Experience with EnCase, FTK, Magnet Forensics Axiom, X-Ways, Cellebrite, MacQuisition, Paladin and other forensic tools or acquisition tools.
Experience performing forensic acquisitions of live or dead systems using a variety of tools.
Experience at Windows startup, registry and group policy to identify anomalies for malware persistence mechanisms.
Experience with memory analysis and Volatility.
Malware reverse engineering is a big plus.
We are looking for up to (10) resources to begin onboarding Monday 6/14 9:00AM – 5:00PM. The first day (Monday 6/14) will be training and then they will be added to the schedule based on their assigned shift beginning Tuesday/Wednesday.
Specific Needs: All Eastern Time
1 resource – 9:00AM – 5:00PM shift
5 resources- 5:00PM – 1:00AM shift
4 resources- 1:00AM – 9:00AM shift
My understanding is they will be assisting in remote server sanitization efforts.
Requirements and next steps:
-All resources will be working REMOTE.
-All resources need a Partner e-mail and telephone contact#
-Please send resource resumes and the shift they want to be considered to me so I can send to the Dell workstream leads and they can evaluate and confirm they are a good fit for the project and we can confirm their start on Monday 6/14/21.
-We will try and confirm quickly and let you know the resources we want to onboard by this week-end (Sat, Sunday the latest).