Dear Consultant,
I recently came across your resume posting on the internet and was
wondering if you are still available or interested in
hearing about other career opportunities? Below is a job description I
would like to discuss with you. If you or someone you
know might be interested in hearing more about this or other career
opportunities please email me a word version of you
resume along with the best time and number to reach you at.

*REPLY ME AT:dayle.wil...@itbtalent.com <dayle.wil...@itbtalent.com>*

Title: Forensics Consultant
Location: Columbus OH
Duration: 6+ Months

Mandatory:
.4+ years hands-on experience in computer forensics.
.Deep technical knowledge of methods utilized for evidence collection,
maintenance of chain of custody and associated documentation, evidence
storage and analysis and evidentiary reporting
.Familiarity with computer system hardware and software installation and
troubleshooting
.Expert knowledge of forensic file system and memory techniques and use of
the most commonly used toolsets, such as dtSearch, EnCase, and FTK Suite.

Preferred Certifications - It is preferred that candidates have one or more
of the following certifications:
.AccessData Certified Examiner (ACE)
.Certified Computer Examiner (CCE)
.Certified Forensic Computer Examiner (CFCE)
.CyberSecurity Forensic Analyst (CSFA):
.Certified Computer Crime Investigator
.EnCase Certified Examiner (EnCe)

Role Description
Cyber Incident Response, computer forensics, electronic discovery and
information security. The primary purpose of this position is to conduct
computer forensic investigations, data recovery and electronic discovery.
The candidate will be expected to have a solid foundation of technical
experience and expertise and possess strong written and verbal
communication skills. Candidate will perform the following duties:
.Perform forensic analysis to preserve and analyze data from diverse set of
digital data sources, including laptop and desktop computers, servers,
networks and mobile devices.
.Identify and investigate intrusions to determine the cause and extent of
the breach, leveraging threat intelligence sources as needed.

Regards
Dayle Wilson - IT Technical Recruiter
ITBrainiac Inc.
Direct : 201-448-4949
dayle.wil...@itbtalent.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to