to respond to inquiries and work beyond normal business hours as needed
  • Advanced knowledge of host-based forensic network analysis and data breach response
  • Advanced knowledge of current attack vectors and trends in cybersecurity
  • Ability to identify indicators of compromise (IOC) from newly released exploits that have little to no community documentation
  • Experience with IR and forensic tools such as Magnet Axiom Encase FTK X-Ways SIFT and other open-source forensic tools
  • Experience with commercial Endpoint Detection and Response (EDR) network monitoring and Security Information and Event Management (SIEM) tools
  • Analysis of disparate forensic artifacts
  • Ability to draw sound conclusions despite gaps or ambiguity with evidence
  • Written and verbal communication
  • Team mentorship and knowledge sharing

Preferred Skills and Experience:

  • Bachelors Degree in Information Security Digital Forensics Computer Science or other related field
  • Certifications: GCFA GCFE ACE EnCE or similar training and certification
  • Prior consulting experience
  • Prior experience presenting at industry conferences and events
  • Prior experience developing scripts and tools to analyze data
  • Prior experience with malware analysis and reverse engineering

About Arctic Wolf:

At Arctic Wolf we foster a collaborative and inclusive work environment that thrives on diversity of thought background and culture. This is reflected in our multiple awards including Top Workplace USA (2021-2024) Best Places to Work USA (2021-2024) Great Place to Work Canada (2021-2024) Great Place to Work UK (2024) and Kununu Top Company Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction with over 7000 customers worldwide and more than 2000 channel partners globally. As we continue to expand globally and enhance our technology Arctic Wolf remains the most trusted name in the industry.

Our Values

Arctic Wolf recognizes that success comes from delighting our customers so we work together to ensure that happens every day. We believe in diversity and inclusion and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate thatby protecting peoples and organizations sensitive data and seeking to end cyber risk we get to work in an industry that is fundamental to the greater good.

We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here.

We also believe and practice corporate responsibility and have recently joined the Pledge 1% Movement ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities.

All wolves receive compelling compensation and benefits packages including:


Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race color religion sex orientation national origin age disability genetics or any other basis forbidden under federal provincial or local law. Arctic Wolf is committed to fostering a welcoming accessible respectful and inclusive environment ensuring equal access and participation for people with disabilities. As such we strive to make our entireemployeeexperience as accessible as possible and provideaccommodationsas required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing
.

Security Requirements:


Required Experience:

IC

Employment Type

Full-Time

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.