The team responds to a huge variety of incidents for both public and corporate clients and therefore this role will provide opportunities to broaden security awareness into testing and advisory projects, in addition to deepening your incident response expertise.
Your task will include, but will not be limited to the following:
- You will be the primary technical resource on response cases, deploying your own expertise, creating tailored strategies for response workstreams, etc.
- Manage host- and network-based incident response investigations: (triage, system recovery, technical evidence collection, and forensics, log, malware and root cause analyses)
- Participate in an on-call rotation to provide 24x7x365 client incident coverage, but with flexible working practices: the firm is mindful of the need for good work/life balance and offers flexible working options to support wellbeing.
Requirements
- Approximately 5 years’ experience Incident Response/Cyber Security Analyse with a University degree in Computer Science with at least one of the following certifications GCFE, GCFA, GCIH, GNFA.
- A critical and investigative mindset with in-depth knowledge of cyber threat players, their tactics, procedures, and methods.
- Strong communication skills, in Cantonese and English, are non-negotiable. Mandarin will be an advantage
- Experience engaging with forensics, containment and restoration/recovery.
- Experience using scripting to solve cyber security problems, an ability to demonstrate an interest in doing so, etc.
- Proven ability to liaise, converse and negotiate with all levels of an organization, from C-level to technical and business teams.
- Certification in EnCE, CFSR, CISSP, GREM, CCNA, MCFE, OSCP, Network+ and Security+ will be an advantage