Title: Forensics Consultant. Location: Columbus,OH. Duration: 6-12 Months.
*Reply Me At j...@itbtalent.com <j...@itbtalent.com>* Relevant Experience Mandatory: . 4+ years hands-on experience in computer forensics. .Deep technical knowledge of methods utilized for evidence collection, maintenance of chain of custody and associated documentation, evidence storage and analysis and evidentiary reporting .Familiarity with computer system hardware and software installation and troubleshooting .Expert knowledge of forensic file system and memory techniques and use of the most commonly used toolsets, such as dtSearch, EnCase, and FTK Suite. Preferred Certifications - It is preferred that candidates have one or more of the following certifications: .AccessData Certified Examiner (ACE) .Certified Computer Examiner (CCE) .Certified Forensic Computer Examiner (CFCE) .CyberSecurity Forensic Analyst (CSFA): .Certified Computer Crime Investigator .EnCase Certified Examiner (EnCe) Preferred Education- - Bachelor's or master's degree in computer systems security or related field Role Description Cyber Incident Response, computer forensics, electronic discovery and information security. The primary purpose of this position is to conduct computer forensic investigations, data recovery and electronic discovery. The candidate will be expected to have a solid foundation of technical experience and expertise and possess strong written and verbal communication skills. Candidate will perform the following duties: .Perform forensic analysis to preserve and analyze data from diverse set of digital data sources, including laptop and desktop computers, servers, networks and mobile devices. .Identify and investigate intrusions to determine the cause and extent of the breach, leveraging threat intelligence sources as needed. .Coordinate with agency representatives and State CISO to establish the necessary response to breaches. .Perform full scope of incident response process including pre-incident preparation, triage and post-incident computer forensics without destruction of critical data .Conduct digital forensic investigations across numerous devices to include but not limited to stand-alone computers, laptops, handheld devices and servers (Various OS such as Windows, Linux, Android, MAC, IOS, etc.) .Conduct enterprise computer security investigations and analysis including but not limited to computer abuse and attacks/intrusions .Follow through on investigations and analysis until all possible leads have been exhausted. .Conduct real-world computer forensics and provide accurate evidence of computer crimes to law-enforcement agencies while using only approved techniques for collecting and preserving evidence .Provide detailed reports and recommendations based on investigative findings Thanks, j...@itbtalent.com Direct : 609-935-3773X103 116 Village Blvd, Suite 200 - Princeton, NJ 08540 www.itbrainiac.com -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to firstname.lastname@example.org. Visit this group at https://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.