Collect evidence from computers, laptops, phones, iPads, databases and a variety of other devices/systems capable of storing valuable electronic data
Applies sound methodologies to collect, preserve, and analyze digital evidence
Maintain a digital forensic lab environment by ensuring all hardware and software are verified and validated as forensically sound
Focus on operational efficiency to ensure the Forensic Investigations & Digital Evidence team is leveraging tools and processes that reduce redundancy and improve capacity
Stays up to date on the emerging technology threat landscape
Respond to internal business units to investigate simple or complex, sensitive, or urgent matters, usually within minimal timeframes
Prepares written professional reports
Testify and present evidence, as required
Required Competencies
Understanding of digital forensic principles, methodologies, and techniques; including experience using digital forensic tools (i.e., EnCase, Axiom, e-Discovery tools, Cellebrite, Intella, Crowdstrike, Splunk)
Understanding of the principles of investigation, including reporting, evidence handling, chain of custody, and court or regulatory proceedings
Ability to interpret digital evidence matters in a way understandable to business and non-technical people
Knowledge of Data Loss Prevention tools and conducting DLP related investigations
Excellent written and verbal communication, presentation, organization, leadership, and planning skills
Demonstrated ability to manage crisis and emergency incidents
Self-starter, strategic thinker, negotiator and consensus builder, proven ability to satisfactorily manage competing priorities
Understanding of organizational priorities and relationships
Solid understanding of governing plans and documents, procedures, and business administration
Understanding of operating systems (Windows, Linux, and OSX)
Knowledge of malware triage and reverse engineering an asset
Knowledge of network-based services and client/server applications
Knowledge of enterprise systems and infrastructure
Experience with programming/scripting languages an asset
Background in operational information security disciplines (e.g., incident response, security infrastructure management or monitoring services)
Key Relationships
Close working relationship with peers in Cyber Threat Management, GSI, Legal, Privacy, and HR
Frequent interaction with senior executives in Corporate Office and all Business Groups
Education and Experience:
Professional designation / certification in the following would be an asset: EnCE (Encase Certified Examiner); Certified Information Systems Security Professional (CISSP), Certified Cyber Forensics Professional (CCFP), Certified Information Security Manager (CISM), and SANS Global Information Assurance Certification (GIAC)
University degree or college diploma from a recognized Institute of Technology or University program in an appropriate specialty such as Computer Science, or a related field
Minimum of 5 years of relevant experience conducting computer forensic investigations.