Overview:
At KPMG, you'll join a team of diverse and dedicated problem solvers, connected by a common cause: turning insight into opportunity for clients and communities around the world.
As a Senior Cyber Response and Digital Investigation Specialist at KPMG Canada, your primary role will be to participate in the investigation and resolution of proven cyber incidents. You will be responsible for analyzing and investigating evidence, gathering digital evidence for analysis, and deploying tools for analysis and investigation. You will be called upon to investigate security incidents, data breaches and suspicious activities. You will use specialized tools and techniques to collect, analyze and present digital evidence as part of legal proceedings or internal investigations.
What you will do:
Comprising several multidisciplinary experts, the team's day-to-day focus on incident response and digital forensics is its sole area of expertise. It enjoys international recognition for both the depth of its expertise and its unique ability to respond to all facets of an incident.Lead and manage computer forensic investigations and cyber incident response, including log analysis, malware triage and binary reverse engineering.
Collect, analyze, and maintain data to support investigation, risk management and mitigation efforts.
Demonstrate in-depth technical knowledge in the areas of operating system security, network security, cryptography and malware analysis.
Perform computer forensics analysis on various platforms using tools such as EnCase, Autopsy, Magnet Axiom and Cellebrite.
Use and analyze the results of endpoint detection and response (EDR) tools such as Sentinel One and Microsoft Defender.
Develop incident investigation and computer forensics reports.
Communicate effectively at various levels and audiences.
Participate in regular on-call responsibilities.
Contribute to thought leadership and business development campaigns.
Promote a culture of sharing and collaboration within the team.
What you bring to this role:
Undergraduate degree in Computer Science, Information Technology or related field - or equivalent in academics and/or experience.
A minimum of three (3) years prior experience in incident response or CSIRT is preferred.
Hands-on experience with various security tools, including log management, web proxies, endpoint protection platforms, etc. is preferred.
Completion of relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), EnCase Certified Examiner (EnCE), CCFP ISC(2) or similar, an asset
Minimum of two (2) years' experience using forensic software applications (e.g. EnCase, FTK, Autopsy, Magnet Axiom, Cellebrite, Wireshark, OpenVAS, Snort, Magnet IEF/Axiom) and techniques to capture electronic data from computers, external media, networks and mobile devices.
Experience in consulting or external consulting capacity or as an incident response manager in a company or firm will be a plus.
Practical experience in computer forensics such as Windows, Unix and/or Linux disk and memory forensics, host and network based security monitoring, traffic and log analysis and static and dynamic malware analysis in support of incident response investigations and potential litigation with an understanding of evidence management procedures.
Excellent verbal and written communication skills in French
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.