UTI Cybersecurity, Cloud and IT LLC
Incident Response and Digital Forensics consultant with Pen Testing Background will work on our security services projects. He / she should have experience / knowledge following:-
General
The candidate should have:
minimum 2 years of professional experience in Digital Forensics and Incident Response
background in IT Security
relevant certifications for CHFI, DFIR and security
knowledge about operating systems (Windows, Linux), memory forensics, networking and core TCP/IP protocols
a basic understanding of core processes in DFIR like the “Cyber Kill Chain” and others
Host Forensics
Understanding Windows, Active Directory and Linux/ Unix core functions like:
processes and services/ daemons
registry on Windows and core files in /etc/ on Unix
event logging on Windows and Unix/ Linux
Any candidate must be able to analyze core evidence on Windows systems like:
prefetch, shimcache, LNK files and shellbags
timestamps in the file system and in NTFS files like $MFT, $J and $Logfile
common autostart locations in the registry and the Windows operating system
Host forensics can be done on the live operating system or on forensic hard drive images. The applicant must be able to perform both, and should know the right processes to preserve, gather and analyse evidence in both scenarios.
Memory Forensics
We expect experience in:
creating memory dumps with various tools
analysing memory dumps with Volatility, Rekall or other products
Networking Concepts and Network Forensics
For this job it is necessary to have at least a basic understanding of:
routing, switching and firewalling
knowledge about core protocols like DNS, SSH, SMB, Kerberos, SFTP, HTTP/S, ARP, SMTP, IMAP and DHCP
capturing packets with Wireshark or other common tools
analysing basic network traffic and recognizing the aforementioned protocols from their PCAP
Files
Attackers and Malware
The candidate must have experience in dealing with malware of all kinds. We expect knowledge about:
common attack vectors attackers use to compromise customer environments
different types of malware like trojans, worms and ransomware
persistence mechanisms on Windows and Linux
log analysis and correlation
Nice-to-have Skills and Experience (Optional)
It is a bonus, if the candidate has experience in some of the following areas:
security advisory and consulting
system administration
programming languages and scripting, especially Python or a high-level language like C#, C++
penetrations testing, red teaming or vulnerability assessments
malware analysis
Experience with the following tools and software is beneficial, too:
write blockers from CRU and/ or Logicube
Wireshark, Volatility (Volexity) and FTK Imager
X-Ways Forensics or any other professional tool for forensic investigations
Any other open-source of commercial tool to conduct digital forensic investigations
Microsoft Office and O365
Experience
2 – 3 years of working experience.
Skills
– Works independently and collaboratively to resolve challenges facing the team quickly and completely
– Excellent communication and presentation skills and the proven ability to work effectively with all levels of IT and business management.
– Flexible, self-motivated, and able to work independently in a fast-paced environment
– Language skills to communicate in English
Education
Bachelor of IT or Computer Science
Master will be added advantage
Certifications and trainings
Digital Forensics and Incident Response (DFIR)
Computer Hacking Forensic Investigator (CHFI)
Certified Ethical Hacker (CEH)
Strong network security knowledge
Package
Based on knowledge and experience, which will be discussed during interview
Contract Terms
3 Months contract
Job Locations
Doha, Qatar