[Hiring] Forensics / Incident Response SME @Valiant Solutions, LLC
Forensics / Incident Response SME @Valiant Solutions, LLC
All Others
Salary usd 145,000 - 1..
Remote Location
Employment Type full-time
Posted 2d ago

[Hiring] Forensics / Incident Response SME @Valiant Solutions, LLC

2d ago - Valiant Solutions, LLC is hiring a remote Forensics / Incident Response SME. πŸ’Έ Salary: usd 145,000 - 155,000 per year πŸ“Location: Japan

Role Description

Valiant Solutions is seeking a Forensics / Incident Response SME to join our rapidly growing and innovative cybersecurity team!

Do you have experience in IT security and a strong background in Incident Response and Forensics? If so, you may be interested in this dual-focused position that requires active participation in all Incident Response activities, complemented by deep, specialized expertise in Forensic Analysis.

This is your opportunity to join a busy Security Engineering team delivering cutting-edge solutions to a fantastic Government client. Specialized experience in incident response, managing APTs, forensic analysis, and handling evidentiary data is key for this challenging and rewarding role. This role will be responsible for:

  • All incident response and management activities
  • Forensic analysis
  • Other emerging enterprise-wide IT challenges

We are seeking a motivated individual to join this team, which is constantly evolving and currently developing cloud security solutions in AWS. You’ll be passionate about what you do and will be able to work autonomously to engineer your way out of problems.

This position allows for 100% remote work. Remote work requires a high level of trust in our employees, and we strictly adhere to the details outlined in our Remote Work Policy below.

Qualifications

  • 8+ years of specialized experience in incident response, management of the APT, forensic analysis, and handling of evidentiary data, with the most recent experience in the past 4 years.
  • Experience with Mobile Device Forensics
  • Experience performing IR, Forensics, and post-mortem reports in cloud environments (AWS preferred).
  • Ability to identify malware characteristics and conduct reverse engineering in x86 and x64 assembly
  • Ability to demonstrate and conduct Windows memory forensics techniques to analyze malware threats.
  • Strong knowledge of malware code and behavioral analysis.
  • Working knowledge in SIFT, REMnux, or other similar frameworks.
  • Experience in Presentation and Reporting of Evidence and Analysis
  • Experience in File System Timeline Analysis
  • Experience in Live Incident Response and Volatile Evidence Collection
  • Experience in Advanced Windows Registry Analysis
  • Experience in Forensic Imaging and Filesystem Media Analysis
  • Experience performing Advanced Network Event and Protocol analysis and timeline reconstruction
  • Experience and ability to develop, use, and follow Standard Operating Procedures (SOPs)
  • In-depth experience with processing and triage of Security Alerts from multiple sources, but not limited to Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources
  • Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response
  • Expert understanding of security incident response processes
  • Support and participate in Threat Hunt and Threat Intel operations

Responsibilities

  • Participate in a rotating on-call; rotation is based on the number of team members
  • Serve as a hybrid Incident Response (IR) and Digital Forensics (DFIR) function, requiring both real-time incident handling and deep forensic investigative expertise across enterprise and cloud environments.
  • Provide Incident Management and Forensic Support as required for incidents/investigations, including off-hours
  • Provide Incident Management support, including guidance and expertise to the Incident Response Team and SOC components
  • Development of policies, instructions, standards, and procedures around security functions
  • Develops, maintains, and optimizes the malware and forensic analysis laboratory environment
  • Maintains digital evidence Chain of Custody for forensic activity in accordance with policy, industry standards, and law
  • Perform forensic analysis on a variety of networks, hosts, digital media, and operating systems/environments as but not limited to: Windows, Mac, iOS, Android, Windows Mobile, Linux/Unix, Mainframe, and cloud computing platforms (SaaS, PaaS, IaaS)
  • Prepare detailed written technical reports covering the methodology applied to forensic investigation, findings, and recommendations for further action
  • Provide SME technical analysis for Incident Response and Forensics for Incident / Breach / and Compromise Activities, including but not limited to malware detection, lateral movement, data collection, and exfiltration detection
  • Provide a complete response to all DFIR tasks
  • Produce and review aggregated performance metrics
  • Work directly with Security and SOC leadership to convert intelligence and results from forensic analysis into useful detection in enterprise security tools
  • Collaborate with the incident response team to rapidly build detection rules as needed
  • Perform customer security assessments
  • Supporting incident response or remediation as needed
  • Participate and develop, and run tabletop exercises
  • Perform lessons learned activities
  • Supporting ad-hoc data and investigation requests
  • Support the enrichment and enhancement of security monitoring tools, including but not limited to evaluation and recommendations on rule tuning and development of new rules/detections

Strongly Preferred Certifications

  • GIAC Certified Forensics Examiner (GCFE)
  • Certified Forensic Analyst (GCFA)
  • Certified Computer Examiner (CCE)
  • AccessData Certified Examiner (ACE)
  • EnCase Certified Examiner (EnCE)
  • Magent Certified Forensic Examiner (MCFE)
  • Magent Certified GRAYKEY Examiner (MCGE)
  • AWS Solution Architect (AWS)
  • SANS GIAC Certified Incident Handler (GCIH)
  • SANS GIAC Certified Intrusion Analyst (GCIA)
  • SANS GIAC Network Forensics Analyst (GNFA)
  • SANS GIAC Certified Enterprise Defender (GCED)
  • SANS GIAC Reverse Engineering Malware (GREM)
  • Carnegie Mellon Certified Computer Incident Handler (CSIH)
  • IACIS Certified Forensic Computer Examiner (CFCE)
  • ISFCE Certified Computer Examiner (CCE)

Benefits

  • Valiant pays 99% of the Medical, Dental, and Vision Coverage for Full-time Employees
  • Valiant contributes 25% towards Health Coverage for Family and Dependents
  • 100% Paid Short Term Disability and Life Insurance Policy for Full-time Employees
  • 100% Paid Certifications
  • 401K Matching up to 4%
  • Paid Time Off
  • Paid Federal Holidays
  • Wellness & Fitness Program
  • Valiant University – Online Education and Training Portal
  • FSA programs for: Medical Costs, Dependent Care, Transit, and Parking
  • Referral Bonuses
Before You Apply
️
remote Be aware of the location restriction for this remote position: Japan
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Forensics / Incident Response SME @Valiant Solutions, LLC
All Others
Salary usd 145,000 - 1..
Remote Location
Employment Type full-time
Posted 2d ago
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Application Denied βœ“
Unlock 165,000+ Remote Jobs
️
remote Be aware of the location restriction for this remote position: Japan
β€Ό Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Apply for this position
Did not apply βœ“
Applied βœ“
Sent Follow-Up βœ“
Interview Scheduled βœ“
Interview Completed βœ“
Offer Accepted βœ“
Offer Declined βœ“
Application Denied βœ“
Unlock 165,000+ Remote Jobs
Γ—

Apply to the best remote jobs
before everyone else

Access 165,000+ vetted remote jobs and get daily alerts.

4.9 β˜…β˜…β˜…β˜…β˜… from 500+ reviews
Unlock All Jobs Now

Maybe later