In order to address the most critical needs of our clients, RSM US LLP has established the Security and Privacy Services group, comprised of more than 100 professionals dedicated exclusively to serving the cyber security needs of our clients. This group includes experienced consultants located throughout the country dedicated to helping clients with preventing, detecting, and responding to security threats that may affect their critical systems and data. We serve a diverse client base within a variety of industries, and we are relied upon to provide expertise within areas of security testing, architecture, governance, compliance, and digital forensics.
We are seeking an experienced Consultant to join our Digital Forensics and Incident Response (DFIR) team. Our DFIR practice is made up of individuals able to contribute tangible value to our clients in the areas of digital forensics, incident response, network vulnerability testing, IT risk assessments, and cyber investigations.
In this role, you will work on exciting projects such as:
- Proactively participate and supervise on projects involving the identification, collection, and analysis of computer systems and electronic data sources relevant to investigative, legal, or regulatory initiatives
- Evaluate malicious activity on company networks assets and mitigate threats using data loss prevention tools, processes, and techniques Perform and supervise remote and onsite digital evidence collections and forensic analysis tasks through the use of industry standard hardware and software applications
- Generate precise written and oral reports and professional communication for senior level review and client-facing in support of various projects
- Facilitate communication and coordination between clients, client internal and external counsel, and law enforcement entities Ability to identify cyber security risks and remediation tasks of networks and computer systems
- Understand the technical skills required for completing digital forensic investigations within a lab environment and remote client locations
- Follow and document proper evidence collection and chain of custody practices.
- Analyze network logs, computer systems, and malicious code to identify scope and timeline of system compromise and Research and testing of digital forensic hardware and software solutions and identify opportunities to improve the team's capabilities
- Assist with the development and delivery of remediation recommendations for identified findings
- Identify and clearly articulate (written and verbal) findings to senior management and clients
- Help identify improvement opportunities for assigned clients
- This position is for individuals with 3+ years of hands-on technical or digital forensic investigative experience of personal computer systems, servers, email and electronic data storage, and mobile devices, with a preference for prior consulting or professional services backgrounds Bachelor's degree in computer science or related field from an accredited college/university EnCase, CFCE or equivalent certifications are required
- Ability to travel as needed Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices
- Strong verbal and written abilities
- Strong multitasking and project management skills
One or more of the following technical certifications or similar:
- GIAC Certified Enterprise Defender (GCED); GIAC Certified Incident Handler (GCIH); GIAC Certified Incident Analyst (GCIA); GIAC Certified Forensic Analyst (GCFA); GIAC Reverse Engineering Malware (GREM); or equivalent vendor specific certifications (e.g. AccessData)
- One or more of the following governance certifications: Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®); Certified Information Security Manager® (CISM®)
- Expertise in one of the following and familiarity/experience with the others: Network forensics (packet analysis, sniffers, examination of suspect ports and services, etc) and log analysis Malware analysis (file, memory, behavioral) on Windows and Linux systems, experience with mobile devices would be of great benefitSystem forensics and investigations