As the Technical Director for Reactive Services, you will serve as a senior-level consultant and client advocate, providing expert guidance on all facets of cybersecurity and data breach response. You will deliver strategic and technical leadership to a diverse range of clients, helping them navigate complex security incidents. Your expertise will be critical in shaping response strategies and ensuring clients effectively mitigate and recover from cyber threats.
Key Responsibilities
Provide expert-level strategic and technical guidance to clients during active data breach response and cybersecurity incidents.
Lead complex client engagements from initial scoping and resource allocation through to technical execution and final reporting.
Apply deep knowledge of forensic processes, including chain of custody, and advanced computer and memory acquisition techniques.
Utilize industry-standard forensics tools (e.g., EnCase, FTK, SleuthKit, Volatility) for in-depth analysis across major operating systems.
Challenge curiously by maintaining hyper-current knowledge of the threat landscape, emerging vulnerabilities, and attacker TTPs to inform response strategies.
Conduct detailed analysis of malware, identify persistence mechanisms, and triage threats to determine root cause and impact.
Proactively collaborate with internal teams and client stakeholders, ensuring alignment and communicating clear, actionable findings.
Develop and automate scripts and processes to simplify and enhance the efficiency of incident response scenarios.
Key Responsibilities
Provide expert-level strategic and technical guidance to clients during active data breach response and cybersecurity incidents.
Lead complex client engagements from initial scoping and resource allocation through to technical execution and final reporting.
Apply deep knowledge of forensic processes, including chain of custody, and advanced computer and memory acquisition techniques.
Utilize industry-standard forensics tools (e.g., EnCase, FTK, SleuthKit, Volatility) for in-depth analysis across major operating systems.
Challenge curiously by maintaining hyper-current knowledge of the threat landscape, emerging vulnerabilities, and attacker TTPs to inform response strategies.
Conduct detailed analysis of malware, identify persistence mechanisms, and triage threats to determine root cause and impact.
Proactively collaborate with internal teams and client stakeholders, ensuring alignment and communicating clear, actionable findings.
Develop and automate scripts and processes to simplify and enhance the efficiency of incident response scenarios.
Requirements:
Bachelors Degree in Information Security, Computer Science, Digital Forensics, or a related field, or equivalent military experience.
10+ years of direct incident response or digital forensics consulting experience.
Demonstrated experience leading complex technical engagements, including scoping, client interfacing, and hands-on technical execution.
Proficiency in enterprise-wide data acquisition, host and network level analysis, and creating automation scripts for incident response.
Expert operational understanding of at least one major operating system (Microsoft Windows, Linux, or Mac) from a forensic perspective.
Preferred Qualifications
Established external presence through public speaking, conference presentations, or cybersecurity publications.
Exceptional credibility and executive presence, with the ability to advise senior leadership and build strong client relationships.
Proven ability to collaborate and build relationships across internal functions, including sales and research teams.
An excellent understanding of the company product portfolio and its application in security solutions.
Bachelors Degree in Information Security, Computer Science, Digital Forensics, or a related field, or equivalent military experience.
10+ years of direct incident response or digital forensics consulting experience.
Demonstrated experience leading complex technical engagements, including scoping, client interfacing, and hands-on technical execution.
Proficiency in enterprise-wide data acquisition, host and network level analysis, and creating automation scripts for incident response.
Expert operational understanding of at least one major operating system (Microsoft Windows, Linux, or Mac) from a forensic perspective.
Preferred Qualifications
Established external presence through public speaking, conference presentations, or cybersecurity publications.
Exceptional credibility and executive presence, with the ability to advise senior leadership and build strong client relationships.
Proven ability to collaborate and build relationships across internal functions, including sales and research teams.
An excellent understanding of the company product portfolio and its application in security solutions.
This position is open to all candidates.





















