This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Senior Consultant in Unit 42’s Digital Forensics and Incident Response (DFIR) team, you will have the opportunity to work on high-impact cases across varied industry verticals. We are seeking an individual who is dedicated to delivering highly technical consulting services to an exceptional standard, thrives in a fast paced team environment, and advocates for innovative approaches to deliver the best outcomes for our cross-sector clients.
Job Responsibility:
Perform reactive incident response functions including but not limited to Host-based analysis outcomes via investigating Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs)
Examine firewall, web, database, and other log sources to identify evidence and artefacts of malicious and compromised activity
Investigate data breaches leveraging industry standard forensics tools such as Encase, FTK, X-Ways, SIFT, Splunk, and custom Unit 42 investigation tools to determine source of compromises and malicious activity that occurred in client environments
Conduct triage and analysis tasks leveraging best of breed Endpoint Detection and Response (EDR) technology such as Cortex XDR, CrowdStrike, MDE etc.
Supported by senior team members, undertake incident response engagements to guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations
Provide mentorship of Incident Response Consultants in incident response and forensics best practices
Working with practice leads to scope, schedule and deliver engagements end-to-end
Report generation that clearly communicates investigations and assessment details, results, and remediation recommendations to clients
Provide recommendations to clients on specific security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks including response and recovery of a data security breach
Contributing alongside practice leads to the continuous improvement and innovation of our services based on key drivers such evolving technology, threat landscape, regulatory requirements, lessons learned, industry standards and client requirements
Assist in the development of, and ongoing maintenance of internal infrastructure for research, development, and security testing
Requirements:
4+ years of professional experience using leading industry tools and technologies (e.g., Disk forensics tools, EDR technology, SIEM) for performing Digital Forensics and Incident Response (DFIR) investigations at scale
Proficient with host-based forensics on both Windows, Linux and Mac operating systems
Experienced with tooling such as EnCase, FTK, X-Ways, SIFT, Splunk, Volatility, WireShark, TCPDump, and other open source forensic tools
Solid understanding of the cyber threat landscape, and an ability to apply threat-led approaches to security engagements
Identified ability to grow into a valuable contributor to the practice and, specifically be collaborative and able to build relationships internally, externally, and across all PANW functions, including the sales team
have the potential and capacity to understand aspects of the business and develop a thorough understanding of PANW products over time
have/or a desire to grow an external presence via public speaking, conferences, and/or publications
ability to build credibility, executive presence, and gravitas
be able to have a meaningful and rapid delivery contribution
Ability to become proficient in at least two Palo Alto Networks products, including developing a deeper understanding of how our products integrate into an organisations cyber security program, and can be leveraged to produce data driven insights
Ability to perform travel requirements as needed to meet business demands
Nice to have:
3+ years experience in client-facing consulting roles
Experience in working in other Blue Team roles such as SOC Analyst, Threat Hunter, Detection Engineer etc.
Bachelor’s Degree in Information Security, Computer Science, Digital Forensics, Cyber Security, or equivalent years of professional experience to meet job requirements and expectations
Professional industry certifications such as: GIAC Certified Forensic Analyst (GCFA)