Senior DFIR Analyst
JOB_52764571116200Job type
PermanentLocation
CANADAProfession
CyberIndustry
Supply Chain & LogisticsPay
110 - 120k
Fully remote Senior DFIR Analyst role with MSSP client
DFIR Analyst
Client: Global Cyber Security Firm
Role: DFIR Analyst
Job Type: Full-time Permanent
Location: Fully Remote
Salary: $110 – 120k + benefits
Your new company
Established in 2006, Our client selected team of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. Clients Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with proven defensive methodology. Goal is to get businesses fully operational as quickly as possible and to further prevent any downtown or impact to the business operations. Investigates and assists clients with all types of security breaches, insider threat, unauthorized access, malicious code
Your new role
- Oversee Incident Response Plans: Design, implement, and manage the client's incident response policies and procedures to ensure preparedness.
- Triage and Prioritize Incidents: Assess incidents for severity and potential impact, assigning appropriate resources and setting response priorities.
- Communication: Serve as technical point of contact during an incident, providing updates to internal and external stakeholders.
- Serve as an incident lead, reporting key findings, barriers, escalations and concerns to the Head of DFIR, while liaising with Legal, Director of Sales and IRC team
- Support the Global Head of DFIR with Project based work that advances the output and productivity of the department and organization
- Provide leadership and support to the CERT team
- Responsible f or supporting a wide number of technologies and being able to proficiently perform advanced troubleshooting on the fly (packet captures, debugs, traffic analysis)
- Work on the continued development of DFIR/CERT and Machine investigation lifecycles as part of the ongoing process to enhance IR capabilities; also provided significant contribution to the revision of Incident Response and Post Breach Remediation policies, procedures, and process.
- Support in the departments DFIR tooling selection process and any proof-of-concept projects.
- Chain of Custody: Ensure that evidence is collected, handled, and preserved in a legally defensible manner, maintaining the chain of custody for potential litigation.
- Perform live-endpoint investigation, including the identification and gathering of key forensic artifacts, off line investigation as needed and providing remediation actions as needed.
- Implements and deploys an Incident Response focused ticketing system to improve incident tracking, remediation and metrics for incidents worked.
- Post-incident Analysis: Conduct root cause analysis after incidents to identify vulnerabilities and develop strategies to prevent recurrence.
- Recovery Support: Work closely with IT and cybersecurity teams to guide recovery eff orts, including system restoration and remediation.
- Responsible for working with 3rd parties in order to assist with incident response, business email compromise, security breach, improve overall security, investigations, recommendations and remediation.
- Provides mentoring to team members of incident response techniques and methodologies
- Assists Sales and SOC in the successful conversion from incident response, PBR, RMS, eDiscovery to SOC; including process and procedure build out.
- Developing and providing high-level technical reports in response to clients
- Supporting Incident Response Coordinator (IRC) workflows.
- Incident Response Metrics and Reporting: Track and report key performance indicators (KPIs) and metrics related to incident response and digital forensics to senior leadership.
- Oversee the allocation of resources, including personnel, tools, and budgets, to effectively manage incident response and forensics operations.
- Create and maintain and enhanced onboarding program that is concise and repeatable, effectively covering all aspects of the CERT role
What you'll need to succeed
- Minimum 4 - 6 years of experience in Incident Response
- Experience in conducting Tabletop Exercises in Incident Response
- Experience in the deployment and management of EDR Technology
- Experience with Security Technologies and NIST Framework
- Developing, documenting and implementing incident response methods, process
- Perform live endpoint investigations
- Experience in forensic investigations both on-premise and cloud
- Experience in mentoring developing and delivering inhouse training
- Must be available to provide coverage to meet business requirements in 3 regions
- Strong knowledge of DFIR Tools
- Strong knowledge of Virtualization Technologies, Operating Systems, Firewalls, VPN’s, SIEM, Enterprise Gateway Technologies, Networking Devices, Security Technologies, etc
#LI-DNI
Senior DFIR AnalystJOB_527645711162002024-11-222025-02-21
Talk to Ryan Groves, the specialist consultant managing this position
Located in Vancouver (EN), Suite 2150,, 1050 West Pender Street,Telephone: 6042397008JOB_52764571116200