Consultant - Enterprise Incident Management

20 Hours ago • 2-5 Years

Job Summary

Job Description

An Enterprise Incident Management (EIM) Consultant is responsible for performing complex investigations, maintaining a business focus, and meeting client requirements. This role involves independent and team-based digital investigations, including Zero Day Exploitation, Business Email Compromise, and Malware Analysis. The consultant contributes to the EIM practice through team and industry contributions. The job requires identifying complex attacks, collecting data, reporting threat vectors, and proficiency with security tools. The role requires creating comprehensive incident reports, working well with customers, and conveying technical concepts to various audiences. Ability to work independently and collaboratively on teams is essential, with the ability to review reports and manage time effectively.
Must have:
  • Combine findings to identify complex attacks and incidents.
  • Collect relevant data sources during an incident manually.
  • Identify, describe and report threat vectors and forensic artifacts.
  • Proficiency with commercial and open-source security tools (EnCase, FTK, etc.).
  • Familiarity with various network architectures and services.
  • Familiarity with Endpoint Detection and Response (EDR) products.
  • Create comprehensive incident reports.
  • Work well with customers and self-manage through difficult situations.
Good to have:
  • Passion for creating tools and automation.
  • Knowledge of programming and scripting.
  • Ability to travel 25-40% of the time to client sites.
  • Certifications such as GCFE, GCIH, ECIH, and CCFE.

Job Details

This position will be fully remote and can be hired anywhere in the US.

An Enterprise Incident Management (EIM) Consultant is a highly skilled incident responder capable of performing complex investigations while maintaining a business focus and meeting client requirements. This position will work both independently and as part of a team to perform digital investigations including: Zero Day Exploitation, Business Email Compromise, Unauthorized Access, Sensitive Data Exposure, Insider Threat, Malware Analysis, and Threat Hunting. An EIM Consultant also contributes to the development and continuous improvement of the EIM practice through various team and industry contributions.

How you'll make an impact:

  • Ability to combine multiple separate findings to identify complex attacks and incidents

  • Ability to manually collect relevant data sources during an incident.

  • Ability to identify, describe and report threat vectors and forensic artifacts

  • Proficiency with commercial and open-source security tools required (EnCase, FTK, XWays, Splunk, ELK, EZ Tools etc.)

  • Familiarity with many different network architectures, network services, system types, network devices, development platforms and software suites required (Linux, Windows, Cisco, Oracle, Active Directory, JBoss, .NET, etc.) required.

  • Familiarity with Endpoint Detection and Response (EDR) products, such as SentinelOne, Carbon Black, CrowdStrike, etc.

  • Passion for creating tools and automation to make common tasks more efficient preferred.

  • Knowledge of programming and scripting for development of security tools preferred.

  • Demonstrated ability to create comprehensive incident reports required.

  • Must be able to work well with customers and self-manage through difficult situations, focus on client satisfaction.

  • Ability to convey complex technical security concepts to technical and non-technical audiences including executives required.

  • Ability to work both independently as well as on teams required.

  • Willingness to collaborate and share knowledge with team members required.

  • Proven ability to review and revise reports written by peers required.

  • Demonstrated effective time management skills, ability to balance multiple projects simultaneously and the ability to take on large and complex projects with little or no supervision required.

What we're re looking for:

  • Bachelor's degree and approximately 2-5 years of related work experience.

  • Approximately 2-5 years of technical architecture experience

  • Prior experience performing Incident Response, including experience in Containment and Isolation, Forensics, Root Cause Analysis, and/or Elimination and Remediation to enterprise-level organizations.

  • Ability to travel 25-40% of the time to client sites.

  • This position requires the ability to respond onsite in a 24/7/365 environment; must be willing to work evening, overnight, and weekend/holiday hours

  • Preferred certifications include: GIAC Certified Forensics Examiner (GCFE), GIAC Certified Incident Handler (GCIH),EC-Council Certified Incident Handler (ECIH), and Certified Computer Forensics Examiner (CCFE)

  • #LN-GN1

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)

EEO Statement

Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law.

Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities.  For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Fort Worth, Texas, United States

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

We work alongside clients to manage cyber risk and equip them with perspectives and programs to accelerate business progress. Our real-world experience, deep vertical expertise and diverse teams enable us to face any challenge with confidence. We put you at the center of our unmatched ecosystem of people, products, partners and programs to design and implement agile solutions. Our adaptive approach continually assesses risk in the context of cyber and broader objectives to secure today's business and fortify it for the future.

Bengaluru, Karnataka, India (On-Site)

Fort Worth, Texas, United States (Remote)

Denver, Colorado, United States (Remote)

Bengaluru, Karnataka, India (On-Site)

Overland Park, Kansas, United States (Remote)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (Hybrid)

Overland Park, Kansas, United States (Remote)

Minneapolis, Minnesota, United States (Remote)

Bengaluru, Karnataka, India (On-Site)

View All Jobs

Get notified when new jobs are added by Optiv

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug