PwC's Cybercrime group within the Forensic Services Practice investigates network/computer intrusions and data theft committed by insiders, corrupt competitors, criminal enterprises, and foreign governments. This mission involves the forensic collection and analysis of digital evidence, computer forensics, live memory forensics, network forensics, malware forensics, providing leadership and advice to client stakeholders, reporting artifacts verbally and in written reports, collaborating with law enforcement and regulators, and developing containment strategies. Further, the cybercrime group conducts proactive cyber risk assessments to identify previously undetected vulnerabilities and/or actual intrusions.
Proven intimate experience and thorough ability to lead teams at client sites and lead client meetings, as well as write client proposals, engagement deliverables and engagement status reports.
Demonstrated intimate knowledge and direct experience responding to network and computer intrusions.
Demonstrated intimate knowledge and direct experience of the following to investigate and respond to network and/or computer intrusions and data theft: information security, computer forensics, data analysis, and system administration of Microsoft Windows operating systems, Microsoft Exchange server, and Anti-Virus software.
Demonstrated experience and intimate knowledge of the following to conduct analysis for evidence of network penetrations and data theft: Firewalls, Intrusion Detection/Prevention Systems, Proxy Servers, and Log Aggregation Technology
Demonstrated intimate knowledge and direct experience reviewing logs from any of the following: Microsoft Windows operating systems; Microsoft Exchange server; Anti-Virus software; Firewalls; Intrusion Detection/Prevention Systems; and proxy servers.
Demonstrated intimate knowledge and direct experience delivering forensic technology solutions and/or responding to cyber security incidents that utilizes at least one of the following products and/or tools: EnCase, F-Response, FTK, Helix, live memory collection, and Paraben.
Intimate knowledge of HBGary Responder, Network Traffic Collection and Analysis, Sandboxing, Malware Analysis, Memory Analysis, and Computer Programming to learn how cyber attacks are being performed.
Completed studies of concentration in Computer Science, Information Technology or related concentration.
Obtained certifications in one or more of the following: EnCase Certified Examiner (EnCE), Certified Fraud Examiner (CFE), Certified Ethical Hacker (CEH), Global Certified Incident Handler (GCIH), Microsoft Certified Systems Engineer (MSCE) and/or Certified Information Systems Security Professional (CISSP)
Min Year Exp:
Min Degree(s) and Certifications:
Bachelor of Science or Bachelor of Arts degree