• Experienced with EnCase, FTK, X-Ways, Axiom, SIFT, Splunk, Elastic Stack, Redline, Volatility, WireShark, TCPDump, and open-source forensic tools
• Proficient to perform malware forensics and reverse engineering
• Deep understanding of internals and constructs of modern operation systems
• Proficiency with at least one interpreted programming language (Python, Ruby, etc.) preferred, but not required
• Advanced knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security
• Strong understanding of vulnerabilities, common attack vectors and has attacker mindset: ability to think about creative threats and attack vectors.
• Strong communication (i.e., written and verbal), presentation, teamwork skills and resourcefulness
• Experience with digital forensics in cloud services a plus
• Strong written, spoken skills, analytical skills, problem-solving skills, and demonstrated ability to work in complex environments to analyse cyber incident investigations
.