Posted on: 13/07/2025
Years of Experience : 10+ years of relevant experience of Digital Forensics - in Cybersecurity Industry.
Core Skills : Proficient with Cyber/Windows forensics, host-based forensics, network forensics, malware analysis and data breach response.
Experience with tools like EnCase, Axiom, X-Ways, FTK, SIFT, ELK, Redline, Volatility, and open-source forensic tools or similar is preferred.
Experience managing and mentoring forensic teams, preferably in a security, incident response or professional services consulting firm.
Industry : Cybersecurity/IT Services
Salary Range : Upto 70 LPA fixed
Location : Hyderabad (Work from Office regular)
JOB REQUIREMENTS :
- Must have 10+ years of incident response or digital forensics experience with a passion for cyber security (consulting experience preferred)
- Proficient with host-based forensics, network forensics, malware analysis and data breach response
- Experienced with EnCase, Axiom, X-Ways, FTK, SIFT, ELK, Redline, Volatility, and open-source forensic tools
- Experience with a common scripting or programming language, including Perl, Python, Bash, or PowerShell
- Experience managing and mentoring forensic teams, preferably in a security, incident response or professional
services consulting firm
- A deep understanding of working with legal counsel and the ability to thrive in a fast-paced environment, experience working with and communicating with C-level executives, attorneys, and insurance carriers
Roles & Responsibilities :
The Associate Director of Forensics manages and oversees all aspects of the Digital Forensics Incident, Response (DFIR) engagements for multiple Tiger Teams, including the Tiger Teams performance, execution, delivery, quality control, and client development.
Operating as an industry leader in Digital Forensics Incident Response, and a trusted advisor to the client and breach coach, the Forensic Associate Director helps to ensure 100% client success.
The Associate Director, Forensics will provide breach coaches and Insurance Carriers with tailored detailed analysis through a narrative and story with reports summarizing how the unauthorized actor obtained access and identifying the potential root cause of the cyber intrusion.
Did you find something suspicious?
Posted By
Posted in
CyberSecurity
Functional Area
Cyber Security
Job Code
1512144
Interview Questions for you
View All