Incident Response and Digital Forensics

Job Category:

UTI Cybersecurity, Cloud and IT LLC

Incident Response and Digital Forensics consultant with Pen Testing Background will work on our security services projects. He / she should have experience / knowledge following:-

General

The candidate should have:

minimum 2 years of professional experience in Digital Forensics and Incident Response
background in IT Security
relevant certifications for CHFI, DFIR and security
knowledge about operating systems (Windows, Linux), memory forensics, networking and core TCP/IP protocols
a basic understanding of core processes in DFIR like the “Cyber Kill Chain” and others
Host Forensics

Understanding Windows, Active Directory and Linux/ Unix core functions like:

processes and services/ daemons
registry on Windows and core files in /etc/ on Unix
event logging on Windows and Unix/ Linux
Any candidate must be able to analyze core evidence on Windows systems like:

prefetch, shimcache, LNK files and shellbags
timestamps in the file system and in NTFS files like $MFT, $J and $Logfile
common autostart locations in the registry and the Windows operating system
Host forensics can be done on the live operating system or on forensic hard drive images. The applicant must be able to perform both, and should know the right processes to preserve, gather and analyse evidence in both scenarios.

Memory Forensics

We expect experience in:

creating memory dumps with various tools
analysing memory dumps with Volatility, Rekall or other products
Networking Concepts and Network Forensics

For this job it is necessary to have at least a basic understanding of:

routing, switching and firewalling
knowledge about core protocols like DNS, SSH, SMB, Kerberos, SFTP, HTTP/S, ARP, SMTP, IMAP and DHCP
capturing packets with Wireshark or other common tools
analysing basic network traffic and recognizing the aforementioned protocols from their PCAP
Files
Attackers and Malware

The candidate must have experience in dealing with malware of all kinds. We expect knowledge about:

common attack vectors attackers use to compromise customer environments
different types of malware like trojans, worms and ransomware
persistence mechanisms on Windows and Linux
log analysis and correlation
Nice-to-have Skills and Experience (Optional)

It is a bonus, if the candidate has experience in some of the following areas:

security advisory and consulting
system administration
programming languages and scripting, especially Python or a high-level language like C#, C++
penetrations testing, red teaming or vulnerability assessments
malware analysis
Experience with the following tools and software is beneficial, too:

write blockers from CRU and/ or Logicube
Wireshark, Volatility (Volexity) and FTK Imager
X-Ways Forensics or any other professional tool for forensic investigations
Any other open-source of commercial tool to conduct digital forensic investigations
Microsoft Office and O365

Experience

2 – 3 years of working experience.

Skills

– Works independently and collaboratively to resolve challenges facing the team quickly and completely

– Excellent communication and presentation skills and the proven ability to work effectively with all levels of IT and business management.

– Flexible, self-motivated, and able to work independently in a fast-paced environment

– Language skills to communicate in English

Education

Bachelor of IT or Computer Science

Master will be added advantage

Certifications and trainings

Digital Forensics and Incident Response (DFIR)
Computer Hacking Forensic Investigator (CHFI)
Certified Ethical Hacker (CEH)
Strong network security knowledge

Package

Based on knowledge and experience, which will be discussed during interview

Contract Terms

3 Months contract

Job Locations

Doha, Qatar

Tagged as: , ,

Upload your CV/resume or any other relevant file. Max. file size: 5 MB.