Capgemini is an Equal Opportunity Employer encouraging diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
This is a general description of the Duties, Responsibilities and Qualifications required for this position. Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodations do not pose an undue hardship.
A global leader in consulting, technology services and digital transformation, Capgemini is at the forefront of innovation to address the entire breadth of clients’ opportunities in the evolving world of cloud, digital and platforms. Building on its strong 50-year heritage and deep industry-specific expertise, Capgemini enables organizations to realize their business ambitions through an array of services from strategy to operations. Capgemini is driven by the conviction that the business value of technology comes from and through people. It is a multicultural company of 200,000 team members in over 40 countries. The Group reported 2017 global revenues of EUR 12.8 billion (about $14.4 billion USD at 2017 average rate).
***This position is 100% remote ***
This position is part of Capgemini’s Delivery/Professional Services Group.
Responsibilities:
- Perform reactive incident response functions including but not limited to\: host-based analysis functions through investigating Windows, Linux, and Mac OS X systems to identify Indicators of Compromise (IOCs).
- Examine firewall, web, database, and other log sources to identify evidence of malicious activity.
- Investigate data breaches leveraging forensics tools including Encase, FTK, X-Ways, SIFT, Splunk, etc.
- Manage incident response engagements to scope work, guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations.
- Mentorship of team members in incident response and forensics best practices.
Requirements
- 10+ years of experience in professional services consultancy, commercial cyber security, information security or related industries.
- Bachelor’s Degree in Information Security, Computer Science, Digital Forensics, Cyber Security
- 8+ years of experience in an analytical role of either network forensics analyst, threat analyst, incident response or security engineer/consultant
- Proficient with host-based forensics and data breach response
- Experience with EnCase, FTK, X-Ways, SIFT, Splunk, Redline, Volatility, WireShark, TCPDump, and open source forensic tools
- One or more of the following technical certifications\: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), EnCE or equivalent certifications in these areas
- Demonstrated ability to make decisions on remediation and countermeasures for challenging information security threats
- Ability to synthesize data from multiple sources and present concise, relevant information to a non-technical audience
- Experience with advanced computer exploitation methodologies
- Incident response consulting experience preferred
Candidates should be flexible / willing to work across this delivery landscape which includes and not limited to Agile Applications Development, Support and Deployments.
Applicants for employment in the US must have valid work authorization that does not now and/or will not in the future require sponsorship of a visa for employment authorization in the US by Capgemini.