Job Specifications
Cyber Incident and Response Analyst
My client, a large consultancy, is in need of a Cyber Incident and Response Analyst for a 12 month contract based in Brussels, Belgium.
The ideal candidate will have strong experience in Information Security, expertise in incident response, Good knowledge of at least of these Operating Systems: Windows, Unix/Linux, Good knowledge of networking (TCP/IP), Good knowledge of forensic technique and process, knowledge of evidence collection, including chain of custody, knowledge of cloud evidence collection and forensics capabilities, knowledge of both live and offline acquisition techniques, knowledge of memory analysis, Knowledge of Python or PowerShell Scripting and Excellent English communication skills (written and oral).
The ideal candidate will desirably have Certifications GIAC Certified Incident Handler (GCIH), Forensic Analyst (GCFA), Forensic Examiner (GCFE), GIAC Reverse Engineering Malware (GREM) or other equivalent technical certifications, Knowledge of network traffic analysis and forensics, Knowledge of the following technologies: Firewalls, IDS, Proxy, WAF, Active Directory, EDR, antivirus, Experience with vulnerability management & threat management, vulnerability scanning, Data Loss Prevention (tools and processes), Knowledge of IDA or other decompilation tools, Knowledge of network traffic analysis and forensics and Knowledge of zOS, Tandem.