Pyramid Consulting
Immediate need for a talented
Cyber DFIR Engineer . This is a
12+ Months Contract
opportunity with long-term potential and is located in
Atlanta GA & Zebulon, NC (Onsite) . Please review the job description below and contact me ASAP if you are interested.
Job ID:25-64219
Pay Range: $98 - $101/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities: The Cyber DFIR (Digital Forensics & Incident Response) Engineer on the advanced 24/7 Cyber Incident Response Team (CIRT) is responsible for effectively responding to cyber incidents within any technology environment leveraging digital evidence and forensic analysis techniques. As DFIR professionals, individuals in this role demonstrate proficiency in log, code, cloud, identity, network, endpoint, memory, malware, and root cause analysis. The position will directly perform, facilitate, or consult on the entire cyber incident response. Cyber DFIR Engineers must be able to operate and provide technical direction in structured and unstructured situations. This role will routinely setup and lead incident response calls and collaborate across various IT/Cyber functions. This role is office-centric (on-site) in Atlanta, GA or Zebulon, NC with on-call responsibilities. 1st Shift - Tuesday to Saturday (5 days, 8 hour shifts). Key Requirements and Technology Experience:
Skills- Digital Forensics Experience, Incident Response/Incident Containment and Cyber Threat/Cybersecurity Exp & Cloud Platform Knowledge. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training. Five years of experience in Cybersecurity or related work. Knowledge of one or more cloud platforms and cloud security. Knowledge of general information technology (IT) and cybersecurity. Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of operating systems, including Windows/Unix ports and services. Knowledge of modern identity and access management concepts. Knowledge of phishing tactics and techniques. Knowledge of advanced cyber threats and vulnerabilities. Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Knowledge of adversarial tactics, techniques, and procedures. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Knowledge of incident response and handling methodologies. Knowledge of countermeasures to address a variety of threats. Knowledge around leveraging automation, ML, and/or AI. Knowledge of advanced threat hunting techniques. Knowledge of types of digital forensics data and how to recognize them. Knowledge of types and collection of persistent data. Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. Knowledge of processes for seizing and preserving digital evidence. Experience working in cloud environments, namely Microsoft Azure and Amazon AWS. Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.) Industry certifications in cyber security, such as: Security+, CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Cloud Forensics Responder (GCFR), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensic Analyst (GNFA), GIAC Reverse Engineering Malware Certification (GREM), etc. Experience in Cyber Breach Response, Security Operations Center (SOC), Network Operations Center (NOC), IT/Cyber Engineering, or Intelligence Community (IC). Our client is a leading
Banking Industry
and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
#cha
Cyber DFIR Engineer . This is a
12+ Months Contract
opportunity with long-term potential and is located in
Atlanta GA & Zebulon, NC (Onsite) . Please review the job description below and contact me ASAP if you are interested.
Job ID:25-64219
Pay Range: $98 - $101/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities: The Cyber DFIR (Digital Forensics & Incident Response) Engineer on the advanced 24/7 Cyber Incident Response Team (CIRT) is responsible for effectively responding to cyber incidents within any technology environment leveraging digital evidence and forensic analysis techniques. As DFIR professionals, individuals in this role demonstrate proficiency in log, code, cloud, identity, network, endpoint, memory, malware, and root cause analysis. The position will directly perform, facilitate, or consult on the entire cyber incident response. Cyber DFIR Engineers must be able to operate and provide technical direction in structured and unstructured situations. This role will routinely setup and lead incident response calls and collaborate across various IT/Cyber functions. This role is office-centric (on-site) in Atlanta, GA or Zebulon, NC with on-call responsibilities. 1st Shift - Tuesday to Saturday (5 days, 8 hour shifts). Key Requirements and Technology Experience:
Skills- Digital Forensics Experience, Incident Response/Incident Containment and Cyber Threat/Cybersecurity Exp & Cloud Platform Knowledge. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, or related field of relevant education, certification, or related training. Five years of experience in Cybersecurity or related work. Knowledge of one or more cloud platforms and cloud security. Knowledge of general information technology (IT) and cybersecurity. Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of network traffic analysis and packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of operating systems, including Windows/Unix ports and services. Knowledge of modern identity and access management concepts. Knowledge of phishing tactics and techniques. Knowledge of advanced cyber threats and vulnerabilities. Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Knowledge of adversarial tactics, techniques, and procedures. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Knowledge of incident response and handling methodologies. Knowledge of countermeasures to address a variety of threats. Knowledge around leveraging automation, ML, and/or AI. Knowledge of advanced threat hunting techniques. Knowledge of types of digital forensics data and how to recognize them. Knowledge of types and collection of persistent data. Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. Knowledge of processes for seizing and preserving digital evidence. Experience working in cloud environments, namely Microsoft Azure and Amazon AWS. Industry certifications in general technology (e.g. Network+, AWS Certified Cloud Practitioner, Microsoft Azure Fundamentals, etc.) Industry certifications in cyber security, such as: Security+, CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Cloud Forensics Responder (GCFR), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensic Analyst (GNFA), GIAC Reverse Engineering Malware Certification (GREM), etc. Experience in Cyber Breach Response, Security Operations Center (SOC), Network Operations Center (NOC), IT/Cyber Engineering, or Intelligence Community (IC). Our client is a leading
Banking Industry
and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
#cha