Type:
Vast dienstverband
Locatie:
Amsterdam
Opleiding:
Bachelor (EQF 6)
Gepubliceerd:
01/10/2024
Status:
Open
Reageer voor:
30/12/2024
Uur p/wk:
40
Meer informatie

We are looking for a Digital Forensics and Incident Response Specialist to join our team. You will be required to identify and collect sources of digital evidence, identify the chain of infected computers during incident response, conduct forensic research and analysis, reconstruct the timeline of an attack, prepare conclusions, and generally get to the bottom of things.

 

Tasks to solve

  • Respond to complex сyberthreat incidents
  • Conduct forensic analysis on workstations, servers and network traffic
  • Visit clients to support them and collect digital evidence
  • Recover data
  • Identify counter-criminalistic methods and techniques
  • Reconstruct the most sophisticated cyberattacks based on the collected sources of digital evidence

This role is perfect for you if

  • You know how current operating systems are designed and where forensic artefacts in them are mainly located, as well as how to retrieve the artefacts quickly and efficiently and turn them into digital evidence
  • You know cybercrime trends, the main tactics, techniques and procedures used by attackers, and how they can be detected during forensic analysis. What is MITRE ATT&CK® and why is it needed?
  • You know how corporate networks are arranged and cybercriminals usually behave once they get into them.
  • You know what are antivirus, firewall, proxy, EDR / XDR, IDS / IPS, SIEM, DLP, and other useful abbreviations?
  • You know how to communicate effectively with the customer and his IT staff.
  • You know how to write opinions and reports and how to fill out acts and forms.

What else we appreciate in our team

  • Bachelor’s degree, preferably in Forensic Computing, Computer Science or Computer Security (but we don’t care about education if you’re skilled enough)
  • Writing YARA and SIGMA rules
  • Writing scripts on Powershell (or whatever by your choice)
  • Basic malware analysis skills
  • Experience using free and commercial forensic software (Magnet AXIOM/IEF, BlackBag BlackLight, Cellebrite UFED, and other related hardware and software)
  • Possessing forensic credentials such as GCFE, GCFA, MCFE or similar
  • Good English and German proficiency