Pondurance · 11 hours ago
Senior Incident Response Consultant
Maximize your interview chances
Cloud SecurityCompliance
Insider Connection @Pondurance
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Conduct forensic host, network, and application technical investigations
Triage active high-stakes security events, including reviewing and applying security controls to detect, respond, prevent and remediate threats
Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
Develop custom scripts, tools, or methodologies to enhance our IR processes
Develop comprehensive and accurate reports of forensic findings and IR activities for both technical and executive audiences
Effectively communicate investigative findings and strategy to various client stakeholders
Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks
Assist with the scoping of new engagements using a whole lifecycle approach, guiding the client from initial discovery through mitigation and remediation
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Significant experience in a forensic and incident response role
Demonstrated experience using analytical skills in a cybersecurity environment to triage and detect events transpired and deal with Ransomware forensic investigations
Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats
Experience in a technical role for a consulting company
Strong hands-on working knowledge of: Windows OS and networking protocols, Windows disk and memory forensics, Unix OS and networking protocol, Network traffic analysis, Scripting and/or programming
Experience with commercial EDR (SentinelOne, Blackberry PROTECT, CarbonBlack, CrowdStrike) and Forensic tool suites (FTK, AXIOM, EnCase)
Reverse engineering and malware analysis
Conduct forensic host, network, and application technical investigations
Triage active high-stakes security events, including reviewing and applying security controls to detect, respond, prevent and remediate threats
Recognize and codify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations
Develop custom scripts, tools, or methodologies to enhance our IR processes
Develop comprehensive and accurate reports of forensic findings and IR activities for both technical and executive audiences
Effectively communicate investigative findings and strategy to various client stakeholders
Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks
Assist with the scoping of new engagements using a whole lifecycle approach, guiding the client from initial discovery through mitigation and remediation
Preferred
One or more of the following technical certifications preferred: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), MCFE, EnCE or equivalent certifications
Benefits
Medical, dental, vision, disability, FSA, HSA, life and AD&D insurance, 401(k) Plan.
Time off: PTO, sick, holiday, & parental leave details are available
We provide competitive compensation packages based on the market and your overall credentials.
Company
Pondurance
Pondurance is cybersecurity company that focuses on delivering both technology-enabled and compliance-advisory solutions.
Funding
Current Stage
Growth StageTotal Funding
unknownKey Investors
Newlight Partners
2020-10-27Private Equity· undefined
Recent News
Company data provided by crunchbase