The opportunities to contribute to the team in this role may include (but are not limited to):
- Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis.
- Providing expert digital forensic support for counsel and clients in support of data security incidents, such as data breaches or fraud.
- Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response.
- Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools
- Identify, research, and organize information to assess the appropriateness and sufficiency of available data to facilitate effective data access and analysis
- Developing familiarity with data that serves as input to this analysis, including threat intelligence, logging data, as well as contextual clues
- Recognizing relationships among multiple sources and types of information to facilitate effective data analysis
- Programming, model building, and database administration (Python, T-SQL, VBA, Excel, C#, among others)
- Ensuring reliability of analysis and risk management through implementing quality control measures and documentation
- Forensically acquire data and images from identified hosts, and then locate evidence of compromise determine its impact from disk, file, memory, and log analysis.
- Identify artifact and evidence locations to answer critical questions, including execution, file access, data theft, anti-forensics, and detailed system usage by an adversary.
- Detect and hunt unknown live, dormant, and custom malware across multiple hosts in an enterprise environment.
- Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts.
- Track adversary activity second-by-second on a host via in-depth timeline analysis.
- Understand the evidence needed to determine the type of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each.
- Identify lateral movement and pivots within client enterprises, showing how an adversary transitions from system to system without detection.
- Use physical memory analysis tools to determine an adversary’s activities on a host and other hosts the adversary used as pivot points across the network.
- Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation.
- Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections.
- Participating in practice-building activities including recruiting and training
Analysts have the unique opportunity to learn from, and work alongside, some of the most respected scholars, specialists, and industry experts in the world. You will have access to:
- Participate in internal and external training programs focused on consulting skills, analytical/problem-solving skills, communication, and other relevant topics
- Engage in Quarterly Tech Labs taught by in-house experts and affiliated professors
- Participate in extracurricular activities where you can take on a leadership role in recruiting, training, and volunteer activities in the local community
- Build and enhance service offerings of the incident response team to react to incidents by evaluating and implementing new tools and processes