**What You Will Be Doing**: - Description of Event, its category and initial classification - Description of the Control identified the Event - Description of the risk and its potential impact - Description of remediation and mitigation - Malware analysis and Digital forensics - Management of Incident response activities on site and remotely **What You Should Have/Know**: - Experience performing Digital Forensics and Incident Response (DFIR) investigations on multiple Operation Systems; Windows, Mac and Linux - Tool agnostic with an emphasis on knowing the forensic artifacts themselves versus relying on tool output - Understanding of offensive security to include common attack methods - Understanding of tactics, techniques and procedures associated with malicious actors and various threats including insider threat detection - Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event - Knowledge of and the ability to use popular EDR technologies during DFIR engagements - Knowledge of threat hunting and knowledge of the artifacts necessary to review during threat hunting - Ability to triage and analyze malware dynamically within a virtual environment to quickly gain a set of IOCs during an IR engagement - Knowledge of System Administrator roles and responsibilities with an understanding of Windows Domain environments - Experience identifying host anomalies via Windows Event logs, SysInternals Sysmon, Process Explorer/Monitor, Autoruns, etc. - Knowledge performing DFIR investigations in Cloud environments (Azure, O365, AWS, and Google) - Knowledge of malware analysis concepts and methods - Knowledge of models/frameworks such as Kill Chain and MITRE ATT&CK; - Knowledge of resources such as VirusTotal and their use for identifying contributing information for an event - Proficient in either Python, PowerShell or any other programming languages. - Ability to work effectively with geographically distributed work groups comprised of disparate skills - Ability to perform root cause analysis - Experience in reverse engineering various types of malicious files (executable x86/x64 for different platforms MS Windows ,Linux, MacOS as well as pdf, docs and other) - Strong process planning mindset and ability to perform incident response exercises - Ability to multitask and prioritize work effectively - Excellent verbal and written communications skills **You must have the following qualifications**: - Position can be based in Brazil, Argentina, Colombia, Mexico, Chile, or Peru - Fluency in English is MANDATORY, as well as a fluency in EITHER Spanish or Portuguese (fluency in all three is a huge plus) - Bachelor’s Degree in Computer Science, Information Security, Network Security or related discipline or equivalent work experience - At least 1-2 years of experience working with cross-functional teams - Additional certifications and training preferred in the following areas: CEH, GCIH, GCIA, GCFE, GCFA, GCNA, GREM, GBFA, GCTI, GASF, CISSP, other certifications will be considered - Trainings in DFIR fields SANS FOR308, FOR498, FOR500, FOR508, FOR518, FOR526, FOR572, FOR578, FOR585, FOR610 or alternative