Job Search

DFIR Engagement Manager

Remote

Piper Companies Logo

Job Id:
139066

Job Category:

Job Location:
Remote

Security Clearance:
None

Business Unit:
Piper Companies

Division:
Piper Enterprise Solutions

Position Owner:
Ryan Lucas

Piper companies is seeking an Engagement Lead to run point on Business Email Compromise and Ransomware engagements. The lead will work with both small and large organizations of varying levels of technical maturity, handle client cyber incidents and spearhead communication, scoping, as well as utilizing technical skills to analyze intrusions and detect incidents. You must be capable of working in a high stress IR situation and effectively navigate through the IR lifecycle. You will be responsible for leading the technical analysis of an IR investigation as well as communicating effectively and providing off-hours support as needed. External client facing investigation experience is required to be considered.


Responsibilities:

  • Assist with the scoping of new engagements using a whole lifecycle approach, guiding the client from initial discovery through mitigation and remediation
  • Conduct forensic host, network, and application technical investigations
  • Lead tabletop exercises, incident response training, incident response plan organizational maturity reviews, and leaked data exposure assessments
  • Triage active high-stakes security events, including reviewing and applying security controls to detect, respond, prevent and remediate threats
  • Develop comprehensive and accurate reports of forensic findings and IR activities for both technical and executive audiences
  • Effectively communicate investigative findings and strategy to various client stakeholders
  • Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks

Knowledge and Skills:

• 5 - 10 years of experience, leading business email compromise and ransomware investigations

• Primary Tooling: Binalyze, Microsoft Defender, Microsoft Sentinel

• Log analysis: Log analysis tools such as Elastic, Splunk and query syntax such as KQL and regular expressions (GREP) and analyze various log types such as network, firewalls, windows events, SIEM and VPN

• Forensic analysis: Computer/Digital forensics tools such as X-Ways, AXIOM, Volatility, Velociraptor, Chainsaw, Hayabusa

• Digital Forensic Artifact Analysis: Registry, Browser History, MFT, File/Folder Access, User Account Activity

• Coding: Ability to write scripts and code tools to assist with automation and analysis in Python, PowerShell, SQL, Bash

• Methodology: Sound knowledge of most common tactics and techniques performed by adversaries in order to identify traces of their activity

• EDR Solutions: Defender (Primary), but familiar with other mainstream EDR tools such as Sentinel One, CrowdStrike, Cortex XDR, Sophos, Cylance and Trend Micro, etc

• Experience in conducting or familiar with ransomware negotiations


Comprehensive Benefits:

  • Medical, Dental, Vision, 401K, PTO
  • $160,000 - $180,000 (12-20% annual bonus)




Keywords: DFIR, IR, Digital forensics, Live box, Deadbox, windows, mac, mobile. incidents, ransomware, malware, network intrusions, ftk, axiom, xwayz, velociraptor, host, network, tabletop, scoping, engagement, threats, edr, endpoint detection



Apply For This Position


Personal Information

Required
Required
Required
Required
Required
Required
Required

Additional Details

Required
Required
Required

Voluntary Self-identification Form

Required
Required
Required

Veteran Status *

Discharge Date:

Resume Upload

Please note only files with .pdf, .docx, or .doc file extensions are accepted.

Currently selected file:

Don't have a resume?