Digital Forensics Response Analyst

Apple – Santa Clara Valley, CA
Do you love figuring out how things work? Do you enjoy helping others better understand security concepts and forensic findings? Do you revel in the act of discovering new digital artifacts? If so, then Apple is seeking a curious Digital Forensics professional like yourself to join our world-class information security team.

Key Qualifications
Strong attention to detail, concern for data accuracy, and high personal integrity
Passion for technology
Strong interpersonal skills required to establish and maintain positive relationships with our business partners
Enjoys researching Digital Forensic tools, techniques or processes
Dependable team player who works collaboratively with peers in a team-oriented, security response service environment
In depth experience with industry standard Digital Forensic methodologies, including: evidence handling, chain of custody procedures, and commonly used Forensic toolsets (EnCase, FTK, X-WAYS, SIFT, Blacklight, Helix, Sleuthkit, etc )
Proven Expertise in filesystem analysis in one or more OS flavor: Mac, Windows, Linux/Unix
Comfortable participating or mentoring DFIR tasks including Live Response and Volatile Data acquisition and analysis
Experience using remote acquisition/analysis tools or endpoint detection/response agents across multiple OS systems for security log or data collections
History of writing affidavits, expert opinions, or providing expert testimony experience a plus.

As a member of the Apple Information Security Team, in the role of a Digital Forensics and Response Analyst, candidate responsibilities will include:

Conducting digital forensic data acquisitions to support HR, Litigation or Internal investigations and audits.
Providing oversight, technical requirements and standards to internal application teams for data acquisitions and forensic processing.
Explaining technical artifacts and findings to non-technical audiences
Performing data collections from internal applications, servers, desktop systems and mobile devices.
Supporting security incident analysis and response, including analysis of network or endpoint content and metadata for detailed time lining and event reconstruction.
Maintaining secure case and data archive inventories and case management systems.
Maintaining and updating SOPs for acquisition, analysis and reporting techniques.
Evaluating industry standard tools and processes used for forensic acquisitions and analysis
Providing feedback to R&D engineers on use case and tool development to automate and pioneer new solutions
Authoring and peer-reviewing detailed, professional analysis reports
Leading or contributing to key projects related to corporate forensics and information security initiatives.
Keeping up to date with modern information security insider threats, attack vectors and exploits.

Bachelors, Masters or PHd in Digital Forensics, Computer or Electrical Engineering, Computer Science, Information Systems, or related discipline; or 4+ years of equivalent work experience.
Additional Requirements
Must have proven experience interfacing or working in or with Federal or Law Enforcement Digital Crimes unit


Leave a Reply