Businesses today are confronted daily by corruption, fraud and other unplanned events. Our growing Advisory Forensics Services practice protects opportunities for clients by working with them to strategically prepare for and manage the changeable complexities of the evolving threat landscape and by providing unparalleled resources and insights to investigate fraud, assist in risk management and mitigation, and identify and analyze vulnerabilities - whether in one country or worldwide. With a strong Forensics presence in more than 40 countries, our strategic threat management approach enables us to work with international clients to anticipate, manage, and respond to threats, while also helping clients become "threat-smart." Our Forensics professionals possess core forensics capabilities as well as forensic technology expertise and offer clients a unilateral advantage in investigating problems that extend across borders or that afflict multinational organizations.
Our Forensics Technology Solutions consultants help clients protect business opportunities in today's evolving threat landscape. We apply advanced, strategic approaches to assist our clients with complex information management challenges as well as combine data analysis techniques, sophisticated technology tools, and information management principles to help our clients make well-informed decisions. By strategically helping clients prepare for and manage threats, our global team helps clients take advantage of opportunities, develop stronger early warning systems, and become "threat-smart."
PwC's Cybercrime group within the Forensic Services Practice investigates network/computer intrusions and data theft committed by insiders, corrupt competitors, criminal enterprises, and foreign governments. This mission involves the forensic collection and analysis of digital evidence, computer forensics, live memory forensics, network forensics, malware forensics, providing leadership and advice to client stakeholders, reporting artifacts verbally and in written reports, collaborating with law enforcement and regulators, and developing containment strategies. Further, the cybercrime group conducts proactive cyber risk assessments to identify previously undetected vulnerabilities and/or actual intrusions.
Demonstrated thorough knowledge of the following to investigate network and/or computer intrusions and data theft:
information security, computer forensics, data analysis, and system administration of Microsoft Windows operating systems, Microsoft Exchange server, and Anti-Virus software.
Demonstrated thorough knowledge and direct experience delivering forensic technology solutions and/or responding to cyber security incidents that utilizes at least one of the following products and/or tools: EnCase, F-Response, FTK, Helix, live memory collection, and Paraben.
Demonstrated thorough knowledge and direct experience reviewing logs from any of the following: Microsoft Windows operating systems; Microsoft Exchange server; Anti-Virus software; Firewalls; Intrusion Detection/Prevention Systems; and proxy servers.
Thorough knowledge of Firewalls, Intrusion Detection/Prevention Systems, Proxy Servers, and Log Aggregation Technology to conduct analysis for evidence of network penetrations and data theft.
Thorough knowledge HBGary Responder, Network Traffic Collection and Analysis, Sandboxing, Malware Analysis, Memory Analysis, and Computer Programming to learn how cyber attacks are being performed.
Demonstrated thorough project experience identifying and addressing client needs: actively participating in client discussions and meetings; communicating a broad range of Firm services; managing engagements including preparing concise, accurate documents and balancing project economics management with the occurrence of unanticipated issues.
Demonstrated experience as a team leader: creating a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members; providing candid, meaningful feedback in a timely manner to Associates in the Cybercrime team; and keeping leadership informed of progress and issues.
Completed studies of concentration in Computer Science and Information Technology; obtained Masters in Information Systems
Obtained certifications in one or more of the following: EnCase Certified Examiner (EnCE), Certified Fraud Examiner (CFE), Certified Ethical Hacker (CEH), Global Certified Incident Handler (GCIH), Microsoft Certified Systems Engineer (MSCE) and/or Certified Information Systems Security Professional (CISSP)
Min Year Exp:
Min Degree(s) and Certifications:
Bachelor of Science or Bachelor of Arts degree