Digital Forensics Analyst at Verizon Communications in Cary, NCother related Employment listings - Cary, NC at Geebo

Digital Forensics Analyst at Verizon Communications in Cary, NC

When you join Verizon Verizon is one of the world's leading providers of technology and communications services, transforming the way we connect across the globe. We're a diverse network of people driven by our shared ambition to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward - and you can too. Dream it. Build it. Do it here. What you'll be doing The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services. The Digital Forensics team is part of the Threat Management Center providing full lifecycle digital forensic services to many business units within Verizon. The Team engages in matters of varied scope and subject to further the threat response and investigative mission at Verizon through the analysis of digital evidence of all types, including workstations, servers, smartphones, tablets, small scale devices and cloud computing. You will work in a fast paced collaborative team supporting digital investigations and forensics requests. This position plays a critical role in our enterprise security, and is considered an influencer. Processes results of investigations and provides thorough reporting while maintaining the chain of custody to the incident response team in support of an ongoing incident. Conducts forensics analysis leveraging forensics technologies, such as memory capturing, network forensic capturing, and capturing of data at rest, to collect evidence and presents results for determination of violation based on the details of the request. Ensures all documentation, including internal team policies, procedures and process diagrams related to all forensic functions are accurate and up-to-date. Manages and/or supports the investigation process to include proper documentation and handling of data according to applicable processes and procedures. Manages the examination and investigation processes, including exercising independent analysis and judgment, proper documentation and handling of evidence according to applicable processes and procedures. Conducts advanced computer, mobile device and network forensic investigations relating to various forms of compromises, including unauthorized access, theft of information and denial of service attacks. Offers guidance and advice in regards to cyber incidents, forensics, and incident response including advice in regards to identifying and remediating security gaps identified throughout the investigation. Recovers and examines data from computers and electronic storage devices. Dismantles and rebuilds damaged systems to retrieve lost data. Provides results of analysis to senior team members with justification for results. Collects and catalogs information in support of litigation which may at times include providing expert testimony. Makes recommendations on changes to processes and procedures within the end-to-end forensic capability workflow. Maintains strong working relationships with all federal, state and local law enforcement and regulatory agencies, including international enforcement agencies. Undertakes the recovery and examination of data from computers and electronic storage devices in support of a security incident. Provides training and mentoring of junior team members. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. What we're looking for You'll need to have:
Bachelor's degree or four or more years of work experience. Four or more years of relevant work experience. Experience working in a Security Operations Center (SOC) or Forensic Investigations discipline. Even better if you have:
A degree. Proficiency in understanding operating systems and their architectures:
Windows, Unix/Linux, and OSX operating systems. Experience, training and certification in the forensic collection and examination of mobile devices. Demonstrated leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Strong presentation skills along with the ability to work well in a highly collaborative environment. Experience presenting to executive and senior leadership. Strong relationship skills and collaborative style to enable success across multiple partners. Initiative, with a record of providing follow-up and follow through with commitments. Demonstrated effective organizational and technical skills. Ability to manage multiple priorities in a fast paced environment. Effective verbal and written communication skills. Related certification, such as A+, Security +, CCFE, EnCE professional, etc. Ability to comply with regulatory requirements. Experience working in the Telecommunications industry. Forensics investigations experience in large Fortune 500 organizations. Experience with various Forensics platforms, preferably Encase. Experience with evidence processing and chain of custody. Experience with expert witness and litigation support. Experience with distributed platform administration and design. Strong understanding of network technologies.
Salary Range:
$80K -- $100K
Minimum Qualification
IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.