Job Description :

Experience with EnCase, FTK, Magnet Forensics Axiom, X-Ways, Cellebrite, MacQuisition, Paladin and other forensic tools or acquisition tools.

Experience performing forensic acquisitions of live or dead systems using a variety of tools.

Experience at Windows startup, registry and group policy to identify anomalies for malware persistence mechanisms.

Experience with memory analysis and Volatility.

Malware reverse engineering is a big plus.

We are looking for up to (10) resources to begin onboarding  Monday 6/14  9:00AM – 5:00PM.  The first day (Monday 6/14)  will be training and then they will be added to the schedule based on their assigned shift beginning Tuesday/Wednesday.

Specific Needs: All Eastern Time

1 resource – 9:00AM – 5:00PM shift

5 resources- 5:00PM – 1:00AM shift

4 resources- 1:00AM – 9:00AM shift

My understanding is they will be assisting in remote server sanitization efforts.

Requirements and next steps:

-All resources will be working REMOTE.

-All resources need a Partner e-mail and telephone contact#

-Please send resource resumes and the shift they want to be considered to me so  I can send to the Dell workstream leads and  they can evaluate and confirm they are a good fit for the project and we can confirm their start on Monday 6/14/21.

-We will try and confirm quickly and let you know the resources we want to onboard by this week-end (Sat, Sunday the latest).

             

Similar Jobs you may be interested in ..