Role Description
As a Principal Engagement Lead, you will be responsible for leading multiple active cybersecurity engagements, interacting with clients, cyber insurers, and legal counsel. Your expertise will guide scoping calls, and you will collaborate closely with other Engagement Leads and Forensic Consultants on our team to ensure high quality service and resolution on active client matters.
-
Lead and oversee active client-facing incident response engagements, working closely with other team members to guide clients through the entire incident response lifecycle from detection to recovery.
-
Conduct scoping calls with clients to define the incident scope, objectives, and expectations of each engagement.
-
Work closely with other Engagement Leads and Forensic Consultants to ensure effective coordination of resources and expertise on client matters.
-
Build and cultivate strong client relationships based on trust, open communication, and collaborative problem-solving.
-
Provide well-informed solutions that go beyond immediate client challenges to achieve long-term security goals.
-
Communicate advanced cybersecurity concepts both internally and externally and produce clear and concise verbal and written reports detailing incident findings and analysis.
-
Actively knowledge share with team members cultivating a culture of continuous learning, and stay up to date on industry trends, emerging threats, and best practices.
-
Provide after-hours (on-call/weekend rotational) support as required to address critical incidents and maintain continuous coverage.
Qualifications
-
Bachelorβs degree in Cybersecurity, Computer Science, Information Technology, related degree, or relevant professional work experience in these disciplines.
-
Former professional experience in leading and managing active cybersecurity engagements, including incident response, digital forensics investigations, and interaction with clients, legal counsel, and cyber insurers.
-
Experience in conducting security investigations in Linux and Windows environments.
-
Understanding of cloud platforms and security considerations within AWS, Azure, and GCP.
-
Knowledge of digital forensic artifacts and tools such as ELK, Axiom, Encase, FTK, Volatility, or Open-Source tools.
-
Proficiency in conducting forensic analysis, threat assessments, and post-incident reviews.
-
Eagerness to learn from team, grow your knowledge, and teach your colleagues.
-
Ability to provide after-hours (on-call/weekend rotational) support as required to address critical incidents and maintain continuous coverage.
Requirements
-
Expertise in all these areas is not required, but you should be excited by the opportunity to learn new things and comfortable with working with other team members to expand your knowledge base and experience.
Benefits
-
Competitive compensation plan and total rewards package for team members.
-
Remote workforce.
-
Generous paid time off plan and floating holidays.
-
Paid parental leave.
-
Employer paid premiums for both team members and their dependents for medical, dental, and vision.
-
Comprehensive health, vision, dental, 401K matching program, disability, Flexible Spending Accounts (FSA), Health Savings Account (HSA), Life and AD&D benefits.
-
Professional development and career advancement opportunities.
-
We prioritize employee growth and development through a robust performance management platform to provide ongoing coaching, clear feedback, recognition, and opportunities for career growth.
Interview Process
-
Submit interest and application on our website.
-
Preliminary phone interview with the Talent & People Team (approx., 30 minutes).
-
Virtual/Teams interview with Engagement Leads (approx., 60 minutes).
-
Virtual/Teams interview with DFIR Consultants (approx., 60 minutes).
-
Virtual/Teams interview with Chief Delivery Officer (approx., 45 minutes).
-
Mock Scenario Interview (approx., 60 minutes).
-
Virtual/Teams interview with CEO (Chief Executive Officer) (approx., 30 minutes).
-
Please note that we reserve the right to modify the process at any time.