Dear Consultant, I recently came across your resume posting on the internet and was wondering if you are still available or interested in hearing about other career opportunities? Below is a job description I would like to discuss with you. If you or someone you know might be interested in hearing more about this or other career opportunities please email me a word version of you resume along with the best time and number to reach you at.
*REPLY ME AT:dayle.wil...@itbtalent.com <dayle.wil...@itbtalent.com>* Title: Forensics Consultant Location: Columbus OH Duration: 6+ Months Mandatory: .4+ years hands-on experience in computer forensics. .Deep technical knowledge of methods utilized for evidence collection, maintenance of chain of custody and associated documentation, evidence storage and analysis and evidentiary reporting .Familiarity with computer system hardware and software installation and troubleshooting .Expert knowledge of forensic file system and memory techniques and use of the most commonly used toolsets, such as dtSearch, EnCase, and FTK Suite. Preferred Certifications - It is preferred that candidates have one or more of the following certifications: .AccessData Certified Examiner (ACE) .Certified Computer Examiner (CCE) .Certified Forensic Computer Examiner (CFCE) .CyberSecurity Forensic Analyst (CSFA): .Certified Computer Crime Investigator .EnCase Certified Examiner (EnCe) Role Description Cyber Incident Response, computer forensics, electronic discovery and information security. The primary purpose of this position is to conduct computer forensic investigations, data recovery and electronic discovery. The candidate will be expected to have a solid foundation of technical experience and expertise and possess strong written and verbal communication skills. Candidate will perform the following duties: .Perform forensic analysis to preserve and analyze data from diverse set of digital data sources, including laptop and desktop computers, servers, networks and mobile devices. .Identify and investigate intrusions to determine the cause and extent of the breach, leveraging threat intelligence sources as needed. Regards Dayle Wilson - IT Technical Recruiter ITBrainiac Inc. Direct : 201-448-4949 dayle.wil...@itbtalent.com -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to firstname.lastname@example.org. Visit this group at https://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.