Digital Forensic Incident Responder, Vice President
Job
Professional
Irving, TX (In Person)
$157,200 Salary, Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
86
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Overview of the Role As a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients' best interests. As a financial institution that touches every region of the world and every sector that shapes your daily life, our teams are charged with a mission that rivals any large tech company. Our technology solutions are the foundations of everything we do. We keep the bank safe and provide the technical tools our workers need to be successful. We design our digital architecture and ensure our platforms provide a first-class customer experience. Our operations teams manage risk, resources, and program management. We focus on enterprise resiliency and business continuity. We develop, coordinate, and execute strategic operational plans. Essentially, Enterprise Operations & Technology re-engineers client and partner processes to deliver excellence through secure, reliable, and controlled services. Trust is part of our DNA at Citi. As such, we take safeguarding our customer data very seriously. The Chief Information Security Office (CISO) is made up of deeply dedicated and talented colleagues who work together to ensure the safety of Citi's and our clients' assets and information. We manage information security as an end-to-end program
- one with a clear mandate and accountability.
MITRE ATT&CK
Framework and other standard security-focused models. Work with application and infrastructure stakeholders to identify key components and information sources such as environments (on-premises versus cloud) , servers, workstations, middleware, applications, databases , logs, etc. Participate in incident response efforts using forensic and other custom tools to identify any sources of compromise and/or malicious activities taking place. Collaborate with global multidisciplinary groups for triaging and defining the scope of large scale incidents. Document and present investigative findings for high profile events and other incidents of interest . Participate in readiness exercises such as purple team, table tops, etc . Train junior colleagues on relevant best practices . Qualifications You should be all of the following: A skilled and creative incident responder . Success will depend on your ability to: Stay current with the evolving landscape of threat activities and cybersecurity best practices. Quickly synthesize information from disparate sources. Scrutinize evidence thoroughly to identify relationships and develop leads. Establish defensible working theories to explain observations and findings. Perform investigations in a forensically sound manner. A goal oriented individual contributor . Success will depend on your ability to: Stay motivated and work independently with minimal oversight. Adapt to changing requirements in a fast paced environment. Multitask and meet deadlines despite competing priorities. Navigate operational impediments in order to complete time sensitive tasks. Identify and document any opportunities for process improvement. A reliable team player . Success will depend on your ability to: Practice mutual respect at all times. Establish trust and build strong partnerships. Resolve conflict in a constructive manner and use as an opportunity to develop team unity. Prioritize collective success ahead of individual ambition. A great communicator. Success will depend on your ability to: Establish clear narratives to describe investigative findings and working theories. Clearly and concisely articulate any recommendations that arise from investigative activities. Motivate colleagues and partners to cooperate and support as needed. Exert influence both verbally and in writing. A passionate leader. Success will depend on your ability to: Lead by example. Enable team success by being approachable and available. Innovate and inspire others. Embrace challenges and approach any failures as opportunities for learning and improvement . Requirements and Critical Competencies Education, knowledge, andExperience:
Bachelor's degree in a technically rigorous domain such as Computer Science, Information Security, Engineering, Digital Forensics, etc. 5+ years of professional experience in cybersecurity and/or information security, or demonstrated equivalent capability. 2+ years hands-on working in cyber incident response and investigations in medium to large organizations with cloud and forensics components. Experience in Incident Response Hands-on experience with analyzing and pivoting through large data sets Current hands-on experience in digital forensics (e.g. computer, network, mobile device forensics, and forensic data analysis, etc.). Activities include but not limited to: Memory collection and analysis from various platforms Evidence preservation, following industry best practices . Familiarity with malware analysis and Reverse Engineering of samples (e.g. static, dynamic, de-obfuscation, unpacking) In-depth File system knowledge and analysis. In-depth experience with timeline analysis. In-depth experience with Registry, event, and other log file and artifact analysis. Hands-on experience with a DFIR toolset and related scripting Current expertise with an EDR system One or more GIAC (e.g. GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.) or other digital forensic and/or incident response certifications. Experience in the following operating systems: Windows Operating Systems / UNIX / Mac OS X, specifically in system administration, command line use, and file system knowledge. Experience in Basic Scripting and Automation Proficient in basic scripting and automation of tasks (e.g. C/C++, Powershell, JavaScript, Python, bash, etc.). Network Concepts and Understanding Working knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection/prevention systems, encryption, load balancing, and other network protocols. Other Working knowledge of relational database systems and concepts. Working knowledge of virtualization products. Must have flexibility to work outside of normal business hours when necessary. Exceptional candidates from non-traditional backgrounds or who otherwise do not meet all of these criteria may be considered for the role provided they demonstrate sufficient skill and experience.Job Family Group:
TechnologyJob Family:
Information SecurityTime Type:
Full timePrimary Location:
Irving Texas United StatesPrimary Location Full Time Salary Range:
$125,760.00- $188,640.
- Most Relevant Skills Please see the requirements listed above.
- Other Relevant Skills For complementary skills, please see above and/or contact the recruiter.
Anticipated Posting Close Date:
- Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law.
Similar remote jobs
Sonja Biggs Educational Services, Inc.
San Diego, CA
Posted1 day ago
Updated12 hours ago
EverLine Coatings - Newark
Orange, NJ
Posted1 day ago
Updated12 hours ago
Similar jobs in Irving, TX
Anchor Point Management Group
Irving, TX
Posted1 day ago
Updated12 hours ago
Similar jobs in Texas
Geeks Who Drink
Tomball, TX
Posted1 day ago
Updated12 hours ago
Vighter Medical Group
San Antonio, TX
Posted1 day ago
Updated12 hours ago
Mphasis Digital Risk
Carrollton, TX
Posted1 day ago
Updated12 hours ago