Dear Consultant,
I recently came across your resume posting on the internet and was
wondering if you are still available or interested in
hearing about other career opportunities? Below is a job description I
would like to discuss with you. If you or someone you
know might be interested in hearing more about this or other career
opportunities please email me a word version of you
resume along with the best time and number to reach you at.

*REPLY ME AT:dayle.wil...@itbtalent.com <dayle.wil...@itbtalent.com>*

Title: Forensics Consultant
Location: Columbus OH
Duration: 6+ Months

Relevant Experience
Mandatory:
.4+ years hands-on experience in computer forensics.
.Deep technical knowledge of methods utilized for evidence collection,
maintenance of chain of custody and associated documentation, evidence
storage and analysis and evidentiary reporting
.Familiarity with computer system hardware and software installation and
troubleshooting
.Expert knowledge of forensic file system and memory techniques and use of
the most commonly used toolsets, such as dtSearch, EnCase, and FTK Suite.

Preferred Certifications - It is preferred that candidates have one or more
of the following certifications:
.AccessData Certified Examiner (ACE)
.Certified Computer Examiner (CCE)
.Certified Forensic Computer Examiner (CFCE)
.CyberSecurity Forensic Analyst (CSFA):
.Certified Computer Crime Investigator
.EnCase Certified Examiner (EnCe)

skills. Candidate will perform the following duties:
.Perform forensic analysis to preserve and analyze data from diverse set of
digital data sources, including laptop and desktop computers, servers,
networks and mobile devices.
.Identify and investigate intrusions to determine the cause and extent of
the breach, leveraging threat intelligence sources as needed.
.Coordinate with agency representatives and State CISO to establish the
necessary response to breaches.
.Perform full scope of incident response process including pre-incident
preparation, triage and post-incident computer forensics without
destruction of critical data
.Conduct digital forensic investigations across numerous devices to include
but not limited to stand-alone computers, laptops, handheld devices and
servers (Various OS such as Windows, Linux, Android, MAC, IOS, etc.)
.Conduct enterprise computer security investigations and analysis including
but not limited to computer abuse and attacks/intrusions
.Follow through on investigations and analysis until all possible leads
have been exhausted.
.Conduct real-world computer forensics and provide accurate evidence of
computer crimes to law-enforcement agencies while using only approved
techniques for collecting and preserving evidence
.Provide detailed reports and recommendations based on investigative
findings

Regards
Dayle Wilson - IT Technical Recruiter
ITBrainiac Inc.
Direct : 201-448-4949
dayle.wil...@itbtalent.com

-- 
You received this message because you are subscribed to the Google Groups 
"oraapps" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to oraapps+unsubscr...@googlegroups.com.
To post to this group, send email to oraapps@googlegroups.com.
Visit this group at https://groups.google.com/group/oraapps.
For more options, visit https://groups.google.com/d/optout.

Reply via email to