Title: Forensics Consultant.
Location: Columbus,OH.
Duration: 6-12 Months.

*Reply Me At j...@itbtalent.com <j...@itbtalent.com>*

Relevant Experience
. 4+ years hands-on experience in computer forensics.
.Deep technical knowledge of methods utilized for evidence collection,
maintenance of chain of custody and associated documentation, evidence
storage and analysis and evidentiary reporting
.Familiarity with computer system hardware and software installation and
.Expert knowledge of forensic file system and memory techniques and use of
the most commonly used toolsets, such as dtSearch, EnCase, and FTK Suite.

Preferred Certifications - It is preferred that candidates have one or more
of the following certifications:
.AccessData Certified Examiner (ACE)
.Certified Computer Examiner (CCE)
.Certified Forensic Computer Examiner (CFCE)
.CyberSecurity Forensic Analyst (CSFA):
.Certified Computer Crime Investigator
.EnCase Certified Examiner (EnCe)

Preferred Education- -   Bachelor's or master's degree in computer systems
security or related field
Role Description
Cyber Incident Response, computer forensics, electronic discovery and
information security. The primary purpose of this position is to conduct
computer forensic investigations, data recovery

and electronic discovery. The candidate will be expected to have a solid
foundation of technical experience and expertise and possess strong written
and verbal communication skills. Candidate

will perform the following duties:
.Perform forensic analysis to preserve and analyze data from diverse set of
digital data sources, including laptop and desktop computers, servers,
networks and mobile devices.
.Identify and investigate intrusions to determine the cause and extent of
the breach, leveraging threat intelligence sources as needed.
.Coordinate with agency representatives and State CISO to establish the
necessary response to breaches.
.Perform full scope of incident response process including pre-incident
preparation, triage and post-incident computer forensics without
destruction of critical data
.Conduct digital forensic investigations across numerous devices to include
but not limited to stand-alone computers, laptops, handheld devices and
servers (Various OS such as Windows, Linux,

Android, MAC, IOS, etc.)
.Conduct enterprise computer security investigations and analysis including
but not limited to computer abuse and attacks/intrusions
.Follow through on investigations and analysis until all possible leads
have been exhausted.
.Conduct real-world computer forensics and provide accurate evidence of
computer crimes to law-enforcement agencies while using only approved
techniques for collecting and preserving

.Provide detailed reports and recommendations based on investigative

Direct :  609-935-3773X103
116 Village Blvd, Suite 200 - Princeton, NJ 08540

You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to